File name:

A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar

Full analysis: https://app.any.run/tasks/a3bb0c21-90c6-4db4-9256-118c84c5f606
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 05, 2025, 23:23:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
vidar
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

74CF337403EF0E7B416BD48AFC72F869

SHA1:

99E7342CFCFDE538A9F1F373DC235168E6B7792E

SHA256:

833F12183AF9296BFC885379E7441981387FFBB78B010C0F35B3234899BA99BD

SSDEEP:

49152:UBw4vt6pEQOszANOnjrKFW+ph0qjZBf0zzarVfo46P/xQ8up9fF8nySbaE80PI:CBvQEQOOjmFW+Bgzam4wx/uPN8ySbaEy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • VIDAR mutex has been found

      • Wake.com (PID: 904)
    • Actions looks like stealing of personal data

      • Wake.com (PID: 904)
    • Steals credentials from Web Browsers

      • Wake.com (PID: 904)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6652)
      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • Wake.com (PID: 904)
    • Executing commands from a ".bat" file

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Starts CMD.EXE for commands execution

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • cmd.exe (PID: 7856)
    • Get information on the list of running processes

      • cmd.exe (PID: 7856)
    • There is functionality for taking screenshot (YARA)

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Application launched itself

      • cmd.exe (PID: 7856)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7856)
    • The executable file from the user directory is run by the CMD process

      • Wake.com (PID: 904)
    • Searches for installed software

      • Wake.com (PID: 904)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7856)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7856)
  • INFO

    • Checks supported languages

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
      • Wake.com (PID: 904)
    • Manual execution by a user

      • mspaint.exe (PID: 7712)
    • Reads the computer name

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
      • Wake.com (PID: 904)
    • Create files in a temporary directory

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
    • Process checks computer location settings

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Creates a new folder

      • cmd.exe (PID: 8152)
    • Reads mouse settings

      • Wake.com (PID: 904)
    • Creates files in the program directory

      • Wake.com (PID: 904)
    • Checks proxy server information

      • Wake.com (PID: 904)
    • Reads Environment values

      • Wake.com (PID: 904)
    • Reads the software policy settings

      • Wake.com (PID: 904)
    • Reads the machine GUID from the registry

      • Wake.com (PID: 904)
    • Creates files or folders in the user directory

      • Wake.com (PID: 904)
    • Reads CPU info

      • Wake.com (PID: 904)
    • Reads product name

      • Wake.com (PID: 904)
    • Application launched itself

      • chrome.exe (PID: 4988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 932208
UncompressedSize: 826285970
OperatingSystem: Win32
ArchivedFileName: A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
20
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe no specs a minecraft movie 2025.1080p.hd.x264.dual.yg.exe no specs mspaint.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #VIDAR wake.com choice.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904Wake.com T C:\Users\admin\AppData\Local\Temp\714380\Wake.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\714380\wake.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
1052cmd /c copy /b 714380\Wake.com + Valuable + Concert + Cap + Continuously + Portable + Electro + Volleyball + Alien + Convicted + Acids + Assumes 714380\Wake.comC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4008choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
4988"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"C:\Program Files\Google\Chrome\Application\chrome.exeWake.com
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5392cmd /c copy /b ..\Revelation.jar + ..\Keyboard.jar + ..\Ellis.jar + ..\Leaves.jar + ..\Grass.jar T C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5640findstr /V "prague" Mean C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
6652"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6872"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffc8940dc40,0x7ffc8940dc4c,0x7ffc8940dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7184C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7216"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
6 818
Read events
6 804
Write events
14
Delete events
0

Modification events

(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(904) Wake.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(904) Wake.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
0
Suspicious files
23
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6652WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6652.23750\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe
MD5:
SHA256:
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Grass.jarbinary
MD5:B99AD74C02B83B24287842154059354A
SHA256:3E00BACEF6E19E43DCB2E6655B3973BBB2C3AC89F8F9ABAD8709835A486F1037
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Alienbinary
MD5:E80885734F528D40101EC33FB6A1F269
SHA256:855C3D8E3A8028239AD5CA1A54460DD43A720EC2762702079B8F577CC07ECFA3
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Ellis.jarbinary
MD5:063F8A2E2587CE2DECC31280648A4441
SHA256:9617B2AE6EB2B387A89282A83D3B87B6A5B0B07FE6D01A423476FA1DD5C26E9E
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Revelation.jarbinary
MD5:0E41EB14F9965DB0C100D8E5ABA50093
SHA256:42CA0EC158F0F354CBAAB987BC677C4A0FBA0340BC37F6E3A2CCED57CFC1E113
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Continuouslybinary
MD5:66FCC86A459D9A66A7212D782E0E4000
SHA256:E47FECBA089A1238CF18E1F8D800B8AA6B55CF9ED6507151E3DC7BC30E745366
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Volleyballbinary
MD5:81593FE9552EBD41B101594803B5B05B
SHA256:51239DE886ABD74500271A551A9CD71BFD797DAA27013B67358143F3CCE51568
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Assumesbinary
MD5:660487E66B95896B91890782F23F9F88
SHA256:0F91596482EFA2254CEAD192E02F99ED8971277FE767EC06A6A146B08015F4DD
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Portablebinary
MD5:E0250E98982AF4B0DE776428470F7D86
SHA256:58F3597288C431EE731561A063364DA5BE67B9684EEDB5C6CF99F75D9E80442D
7856cmd.exeC:\Users\admin\AppData\Local\Temp\Decide.jar.battext
MD5:89C543FDCF5029E8A2699C214E9794C6
SHA256:C6294C4B72D2F1EC0CE9C739618EFE8EE6C235BF027A13F896D102F35D1142E2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
28
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6436
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8172
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 23.215.0.132
  • 23.215.0.133
  • 96.7.128.186
  • 96.7.128.192
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.73
  • 40.126.31.128
  • 20.190.159.71
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

No threats detected
No debug info