analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PornHub.zip

Full analysis: https://app.any.run/tasks/808969e0-d1ea-4d7e-9b2c-29086c1970c9
Verdict: Malicious activity
Threats:

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Analysis date: December 18, 2018, 07:20:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
netwire
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

ADE95C472F5C3ED647B23C85612ED2C7

SHA1:

7E58C8243AC48B38307CC9A78A21976E5FDBC4C5

SHA256:

8E99B33873493FB9DD266C082827835BF09C9EE42EB0FAD48CCAD993D7E4A813

SSDEEP:

12288:yOhM6K035OykxtFGQZjGmd2FXOjKUQ6hwwmS5kMtnlg0WpGGsbhEd3Gs2g6VUcYm:Tlpe/FG4h0wK7Gwwp5gTsbWd3z7hIp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PornHub Checker By LEFTCRACKER.exe (PID: 3300)
      • pornhub.exe (PID: 2580)
      • svchost.exe (PID: 3612)
      • svchost.exe (PID: 2560)
      • pornhub.exe (PID: 3536)
      • svchost.exe (PID: 2712)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1472)
      • PornHub Checker By LEFTCRACKER.exe (PID: 3300)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 2712)
    • NETWIRE was detected

      • svchost.exe (PID: 2712)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • PornHub Checker By LEFTCRACKER .exe (PID: 1316)
      • pornhub.exe (PID: 2580)
    • Application launched itself

      • svchost.exe (PID: 3612)
      • pornhub.exe (PID: 3536)
    • Creates executable files which already exist in Windows

      • pornhub.exe (PID: 2580)
    • Creates files in the user directory

      • pornhub.exe (PID: 2580)
      • svchost.exe (PID: 2712)
    • Connects to unusual port

      • svchost.exe (PID: 2712)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: PornHub/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2018:12:16 05:33:24
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
10
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe no specs pornhub checker by leftcracker  .exe no specs pornhub checker by leftcracker  .exe pornhub checker by leftcracker.exe no specs pornhub.exe no specs pornhub.exe svchost.exe no specs svchost.exe no specs #NETWIRE svchost.exe searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3204"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PornHub.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3532"C:\Users\admin\Desktop\PornHub\Release\PornHub Checker By LEFTCRACKER .exe" C:\Users\admin\Desktop\PornHub\Release\PornHub Checker By LEFTCRACKER .exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Version:
1.0.0.0
1316"C:\Users\admin\Desktop\PornHub\Release\PornHub Checker By LEFTCRACKER .exe" C:\Users\admin\Desktop\PornHub\Release\PornHub Checker By LEFTCRACKER .exe
PornHub Checker By LEFTCRACKER .exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
3300"C:\Users\admin\AppData\Local\Temp\PornHub Checker By LEFTCRACKER.exe" 0C:\Users\admin\AppData\Local\Temp\PornHub Checker By LEFTCRACKER.exePornHub Checker By LEFTCRACKER .exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
PornHub Checker By LEFTCRACKER
Version:
1.0.0.0
3536"C:\Users\admin\AppData\Local\Temp\pornhub.exe" 0C:\Users\admin\AppData\Local\Temp\pornhub.exePornHub Checker By LEFTCRACKER .exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Version:
1.0.0.0
2580"C:\Users\admin\AppData\Local\Temp\pornhub.exe" 0C:\Users\admin\AppData\Local\Temp\pornhub.exe
pornhub.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
3612"C:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exe"C:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exepornhub.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Version:
1.0.0.0
2560"C:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exe"C:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
2712"C:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exe"C:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exe
svchost.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
1472"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Total events
1 104
Read events
1 089
Write events
15
Delete events
0

Modification events

(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3204) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PornHub.zip
(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3204) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1472) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1472) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:@C:\Windows\System32\msxml3r.dll,-1
Value:
XML Document
Executable files
4
Suspicious files
1
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
3204WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3204.16624\PornHub\Release\PornHub Checker By LEFTCRACKER .exe
MD5:
SHA256:
3204WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3204.16624\PornHub\Release\PornHub Checker By LEFTCRACKER.exe.config
MD5:
SHA256:
3204WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3204.16624\PornHub\Release\PornHub Checker By LEFTCRACKER.pdb
MD5:
SHA256:
3204WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3204.16624\PornHub\Release\PornHub Checker By LEFTCRACKER.xml
MD5:
SHA256:
3204WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3204.16624\PornHub\Release\xNet.dll
MD5:
SHA256:
1316PornHub Checker By LEFTCRACKER .exeC:\Users\admin\AppData\Local\Temp\PornHub Checker By LEFTCRACKER.xmlxml
MD5:8ADEA6115D5E48F121B98C137CD213FB
SHA256:6FCC6857869D7653532769216BF8875F928E0F225A93D30DC6A566B6C80F302C
2580pornhub.exeC:\Users\admin\AppData\Roaming\Microsoft\Network\svchost.exeexecutable
MD5:BE31867FE7B0D8F094AD69D10BDBAE31
SHA256:00573B49503471F3AD4D440CDABB023716CA7ABE51E3FC4ADFE6CC5F564E7F15
1316PornHub Checker By LEFTCRACKER .exeC:\Users\admin\AppData\Local\Temp\pornhub.exeexecutable
MD5:BE31867FE7B0D8F094AD69D10BDBAE31
SHA256:00573B49503471F3AD4D440CDABB023716CA7ABE51E3FC4ADFE6CC5F564E7F15
1316PornHub Checker By LEFTCRACKER .exeC:\Users\admin\AppData\Local\Temp\PornHub Checker By LEFTCRACKER.pdbpdb
MD5:A0CFD1E4C7AD28968F3F055B7A82ABB2
SHA256:706C7382DF901A6A4C06FAC4C05FE4D2749803C60CA3FCB22FC5B79140E63A45
1316PornHub Checker By LEFTCRACKER .exeC:\Users\admin\AppData\Local\Temp\PornHub Checker By LEFTCRACKER.exeexecutable
MD5:7F107871C40EC4B6089459313EC97002
SHA256:F98B350039FD082E14BF49D60FFFF358E4B621ACF96A4A15561BFA5469E2276D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2712
svchost.exe
37.228.134.84:8999
playhardgopro.life
Mike Kaldig
DE
suspicious

DNS requests

Domain
IP
Reputation
playhardgopro.life
  • 37.228.134.84
malicious

Threats

PID
Process
Class
Message
2712
svchost.exe
A Network Trojan was detected
SC SPYWARE Spyware Weecnaw Win32
2712
svchost.exe
A Network Trojan was detected
MALWARE [PTsecurity] Netwire.RAT
No debug info