| URL: | https://keygenit.com |
| Full analysis: | https://app.any.run/tasks/f198d4f5-2fd9-42f3-9413-7436bf966486 |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | July 01, 2021, 17:28:03 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | BCFA353EE84FE11CF293E66C55124E32 |
| SHA1: | 77C3AF8081C31320D231D6255733A9DE65617A3D |
| SHA256: | 7677B59893E89264916D647BA3FE01C2B505A091390E24C2E99E294EE4648E8C |
| SSDEEP: | 3:N8FjI:2u |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 272 | regsvr32.exe ..\YMpOBc.hX -u /S | C:\Windows\system32\regsvr32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 3 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 320 | "C:\Users\admin\Desktop\SmartMovie_v3_25_keygen_by_KeygenSumo.exe" | C:\Users\admin\Desktop\SmartMovie_v3_25_keygen_by_KeygenSumo.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 636 | "C:\Users\admin\AppData\Local\Temp\RarSFX1\IDWCH1.exe" /SPAWNWND=$30210 /NOTIFYWND=$C015A | C:\Users\admin\AppData\Local\Temp\RarSFX1\IDWCH1.exe | IDWCH1.tmp | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: Piiiiiiiip�87 Setup Exit code: 1 Version: Modules
| |||||||||||||||
| 672 | "C:\Users\admin\AppData\Local\Temp\40-83f33-a15-71184-c6f76260d92fc\Nedaepiguqi.exe" | C:\Users\admin\AppData\Local\Temp\40-83f33-a15-71184-c6f76260d92fc\Nedaepiguqi.exe | Piiiiiiiip�87.exe | ||||||||||||
User: admin Company: KessFraise_bel_annanass Integrity Level: HIGH Description: KessFraise_bel_annanass Exit code: 0 Version: 40.40.40.40 Modules
| |||||||||||||||
| 760 | ping 127.0.0.1 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 872 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\system32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 896 | "C:\Windows\System32\cmd.exe" /k C:\Users\admin\AppData\Local\Temp\5fsiyycc.ete\JoSetp.exe & exit | C:\Windows\System32\cmd.exe | — | Nedaepiguqi.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 932 | "C:\Users\admin\AppData\Roaming\WinHost\WinHoster.exe" | C:\Users\admin\AppData\Roaming\WinHost\WinHoster.exe | — | 3118959.exe | |||||||||||
User: admin Company: WinHost Integrity Level: MEDIUM Description: WinHost Exit code: 0 Version: 1.0.0.12 Modules
| |||||||||||||||
| 1016 | "C:\Program Files\Windows NT\FSBMGXNKTY\IDownload.exe" /VERYSILENT | C:\Program Files\Windows NT\FSBMGXNKTY\IDownload.exe | Piiiiiiiip�87.exe | ||||||||||||
User: admin Company: IDownload Integrity Level: HIGH Description: IDownload Setup Exit code: 0 Version: Modules
| |||||||||||||||
| 1032 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=844,14570190004404730,3934894479344807684,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1020 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid |
Value: | |||
| (PID) Process: | (1624) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid_installdate |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60DDFB31-658.pma | — | |
MD5:— | SHA256:— | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF2b297f.TMP | text | |
MD5:936EB7280DA791E6DD28EF3A9B46D39C | SHA256:CBAF2AFD831B32F6D1C12337EE5D2F090D6AE1F4DCB40B08BEF49BF52AD9721F | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences | text | |
MD5:— | SHA256:— | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version | text | |
MD5:00046F773EFDD3C8F8F6D0F87A2B93DC | SHA256:593EDE11D17AF7F016828068BCA2E93CF240417563FB06DC8A579110AEF81731 | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF2b298f.TMP | text | |
MD5:64AD8ED3E666540337BA541C549F72F7 | SHA256:BECBDB08B5B37D203A85F2E974407334053BB1D2270F0B3C9A4DB963896F2206 | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old~RF2b2a89.TMP | text | |
MD5:109A25C32EE1132ECD6D9F3ED9ADF01A | SHA256:DA6028DB9485C65E683643658326F02B1D0A1566DE14914EF28E5248EB94F0DD | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old | text | |
MD5:EF1D5606A483BB6C72C81A3F649BEB18 | SHA256:BA083E7585ADA9936944FE56BC0141A544F18A01C3424E5C9F02375B34FE3D45 | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\e94d07d2-bccd-4311-82d3-e96b832f921e.tmp | text | |
MD5:— | SHA256:— | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF2b299f.TMP | text | |
MD5:81F483F77EE490F35306A4F94DB2286B | SHA256:82434CE3C9D13F509EBEEBE3A7A1A1DE9AB4557629D9FC855761E0CFA45E8BCE | |||
| 1624 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old | text | |
MD5:7721CDA9F5B73CE8A135471EB53B4E0E | SHA256:DD730C576766A46FFC84E682123248ECE1FF1887EC0ACAB22A5CE93A450F4500 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2684 | IDWCH1.tmp | HEAD | 200 | 194.163.135.248:80 | http://superstationcity.com/C_Installer/IDownload.exe | DE | — | — | suspicious |
1540 | keygen-step-6.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEGmjTouN%2FW5s3CDseaiw7qE%3D | US | der | 471 b | whitelisted |
1540 | keygen-step-6.exe | GET | 200 | 85.214.154.106:80 | http://www.almanhost.com/components/fw3.exe | DE | executable | 118 Kb | suspicious |
