| File name: | RAGEMP-CHEAT_[unknowncheats.me]_.zip |
| Full analysis: | https://app.any.run/tasks/373531e7-1c3b-4b46-908e-57741b466250 |
| Verdict: | Malicious activity |
| Analysis date: | August 02, 2024, 17:43:01 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | ADA95971CA1D7C520CF7351CD8614F80 |
| SHA1: | 410D49E5D556C0EFB26C32DE77BED7CD640B0730 |
| SHA256: | 766A1B7542BED041B68B7763ABB324FE0C20D93F41DE20E52EDA42C5166D42B0 |
| SSDEEP: | 12288:vWnJO1XkcCxKfD0Hccq0wF88JvlqxCpKLr3ht/P7OK/G1LSVoBXE:vWJO1XkcCxKfD0H5q0w+8J9aCperzDO6 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2023:05:20 00:55:08 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | RAGEMP-CHEAT/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 964 | "C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Version: 123.26505.0.0 Modules
| |||||||||||||||
| 1120 | "C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe" | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 4294967295 Modules
| |||||||||||||||
| 1236 | C:\WINDOWS\system32\cmd.exe /c cls | C:\Windows\System32\cmd.exe | — | RAGE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1248 | "C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe" C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\RAGE.sys | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1356 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | RAGE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1536 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | mapper.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1860 | "C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe" C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\RAGE.sys | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1928 | "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer | C:\Windows\System32\GameBarPresenceWriter.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Gamebar Presence Writer Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1984 | "C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe" | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 4294967295 Modules
| |||||||||||||||
| 2092 | C:\WINDOWS\system32\cmd.exe /c cd C:\Windows\System32\ | C:\Windows\System32\cmd.exe | — | RAGE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\RAGEMP-CHEAT_[unknowncheats.me]_.zip | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF280100005B000000E804000044020000 | |||
| (PID) Process: | (6408) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\General |
| Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\AppData\Local\Temp | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6408 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6408.40480\RAGEMP-CHEAT\HOW TO USE.txt | text | |
MD5:821CAC2C5268FA7EBE64EFD1E745E35F | SHA256:517E00B369714BE8D3D42C17200CE0FBEEFD293D0C673C22C9D57C6FA8029981 | |||
| 6680 | mmc.exe | C:\Windows\INF\dc1-controller.PNF | binary | |
MD5:D3B3FA14EE7DF65425241A14760FCAAD | SHA256:B8B502204D254E4210968D32E73A6AB88D885D29AABE0E391EE3BF6A6439551E | |||
| 6408 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6408.40480\RAGEMP-CHEAT\Driver.rar | compressed | |
MD5:8A859EAB27E005BBA7479F87862E3F66 | SHA256:93975F197A32923051D1F4646D49F2AA2C9FD0657AE617C3795B8F043B736BA9 | |||
| 6628 | WinRAR.exe | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\mapper.exe | executable | |
MD5:1BD2AF361A5A39A49DF07EB420A4B0E5 | SHA256:20FA65ABCAC3A62AE71850679C99CC92311182B46CE2A9816ABD2E066D5CD016 | |||
| 6680 | mmc.exe | C:\Windows\INF\basicrender.PNF | binary | |
MD5:8567F128605CC616A38D0870D077D165 | SHA256:7B2D28D317F49EED7BC242241E54EB3FFFB512C5FB6F719C4F5E9395E6B1F533 | |||
| 6680 | mmc.exe | C:\Windows\INF\miradisp.PNF | binary | |
MD5:C4516D931D999F6A168ADC07F355256D | SHA256:2AD57323363B4182C4E668B20D099B141473ED7B1A661D07997DF3C8099181F5 | |||
| 6628 | WinRAR.exe | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\RAGE.cat | cat | |
MD5:8A859EAB27E005BBA7479F87862E3F66 | SHA256:93975F197A32923051D1F4646D49F2AA2C9FD0657AE617C3795B8F043B736BA9 | |||
| 6628 | WinRAR.exe | C:\Users\admin\Desktop\RAGEMP-CHEAT\Driver\RAGE.inf | binary | |
MD5:3509B92006A3F6E149D221752192F9C9 | SHA256:9EB9EBC5E60F8C739184746E3A13481269D3AF471F3D8E7DFD3EBDDC6D8CDDDD | |||
| 6680 | mmc.exe | C:\Windows\INF\machine.PNF | binary | |
MD5:4C103190BC521FF032845C1B5FDADC4F | SHA256:28C1DEE803488C32BF5229B05FB3F6DA8959A436BB17D331E68AFA61A3BE932F | |||
| 6680 | mmc.exe | C:\Windows\INF\rdcameradriver.PNF | binary | |
MD5:6D1BF957B68044A44CB7D29C8198A377 | SHA256:F2B6BE9B897B82323A5680962416D0F60C5C428D66830518ECF4E113BE851E3B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5336 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | US | binary | 313 b | whitelisted |
6972 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | US | binary | 471 b | whitelisted |
2608 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | binary | 471 b | whitelisted |
2608 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | binary | 471 b | whitelisted |
7020 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | US | binary | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4060 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1536 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5336 | SearchApp.exe | 104.126.37.130:443 | www.bing.com | Akamai International B.V. | DE | unknown |
5336 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
2608 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6972 | backgroundTaskHost.exe | 20.223.35.26:443 | fd.api.iris.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
th.bing.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |