File name:

A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar

Full analysis: https://app.any.run/tasks/a3bb0c21-90c6-4db4-9256-118c84c5f606
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 05, 2025, 23:23:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
vidar
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

74CF337403EF0E7B416BD48AFC72F869

SHA1:

99E7342CFCFDE538A9F1F373DC235168E6B7792E

SHA256:

833F12183AF9296BFC885379E7441981387FFBB78B010C0F35B3234899BA99BD

SSDEEP:

49152:UBw4vt6pEQOszANOnjrKFW+ph0qjZBf0zzarVfo46P/xQ8up9fF8nySbaE80PI:CBvQEQOOjmFW+Bgzam4wx/uPN8ySbaEy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • VIDAR mutex has been found

      • Wake.com (PID: 904)
    • Actions looks like stealing of personal data

      • Wake.com (PID: 904)
    • Steals credentials from Web Browsers

      • Wake.com (PID: 904)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6652)
      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • Wake.com (PID: 904)
    • Executing commands from a ".bat" file

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Starts CMD.EXE for commands execution

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • cmd.exe (PID: 7856)
    • Get information on the list of running processes

      • cmd.exe (PID: 7856)
    • There is functionality for taking screenshot (YARA)

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Application launched itself

      • cmd.exe (PID: 7856)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7856)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7856)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7856)
    • The executable file from the user directory is run by the CMD process

      • Wake.com (PID: 904)
    • Searches for installed software

      • Wake.com (PID: 904)
  • INFO

    • Checks supported languages

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
      • Wake.com (PID: 904)
    • Manual execution by a user

      • mspaint.exe (PID: 7712)
    • Create files in a temporary directory

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
    • Reads the computer name

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
      • Wake.com (PID: 904)
    • Process checks computer location settings

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Creates a new folder

      • cmd.exe (PID: 8152)
    • Reads the software policy settings

      • Wake.com (PID: 904)
    • Reads mouse settings

      • Wake.com (PID: 904)
    • Application launched itself

      • chrome.exe (PID: 4988)
    • Creates files in the program directory

      • Wake.com (PID: 904)
    • Checks proxy server information

      • Wake.com (PID: 904)
    • Reads the machine GUID from the registry

      • Wake.com (PID: 904)
    • Reads CPU info

      • Wake.com (PID: 904)
    • Creates files or folders in the user directory

      • Wake.com (PID: 904)
    • Reads product name

      • Wake.com (PID: 904)
    • Reads Environment values

      • Wake.com (PID: 904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 932208
UncompressedSize: 826285970
OperatingSystem: Win32
ArchivedFileName: A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
20
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe no specs a minecraft movie 2025.1080p.hd.x264.dual.yg.exe no specs mspaint.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #VIDAR wake.com choice.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904Wake.com T C:\Users\admin\AppData\Local\Temp\714380\Wake.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\714380\wake.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
1052cmd /c copy /b 714380\Wake.com + Valuable + Concert + Cap + Continuously + Portable + Electro + Volleyball + Alien + Convicted + Acids + Assumes 714380\Wake.comC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4008choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
4988"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"C:\Program Files\Google\Chrome\Application\chrome.exeWake.com
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5392cmd /c copy /b ..\Revelation.jar + ..\Keyboard.jar + ..\Ellis.jar + ..\Leaves.jar + ..\Grass.jar T C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5640findstr /V "prague" Mean C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
6652"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6872"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffc8940dc40,0x7ffc8940dc4c,0x7ffc8940dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7184C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7216"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
6 818
Read events
6 804
Write events
14
Delete events
0

Modification events

(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(904) Wake.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(904) Wake.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
0
Suspicious files
23
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6652WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6652.23750\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe
MD5:
SHA256:
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Revelation.jarbinary
MD5:0E41EB14F9965DB0C100D8E5ABA50093
SHA256:42CA0EC158F0F354CBAAB987BC677C4A0FBA0340BC37F6E3A2CCED57CFC1E113
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Leaves.jarbinary
MD5:5BEEE34B4B3383E0ED03A558E3AF3553
SHA256:D54799F1629C9C34DF371768618E8F9449A9BB8CE12F40CA8CDB7B55A386284A
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Decide.jartext
MD5:89C543FDCF5029E8A2699C214E9794C6
SHA256:C6294C4B72D2F1EC0CE9C739618EFE8EE6C235BF027A13F896D102F35D1142E2
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Hiv.jarcompressed
MD5:54E8027C11FA73BECF514D99F5E90356
SHA256:0005120BE16DBFA86F0694AD0C3505F86D59324A72117C5AEDEFB14FD4FB8A2E
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Keyboard.jarbinary
MD5:E057B36987FFECACD251C1E05DC1BD2D
SHA256:AB98805594FB169C6F3B404910D13DB21281FDB27D25DFB38E76D4CF0A2E1916
7856cmd.exeC:\Users\admin\AppData\Local\Temp\Decide.jar.battext
MD5:89C543FDCF5029E8A2699C214E9794C6
SHA256:C6294C4B72D2F1EC0CE9C739618EFE8EE6C235BF027A13F896D102F35D1142E2
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Convictedbinary
MD5:EDCF888527041842DD9551F688AAE010
SHA256:FD54BFC49E8439A2F7092906668579E652B66B1399ACF4074E0272655C588EEC
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Capbinary
MD5:CB5F79BAD95267E6B90E10E1F39BF482
SHA256:B9307386E191EB406BE2A9710BC647D8CC4440A008D59763819DB9795CFFACC0
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Concertbinary
MD5:706B52C792CB8148843E67499C0B9EA0
SHA256:44362897099C25278954C4201E293E1E47962B3F187D36745A80CB434A34A9F0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
28
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6436
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8172
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 23.215.0.132
  • 23.215.0.133
  • 96.7.128.186
  • 96.7.128.192
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.73
  • 40.126.31.128
  • 20.190.159.71
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

No threats detected
No debug info