1540 | keygen-step-6.exe | GET | 301 | 85.214.154.106:80 | http://www.almanhost.com/components/fw5.exe | DE | executable | 101 Kb | suspicious |
1540 | keygen-step-6.exe | GET | 301 | 85.214.154.106:80 | http://www.almanhost.com/components/fw2.php | DE | executable | 587 Kb | suspicious |
2788 | Piiiiiiiip�87.exe | GET | 200 | 63.250.33.126:80 | http://requested404.com/Widgets/IDownload.exe | US | executable | 1.41 Mb | suspicious |
1540 | keygen-step-6.exe | GET | 301 | 85.214.154.106:80 | http://www.almanhost.com/components/fw3.php | DE | executable | 587 Kb | suspicious |
2684 | IDWCH1.tmp | GET | 200 | 194.163.135.248:80 | http://superstationcity.com/C_Installer/IDownload.exe | DE | executable | 625 Kb | suspicious |
1540 | keygen-step-6.exe | GET | 200 | 85.214.154.106:80 | http://www.almanhost.com/components/fw4.exe | DE | executable | 101 Kb | suspicious |
3436 | keygen-step-3.exe | POST | 200 | 107.191.60.39:80 | http://www.w7dslkipoja.com/index.php/api/fb | JP | text | 24 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2260 | chrome.exe | 185.177.93.149:443 | keygenit.com | — | MD | malicious |
2260 | chrome.exe | 185.177.93.51:443 | get.ziplink.xyz | — | MD | suspicious |
2260 | chrome.exe | 104.21.14.244:443 | serialms.com | Cloudflare Inc | US | unknown |
2260 | chrome.exe | 142.250.186.141:443 | accounts.google.com | Google Inc. | US | whitelisted |
2260 | chrome.exe | 142.250.186.67:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
2260 | chrome.exe | 104.21.1.222:443 | keygencloud.com | Cloudflare Inc | US | unknown |
1540 | keygen-step-6.exe | 88.99.66.31:443 | iplogger.org | Hetzner Online GmbH | DE | malicious |
2260 | chrome.exe | 172.217.16.142:443 | sb-ssl.google.com | Google Inc. | US | whitelisted |
1640 | keygen-step-1.exe | 185.173.37.179:80 | kvaka.li | M-Telecom, LLC | RU | malicious |
1540 | keygen-step-6.exe | 85.214.154.106:80 | www.almanhost.com | Strato AG | DE | suspicious |
Domain | IP | Reputation |
|---|---|---|
clients2.google.com |
| whitelisted |
keygenit.com |
| malicious |
accounts.google.com |
| shared |
www.googletagmanager.com |
| whitelisted |
www.google-analytics.com |
| whitelisted |
ssl.gstatic.com |
| whitelisted |
serialms.com |
| unknown |
cdnjs.cloudflare.com |
| whitelisted |
keygencloud.com |
| malicious |
a.nel.cloudflare.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1640 | keygen-step-1.exe | A Network Trojan was detected | ET TROJAN Win32/AZORult V3.3 Client Checkin M2 |
1640 | keygen-step-1.exe | A Network Trojan was detected | AV TROJAN Azorult CnC Beacon |
1540 | keygen-step-6.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1540 | keygen-step-6.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1540 | keygen-step-6.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2496 | svchost.exe | Potential Corporate Privacy Violation | ET DNS Non-DNS or Non-Compliant DNS traffic on DNS port Reserved Bit Set |
1540 | keygen-step-6.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1540 | keygen-step-6.exe | Potentially Bad Traffic | ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile |
1540 | keygen-step-6.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1540 | keygen-step-6.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
Process | Message |
|---|---|
lighteningplayer-cache-gen.exe | main libvlc debug: VLC media player - 3.0.7 Vetinari
|
lighteningplayer-cache-gen.exe | main libvlc debug: Copyright � 1996-2018 the VideoLAN team
|
lighteningplayer-cache-gen.exe | main libvlc debug: revision 3.0.2-225-gc9e3360dd4
|
lighteningplayer-cache-gen.exe | main libvlc debug: configured with ../extras/package/win32/../../../configure '--enable-update-check' '--enable-lua' '--enable-faad' '--enable-flac' '--enable-theora' '--enable-twolame' '--enable-avcodec' '--enable-merge-ffmpeg' '--enable-dca' '--enable-mpc' '--enable-libass' '--enable-x264' '--enable-schroedinger' '--enable-realrtsp' '--enable-live555' '--enable-dvdread' '--enable-shout' '--enable-goom' '--enable-caca' '--enable-qt' '--enable-skins2' '--enable-sse' '--enable-mmx' '--enable-libcddb' '--enable-zvbi' '--disable-telx' '--enable-nls' '--host=i686-w64-mingw32' '--build=x86_64-pc-linux-gnu' 'build_alias=x86_64-pc-linux-gnu' 'host_alias=i686-w64-mingw32'
|
lighteningplayer-cache-gen.exe | main libvlc debug: using multimedia timers as clock source
|
lighteningplayer-cache-gen.exe | main libvlc debug: min period: 1 ms, max period: 1000000 ms
|
lighteningplayer-cache-gen.exe | main libvlc debug: searching plug-in modules
|
lighteningplayer-cache-gen.exe | main libvlc debug: ignoring plugins cache file
|
lighteningplayer-cache-gen.exe | main libvlc debug: recursively browsing `C:\Program Files\lighteningplayer\plugins'
|
lighteningplayer-cache-gen.exe | main libvlc debug: saving plugins cache C:\Program Files\lighteningplayer\plugins\plugins.dat
|