File name:

IDM-6.35.3-dlazycoder.rar

Full analysis: https://app.any.run/tasks/6100bd41-01d7-496f-a4c8-efb89418bc05
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: December 01, 2019, 19:29:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

06FAFFAD48DDE4970C1F3896E6C9B391

SHA1:

905B22149772BE7F9A4F50DD9CF72D4C0A52783F

SHA256:

77F96F3BF2DBE64004A7835927DD6F1D6F4127DA9D3D42044522BD067CF551C4

SSDEEP:

196608:+ypwmyulvujnv4aMgQwYE6+bc3pkGqlHAGI0I1qhPv35W:ZpwmUv1MgQwYDj3pkhThP8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • idman635build3.exe (PID: 4064)
      • idman635build3.exe (PID: 3160)
      • IDM_6.3x_Crack_v16.5.exe (PID: 3708)
      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
      • IDMan.exe (PID: 2732)
      • IDMan.exe (PID: 3964)
      • UnSigner.exe (PID: 2396)
      • UnSigner.exe (PID: 920)
      • UnSigner.exe (PID: 3060)
      • IDMan.exe (PID: 3996)
      • UnSigner.exe (PID: 3744)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 3824)
      • IDMan.exe (PID: 2732)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 1756)
    • REMCOS was detected

      • IDMan.exe (PID: 2732)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4080)
      • IDMan.exe (PID: 2732)
      • rundll32.exe (PID: 3824)
      • wscript.exe (PID: 492)
      • WinRAR.exe (PID: 2584)
      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
      • UnSigner.exe (PID: 3060)
      • UnSigner.exe (PID: 920)
    • Starts application with an unusual extension

      • idman635build3.exe (PID: 3160)
    • Creates or modifies windows services

      • Uninstall.exe (PID: 1756)
    • Creates COM task schedule object

      • IDMan.exe (PID: 2732)
      • IDM1.tmp (PID: 1216)
      • Uninstall.exe (PID: 1756)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 1216)
    • Creates files in the user directory

      • IDM1.tmp (PID: 1216)
      • IDMan.exe (PID: 2732)
      • IDMan.exe (PID: 3996)
    • Creates files in the program directory

      • IDMan.exe (PID: 2732)
      • IDM1.tmp (PID: 1216)
      • wscript.exe (PID: 492)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 1756)
    • Removes files from Windows directory

      • rundll32.exe (PID: 3824)
    • Creates files in the Windows directory

      • rundll32.exe (PID: 3824)
    • Creates files in the driver directory

      • rundll32.exe (PID: 3824)
    • Executes scripts

      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
    • Executed via COM

      • IDMan.exe (PID: 3964)
      • DeviceDisplayObjectProvider.exe (PID: 2744)
    • Uses TASKKILL.EXE to kill process

      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
    • Searches for installed software

      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
    • Uses REG.EXE to modify Windows registry

      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
  • INFO

    • Manual execution by user

      • idman635build3.exe (PID: 3160)
      • idman635build3.exe (PID: 4064)
      • IDM_6.3x_Crack_v16.5.exe (PID: 3708)
      • IDM_6.3x_Crack_v16.5.exe (PID: 1768)
      • WinRAR.exe (PID: 2584)
      • IDMan.exe (PID: 3996)
    • Dropped object may contain Bitcoin addresses

