File name:

A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar

Full analysis: https://app.any.run/tasks/a3bb0c21-90c6-4db4-9256-118c84c5f606
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 05, 2025, 23:23:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
vidar
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

74CF337403EF0E7B416BD48AFC72F869

SHA1:

99E7342CFCFDE538A9F1F373DC235168E6B7792E

SHA256:

833F12183AF9296BFC885379E7441981387FFBB78B010C0F35B3234899BA99BD

SSDEEP:

49152:UBw4vt6pEQOszANOnjrKFW+ph0qjZBf0zzarVfo46P/xQ8up9fF8nySbaE80PI:CBvQEQOOjmFW+Bgzam4wx/uPN8ySbaEy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • VIDAR mutex has been found

      • Wake.com (PID: 904)
    • Steals credentials from Web Browsers

      • Wake.com (PID: 904)
    • Actions looks like stealing of personal data

      • Wake.com (PID: 904)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • WinRAR.exe (PID: 6652)
      • Wake.com (PID: 904)
    • Executing commands from a ".bat" file

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Starts CMD.EXE for commands execution

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • cmd.exe (PID: 7856)
    • There is functionality for taking screenshot (YARA)

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
    • Get information on the list of running processes

      • cmd.exe (PID: 7856)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7856)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7856)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7856)
    • The executable file from the user directory is run by the CMD process

      • Wake.com (PID: 904)
    • Application launched itself

      • cmd.exe (PID: 7856)
    • Searches for installed software

      • Wake.com (PID: 904)
  • INFO

    • Manual execution by a user

      • mspaint.exe (PID: 7712)
    • Create files in a temporary directory

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
    • Checks supported languages

      • extrac32.exe (PID: 8184)
      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • Wake.com (PID: 904)
    • Reads the computer name

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
      • extrac32.exe (PID: 8184)
      • Wake.com (PID: 904)
    • Creates a new folder

      • cmd.exe (PID: 8152)
    • Reads mouse settings

      • Wake.com (PID: 904)
    • Creates files in the program directory

      • Wake.com (PID: 904)
    • Checks proxy server information

      • Wake.com (PID: 904)
    • Reads the software policy settings

      • Wake.com (PID: 904)
    • Creates files or folders in the user directory

      • Wake.com (PID: 904)
    • Reads the machine GUID from the registry

      • Wake.com (PID: 904)
    • Reads Environment values

      • Wake.com (PID: 904)
    • Reads CPU info

      • Wake.com (PID: 904)
    • Application launched itself

      • chrome.exe (PID: 4988)
    • Reads product name

      • Wake.com (PID: 904)
    • Process checks computer location settings

      • A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe (PID: 7676)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 932208
UncompressedSize: 826285970
OperatingSystem: Win32
ArchivedFileName: A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
20
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe no specs a minecraft movie 2025.1080p.hd.x264.dual.yg.exe no specs mspaint.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #VIDAR wake.com choice.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904Wake.com T C:\Users\admin\AppData\Local\Temp\714380\Wake.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\714380\wake.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
1052cmd /c copy /b 714380\Wake.com + Valuable + Concert + Cap + Continuously + Portable + Electro + Volleyball + Alien + Convicted + Acids + Assumes 714380\Wake.comC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4008choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
4988"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"C:\Program Files\Google\Chrome\Application\chrome.exeWake.com
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5392cmd /c copy /b ..\Revelation.jar + ..\Keyboard.jar + ..\Ellis.jar + ..\Leaves.jar + ..\Grass.jar T C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5640findstr /V "prague" Mean C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
6652"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6872"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffc8940dc40,0x7ffc8940dc4c,0x7ffc8940dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7184C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7216"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
6 818
Read events
6 804
Write events
14
Delete events
0

Modification events

(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.rar
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(904) Wake.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(904) Wake.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
0
Suspicious files
23
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6652WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6652.23750\A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exe
MD5:
SHA256:
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Decide.jartext
MD5:89C543FDCF5029E8A2699C214E9794C6
SHA256:C6294C4B72D2F1EC0CE9C739618EFE8EE6C235BF027A13F896D102F35D1142E2
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Capbinary
MD5:CB5F79BAD95267E6B90E10E1F39BF482
SHA256:B9307386E191EB406BE2A9710BC647D8CC4440A008D59763819DB9795CFFACC0
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Volleyballbinary
MD5:81593FE9552EBD41B101594803B5B05B
SHA256:51239DE886ABD74500271A551A9CD71BFD797DAA27013B67358143F3CCE51568
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Portablebinary
MD5:E0250E98982AF4B0DE776428470F7D86
SHA256:58F3597288C431EE731561A063364DA5BE67B9684EEDB5C6CF99F75D9E80442D
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Continuouslybinary
MD5:66FCC86A459D9A66A7212D782E0E4000
SHA256:E47FECBA089A1238CF18E1F8D800B8AA6B55CF9ED6507151E3DC7BC30E745366
7856cmd.exeC:\Users\admin\AppData\Local\Temp\Decide.jar.battext
MD5:89C543FDCF5029E8A2699C214E9794C6
SHA256:C6294C4B72D2F1EC0CE9C739618EFE8EE6C235BF027A13F896D102F35D1142E2
7676A Minecraft Movie 2025.1080p.HD.X264.Dual.YG.exeC:\Users\admin\AppData\Local\Temp\Revelation.jarbinary
MD5:0E41EB14F9965DB0C100D8E5ABA50093
SHA256:42CA0EC158F0F354CBAAB987BC677C4A0FBA0340BC37F6E3A2CCED57CFC1E113
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Valuablebinary
MD5:AF14A5491F7292A42135BE31CDCE062A
SHA256:BE5878CDA3A9EE7A1411E0E67250CC7E9712794D3B46F44E6C1AA1D6A3C9A729
8184extrac32.exeC:\Users\admin\AppData\Local\Temp\Alienbinary
MD5:E80885734F528D40101EC33FB6A1F269
SHA256:855C3D8E3A8028239AD5CA1A54460DD43A720EC2762702079B8F577CC07ECFA3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
28
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
6436
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8172
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6436
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8172
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 23.215.0.132
  • 23.215.0.133
  • 96.7.128.186
  • 96.7.128.192
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.73
  • 40.126.31.128
  • 20.190.159.71
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

No threats detected
No debug info