| File name: | Dark DDoser 5.6.7z |
| Full analysis: | https://app.any.run/tasks/a2dbeb60-1832-4304-a233-a9ec16d9c697 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | August 03, 2024, 11:28:34 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | CADB6745ACD942FC5CA18CE47C3812E5 |
| SHA1: | 515900157F142014F16378A636CF2221B4737BA0 |
| SHA256: | 9211048FAC48E4099BB134C58E838F00F014CE9C5F217CE20800430E4DDE09E3 |
| SSDEEP: | 98304:eFdd0jgHubd5iZg5ky1+Wm/4+F+xVTfLvSFrRQ8GjTNurf7H5RrBLG5Na5Zv/P6r:Fr0Rci6bkngI3WVG0hUS |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 904 | "C:\Windows\IMF\Secure System Shell.exe" | C:\Windows\IMF\Secure System Shell.exe | — | Windows Services.exe | |||||||||||
User: admin Integrity Level: HIGH Description: Secure System Shell Version: 1.0.0.0 Modules
| |||||||||||||||
| 1372 | "C:\Users\admin\Desktop\DaRKDDoSeR.exe" | C:\Users\admin\Desktop\DaRKDDoSeR.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Launcher Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2476 | "C:\Users\admin\Desktop\plugin\Launcher.exe" | C:\Users\admin\Desktop\plugin\Launcher.exe | DaRKDDoSeR.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Launcher Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 4060 | "C:\Users\admin\Desktop\plugin\ddos.exe" | C:\Users\admin\Desktop\plugin\ddos.exe | DaRKDDoSeR.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 4576 | "C:\Windows\IMF\Windows Services.exe" {Arguments If Needed} | C:\Windows\IMF\Windows Services.exe | — | Launcher.exe | |||||||||||
User: admin Integrity Level: HIGH Description: Windows Services Version: 1.0.0.0 Modules
| |||||||||||||||
| 5760 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Dark DDoser 5.6.7z" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 5904 | "C:\Windows\IMF\Runtime Explorer.exe" | C:\Windows\IMF\Runtime Explorer.exe | Windows Services.exe | ||||||||||||
User: admin Company: Microsoft Windows Integrity Level: HIGH Version: 1.00 Modules
| |||||||||||||||
| 5920 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\ | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | Launcher.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6960 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4060 -s 1752 | C:\Windows\SysWOW64\WerFault.exe | — | ddos.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Dark DDoser 5.6.7z | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (5760) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (1372) DaRKDDoSeR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1372) DaRKDDoSeR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\14.bmp | image | |
MD5:8261739FAA68F5C8A3F6A45EE45276FA | SHA256:211AD3E4F8D270858E9C0C410633E1880C94128E7DA278CC22196733BBC471CB | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\13.bmp | image | |
MD5:B6DB286CA15CB80463FD1CD1629FE23A | SHA256:79137DE6A970BF6EE79516C70F86EAB315301BAB669DF3E2C793F316FBA5203A | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\12.bmp | image | |
MD5:91594D96ADAA27F4A484EB75BD220C2C | SHA256:BE037F3B33BABAE652926EDEE9F5E9F2999237CEE419484627C30D26DFF5146B | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\11.bmp | image | |
MD5:A8AE7C4A4A48ECA0A83F00D35BC6BC74 | SHA256:D89EEA2415F3161BD8B1A3A4AD659E6496133D710A855886686790A26C261019 | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\5.png | image | |
MD5:549A83BE6E9D72872FCD72F870AE428C | SHA256:285595396F38E6C207541BD5F9FD7EB51BB60CBCCF75A5F477CA87466377263A | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\10.bmp | image | |
MD5:E2E6C474C58C8A5458DCFA4D80872231 | SHA256:4EF049502058EA0FC78B04240605422910CE3832F7DDD34660F559E56D0C3DB7 | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\15.bmp | image | |
MD5:AA7A166E688FDE5D0AE4B9241796D9FD | SHA256:582459066FEDCEED314AFE3696E5953FD8F2ECD4654CD2E9979EF3C0AA29C793 | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\8.bmp | image | |
MD5:1D12B09EC2FCE0B67F94E2AA49542117 | SHA256:126FB51131AC34F2A1874FAB354B2EC639989828A36C08732B1FD29BF331D5AC | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\3.bmp | image | |
MD5:4D8D2B52807027B43CA07D187D29BD61 | SHA256:3090E3928FA23D296EA8322BB7EC152CFDDBF19009ECB6FDC1C9742C01E94F78 | |||
| 5760 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa5760.36322\Backgrounds\2.bmp | image | |
MD5:786643E8CF256C39059B1AB5BF1411B1 | SHA256:76DF94F9E199FA03A027FDE2581050DF9D76C60D1614C709550DF10D55A2F6E0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6628 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6664 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
4060 | ddos.exe | GET | 200 | 104.21.42.154:80 | http://www.formyip.com/ | unknown | — | — | malicious |
4060 | ddos.exe | GET | 200 | 104.21.42.154:80 | http://www.formyip.com/ | unknown | — | — | malicious |
4060 | ddos.exe | GET | 404 | 142.250.184.206:80 | http://google.com/TOW/Beta/portal/?version&v=5 | unknown | — | — | whitelisted |
4060 | ddos.exe | GET | 404 | 142.250.184.206:80 | http://google.com/TOW/Beta/portal/?info=TOW&info2=Foryouonly&v=5 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3208 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2536 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
5336 | SearchApp.exe | 92.123.104.16:443 | www.bing.com | Akamai International B.V. | DE | unknown |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
— | — | 40.126.32.133:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
— | — | 40.113.103.199:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 92.123.104.53:443 | th.bing.com | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET POLICY Observed IP Lookup Domain (formyip .com in DNS Lookup) |
4060 | ddos.exe | Possibly Unwanted Program Detected | ET ADWARE_PUP User Agent (TEST) - Likely Webhancer Related Spyware |
4060 | ddos.exe | Possibly Unwanted Program Detected | ET ADWARE_PUP User Agent (TEST) - Likely Webhancer Related Spyware |
4060 | ddos.exe | Possibly Unwanted Program Detected | ET ADWARE_PUP User Agent (TEST) - Likely Webhancer Related Spyware |
4060 | ddos.exe | Possibly Unwanted Program Detected | ET ADWARE_PUP User Agent (TEST) - Likely Webhancer Related Spyware |