      • IDMan.exe (PID: 2732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
84
Monitored processes
29
Malicious processes
8
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start winrar.exe idman635build3.exe no specs idman635build3.exe idm1.tmp no specs idmbroker.exe no specs #REMCOS idman.exe uninstall.exe no specs rundll32.exe runonce.exe no specs grpconv.exe no specs net.exe no specs net1.exe no specs mediumilstart.exe no specs winrar.exe idman.exe no specs iemonitor.exe no specs idm_6.3x_crack_v16.5.exe no specs idm_6.3x_crack_v16.5.exe wscript.exe taskkill.exe no specs taskkill.exe no specs reg.exe no specs unsigner.exe unsigner.exe unsigner.exe no specs unsigner.exe no specs devicedisplayobjectprovider.exe no specs idman.exe iemonitor.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
408"C:\Windows\System32\net.exe" start IDMWFPC:\Windows\System32\net.exeUninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
492wscript.exe "C:\Users\admin\AppData\Local\Temp\IDM_BAK.vbs" /idmdir:"C:\Program Files\Internet Download Manager\"C:\Windows\system32\wscript.exe
IDM_6.3x_Crack_v16.5.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
912"C:\Windows\system32\runonce.exe" -rC:\Windows\system32\runonce.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run Once Wrapper
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runonce.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
920"C:\Users\admin\AppData\Local\Temp\UnSigner.exe" -f -b "C:\Program Files\Internet Download Manager\IDMan.exe"C:\Users\admin\AppData\Local\Temp\UnSigner.exe
IDM_6.3x_Crack_v16.5.exe
User:
admin
Company:
Pasi Ruokola
Integrity Level:
HIGH
Description:
PE file signature removal tool
Exit code:
0
Version:
0.08
Modules
Images
c:\users\admin\appdata\local\temp\unsigner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
1216"C:\Users\admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\admin\AppData\Local\Temp\IDM_Setup_Temp\"C:\Users\admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmpidman635build3.exe
User:
admin
Company:
Tonec Inc.
Integrity Level:
HIGH
Description:
Internet Download Manager installer
Exit code:
0
Version:
6, 33, 1, 1
Modules
Images
c:\users\admin\appdata\local\temp\idm_setup_temp\idm1.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1756"C:\Program Files\Internet Download Manager\Uninstall.exe" -instdrivC:\Program Files\Internet Download Manager\Uninstall.exeIDMan.exe
User:
admin
Company:
Tonec Inc.
Integrity Level:
HIGH
Description:
Internet Download Manager installer
Exit code:
1
Version:
6, 33, 1, 1
Modules
Images
c:\program files\internet download manager\uninstall.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1768"C:\Users\admin\Desktop\IDM-6.35.3-dlazycoder\IDM_6.3x_Crack_v16.5.exe" C:\Users\admin\Desktop\IDM-6.35.3-dlazycoder\IDM_6.3x_Crack_v16.5.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\idm-6.35.3-dlazycoder\idm_6.3x_crack_v16.5.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1788reg.exe import C:\Users\admin\AppData\Local\Temp\IDMRegClean.regC:\Windows\system32\reg.exeIDM_6.3x_Crack_v16.5.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2092"C:\Program Files\Internet Download Manager\IEMonitor.exe"C:\Program Files\Internet Download Manager\IEMonitor.exeIDMan.exe
User:
admin
Company:
Tonec Inc.
Integrity Level:
MEDIUM
Description:
Internet Download Manager agent for click monitoring in IE-based browsers
Exit code:
0
Version:
6, 22, 1, 1
Modules
Images
c:\program files\internet download manager\iemonitor.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
2344"C:\Program Files\Internet Download Manager\MediumILStart.exe"C:\Program Files\Internet Download Manager\MediumILStart.exeIDMan.exe
User:
admin
Company:
Internet Download Manager, Tonec Inc.
Integrity Level:
MEDIUM
Description:
IDM module
Exit code:
0
Version:
6, 22, 1, 1
Modules
Images
c:\program files\internet download manager\mediumilstart.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
2 310
Read events
1 285
Write events
933
Delete events
92

Modification events

(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4080) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\IDM-6.35.3-dlazycoder.rar
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop\IDM-6.35.3-dlazycoder
(PID) Process:(4080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
17
Suspicious files
150
Text files
24
Unknown types
22

Dropped files

PID
Process
Filename
Type
1216IDM1.tmpC:\Users\admin\AppData\Local\Temp\IDM_Setup_Temp\IDMSetup2.logbinary
MD5:
SHA256:
4080WinRAR.exeC:\Users\admin\Desktop\IDM-6.35.3-dlazycoder\IDM.6.3x.Patch.v16.5.7zcompressed
MD5:
SHA256:
4080WinRAR.exeC:\Users\admin\Desktop\IDM-6.35.3-dlazycoder\idman635build3.exeexecutable
MD5:
SHA256:
1216IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\license.lnklnk
MD5:
SHA256:
1216IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Uninstall IDM.lnklnk
MD5:
SHA256:
1216IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Uninstall IDM.lnklnk
MD5:
SHA256:
1216IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\license.lnklnk
MD5:
SHA256:
1216IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Internet Download Manager.lnklnk
MD5:
SHA256:
1216IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnklnk
MD5:
SHA256:
1216IDM1.tmpC:\Program Files\Internet Download Manager\IDMSetup2.logbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
7
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2732
IDMan.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
57.4 Kb
whitelisted
3996
IDMan.exe
POST
200
169.55.0.224:80
http://www.internetdownloadmanager.com/data/update623.txt?v=635b3
US
text
11.9 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3996
IDMan.exe
169.55.0.224:80
www.internetdownloadmanager.com
SoftLayer Technologies Inc.
US
suspicious
2732
IDMan.exe
93.184.221.240:80
www.download.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
www.download.windowsupdate.com
  • 93.184.221.240
whitelisted
test.internetdownloadmanager.com
  • 185.80.221.18
whitelisted
secure.internetdownloadmanager.com
  • 169.55.0.227
whitelisted
www.internetdownloadmanager.com
  • 169.55.0.224
whitelisted
mirror3.internetdownloadmanager.com
  • 174.127.73.85
whitelisted
mirror5.internetdownloadmanager.com
  • 185.80.221.19
whitelisted
registeridm.com
  • 169.55.40.5
suspicious

Threats

PID
Process
Class
Message
3996
IDMan.exe
Potential Corporate Privacy Violation
ET POLICY Outgoing Basic Auth Base64 HTTP Password detected unencrypted
No debug info