File name:

Inferno Stresser[3.1].zip

Full analysis: https://app.any.run/tasks/fca0bf63-837b-4f62-b7dc-8bb6667ee295
Verdict: Malicious activity
Analysis date: May 15, 2019, 07:49:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F3D7C89D4BE9EE88B267E9F15FF83E30

SHA1:

3957C08B6B79101A21DB8563D69C56B2689F79AD

SHA256:

90E5ECD5BF7CCEC925A0001199F66AC456459F8E55237F0EE672CF223E6B1F1A

SSDEEP:

196608:ceMVWiRvQ09RYNu5W3UEdcHXLZSo0hKAKdIzJOZOMxzwwerIRnCziaD0aB8GNKru:CVWS4SYc5W3zyLV0RKdgJKDzwwe8RuRD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Inferno Stresser[3.1].exe (PID: 2504)
      • SearchProtocolHost.exe (PID: 3824)
    • Application was dropped or rewritten from another process

      • Inferno Stresser[3.1].exe (PID: 2504)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3244)
      • Inferno Stresser[3.1].exe (PID: 2504)
    • Reads Environment values

      • Inferno Stresser[3.1].exe (PID: 2504)
    • Creates files in the user directory

      • Inferno Stresser[3.1].exe (PID: 2504)
    • Reads Internet Cache Settings

      • Inferno Stresser[3.1].exe (PID: 2504)
    • Reads internet explorer settings

      • Inferno Stresser[3.1].exe (PID: 2504)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2018:05:20 11:00:16
ZipCRC: 0x28fb05f0
ZipCompressedSize: 10858385
ZipUncompressedSize: 11379200
ZipFileName: Inferno Stresser[3.1].exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe notepad.exe no specs inferno stresser[3.1].exe notepad.exe no specs notepad.exe no specs searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1860"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIb3244.18683\IT WONT OPEN IF YOU FORGET EXTRACT geckofx-13.dll TO THE SAME FOLDER!!!.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2148"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIb3244.11892\[Password Inside][ReadME].txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2504"C:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\Inferno Stresser[3.1].exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\Inferno Stresser[3.1].exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Inferno-Stresser
Exit code:
0
Version:
3.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3244.14712\inferno stresser[3.1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3128"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIb3244.17667\GIVE IT AT LEAST 60s TO OPEN BEFORE YOU START SPAM CLICKING IT, THERE IS A LOT TO LOAD SO GIVE IT TIME.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3244"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Inferno Stresser[3.1].zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3824"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
1 217
Read events
1 134
Write events
83
Delete events
0

Modification events

(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3244) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Inferno Stresser[3.1].zip
(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3244) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3244) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(2148) NOTEPAD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
66
Executable files
39
Suspicious files
7
Text files
61
Unknown types
1

Dropped files

PID
Process
Filename
Type
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3244.11892\[Password Inside][ReadME].txttext
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\IT WONT OPEN IF YOU FORGET EXTRACT geckofx-13.dll TO THE SAME FOLDER!!!.txttext
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\geckofx-13.dllexecutable
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3244.17667\GIVE IT AT LEAST 60s TO OPEN BEFORE YOU START SPAM CLICKING IT, THERE IS A LOT TO LOAD SO GIVE IT TIME.txttext
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb3244.18683\IT WONT OPEN IF YOU FORGET EXTRACT geckofx-13.dll TO THE SAME FOLDER!!!.txttext
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\[Password Inside][ReadME].txttext
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\Inferno Stresser[3.1].exeexecutable
MD5:
SHA256:
3244WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3244.14712\GIVE IT AT LEAST 60s TO OPEN BEFORE YOU START SPAM CLICKING IT, THERE IS A LOT TO LOAD SO GIVE IT TIME.txttext
MD5:
SHA256:
2504Inferno Stresser[3.1].exeC:\Users\admin\AppData\Roaming\xul.zipcompressed
MD5:
SHA256:
2504Inferno Stresser[3.1].exeC:\Users\admin\AppData\Roaming\xulrunner\freebl3.chkbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
22
DNS requests
13
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2504
Inferno Stresser[3.1].exe
GET
200
172.104.29.90:80
http://www.supercounters.com/css/print.css
US
text
671 b
malicious
2504
Inferno Stresser[3.1].exe
GET
404
104.31.65.8:80
http://inferno-stress.com/account/sys_cpanel/images/bottombody.jpg
US
html
959 b
suspicious
2504
Inferno Stresser[3.1].exe
GET
200
172.104.29.90:80
http://www.supercounters.com/online/1029205
US
binary
4.33 Kb
malicious
2504
Inferno Stresser[3.1].exe
GET
200
172.217.21.194:80
http://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
US
text
75.8 Kb
whitelisted
2504
Inferno Stresser[3.1].exe
GET
200
172.104.29.90:80
http://www.supercounters.com/js/jquery-1.6.1.min.js
US
html
89.2 Kb
malicious
2504
Inferno Stresser[3.1].exe
GET
200
172.104.29.90:80
http://www.supercounters.com/js/g.js
US
text
2.70 Kb
malicious
2504
Inferno Stresser[3.1].exe
GET
200
23.210.248.44:80
http://s7.addthis.com/js/300/addthis_widget.js
NL
text
109 Kb
whitelisted
2504
Inferno Stresser[3.1].exe
GET
200
172.217.21.194:80
http://pagead2.googlesyndication.com/pagead/show_ads.js
US
text
23.2 Kb
whitelisted
2504
Inferno Stresser[3.1].exe
GET
404
104.31.65.8:80
http://inferno-stress.com/account/
US
html
956 b
suspicious
2504
Inferno Stresser[3.1].exe
GET
200
172.104.29.90:80
http://www.supercounters.com/js/stats.js
US
html
7.26 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2504
Inferno Stresser[3.1].exe
172.217.21.194:80
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
23.210.248.44:80
s7.addthis.com
Akamai International B.V.
NL
whitelisted
2504
Inferno Stresser[3.1].exe
13.35.250.7:443
ftp.mozilla.org
US
suspicious
2504
Inferno Stresser[3.1].exe
172.217.23.130:443
googleads.g.doubleclick.net
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
172.217.16.206:443
apis.google.com
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
172.217.18.174:80
www.google-analytics.com
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
172.217.22.100:443
www.google.com
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
66.102.1.157:443
stats.g.doubleclick.net
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
216.58.207.67:443
www.google.be
Google Inc.
US
whitelisted
2504
Inferno Stresser[3.1].exe
172.217.21.194:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
ftp.mozilla.org
  • 13.35.250.7
whitelisted
swaggy-freddy.in
unknown
inferno-stress.com
  • 104.31.65.8
  • 104.31.64.8
suspicious
www.supercounters.com
  • 172.104.29.90
malicious
pagead2.googlesyndication.com
  • 172.217.21.194
whitelisted
s7.addthis.com
  • 23.210.248.44
whitelisted
googleads.g.doubleclick.net
  • 172.217.23.130
whitelisted
connect.facebook.net
  • 157.240.20.19
whitelisted
apis.google.com
  • 172.217.16.206
whitelisted
www.google-analytics.com
  • 172.217.18.174
whitelisted

Threats

PID
Process
Class
Message
2504
Inferno Stresser[3.1].exe
Misc activity
SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7)
Process
Message
Inferno Stresser[3.1].exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s