| File name: | CryptoRipper v1.0.zip |
| Full analysis: | https://app.any.run/tasks/8b8b8bfb-1868-45dc-b7d1-ac5db324a708 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | September 01, 2024, 22:09:40 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | 0CD0D3FB921F5457BB4FAE22C1752477 |
| SHA1: | 05D513BA4F76ECBDC819577A6B7008DC38223C4C |
| SHA256: | 9B9EF99293591F149691116D16B76E87970059D06BA94EF462FBFC8ED910E2E5 |
| SSDEEP: | 98304:xk6nVGSBz2wvFOjhfHw1F3Rd8qt1rY7qFrUTApPCRzJdvMRplO9uGwcpRXd5Ywu8:xkWdBLKFnQGtF2A |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:08:30 04:58:36 |
| ZipCRC: | 0x237d5886 |
| ZipCompressedSize: | 6107606 |
| ZipUncompressedSize: | 6278539 |
| ZipFileName: | CryptoRipper v1.0.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1640 | "C:\Users\admin\Desktop\CryptoRipper v1.0.exe" | C:\Users\admin\Desktop\CryptoRipper v1.0.exe | CryptoRipper v1.0.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225786 Modules
| |||||||||||||||
| 1920 | "C:\Users\admin\Desktop\CryptoRipper v1.0.exe" | C:\Users\admin\Desktop\CryptoRipper v1.0.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225786 Modules
| |||||||||||||||
| 2128 | C:\Users\admin\AppData\Local\Temp\temp_nik_zbi.exe | C:\Users\admin\AppData\Local\Temp\temp_nik_zbi.exe | CryptoRipper v1.0.exe | ||||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Description: Services.exe Exit code: 0 Version: 1.2.0.1 Modules
| |||||||||||||||
| 3660 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4344 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4552 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4980 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\CryptoRipper v1.0.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 5048 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | CryptoRipper v1.0.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5064 | "C:\WINDOWS\system32\taskmgr.exe" /4 | C:\Windows\System32\Taskmgr.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Manager Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5104 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (4552) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000007039A |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456033BCEE44DE41B4E8AEC331E84F566D2 | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\CryptoRipper v1.0.zip | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (4980) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (4552) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4552 | explorer.exe | C:\Users\admin\Desktop\good.txt | — | |
MD5:— | SHA256:— | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\_lzma.pyd | executable | |
MD5:37057C92F50391D0751F2C1D7AD25B02 | SHA256:9442DC46829485670A6AC0C02EF83C54B401F1570D1D5D1D85C19C1587487764 | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\_bz2.pyd | executable | |
MD5:3DC8AF67E6EE06AF9EEC52FE985A7633 | SHA256:C55821F5FDB0064C796B2C0B03B51971F073140BC210CBE6ED90387DB2BED929 | |||
| 4980 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa4980.40314\CryptoRipper v1.0.exe | executable | |
MD5:B047E7DD9459142C1D1D57DE29DA7A8F | SHA256:A2DA42E80F1FEE72A4552902D16EE11134D2C5E05EC996935A4CE01C08CC760C | |||
| 4552 | explorer.exe | C:\Users\admin\Desktop\CryptoRipper v1.0.exe | executable | |
MD5:B047E7DD9459142C1D1D57DE29DA7A8F | SHA256:A2DA42E80F1FEE72A4552902D16EE11134D2C5E05EC996935A4CE01C08CC760C | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\api-ms-win-core-debug-l1-1-0.dll | executable | |
MD5:33BBECE432F8DA57F17BF2E396EBAA58 | SHA256:7CF0944901F7F7E0D0B9AD62753FC2FE380461B1CCE8CDC7E9C9867C980E3B0E | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\VCRUNTIME140.dll | executable | |
MD5:0E675D4A7A5B7CCD69013386793F68EB | SHA256:BF5FF4603557C9959ACEC995653D052D9054AD4826DF967974EFD2F377C723D1 | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\api-ms-win-core-errorhandling-l1-1-0.dll | executable | |
MD5:EB0978A9213E7F6FDD63B2967F02D999 | SHA256:AB25A1FE836FC68BCB199F1FE565C27D26AF0C390A38DA158E0D8815EFE1103E | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\api-ms-win-core-file-l2-1-0.dll | executable | |
MD5:BFFFA7117FD9B1622C66D949BAC3F1D7 | SHA256:1EA267A2E6284F17DD548C6F2285E19F7EDB15D6E737A55391140CE5CB95225E | |||
| 1920 | CryptoRipper v1.0.exe | C:\Users\admin\AppData\Local\Temp\_MEI19202\_ctypes.pyd | executable | |
MD5:F1E33A8F6F91C2ED93DC5049DD50D7B8 | SHA256:9459D246DF7A3C638776305CF3683946BA8DB26A7DE90DF8B60E1BE0B27E53C4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1640 | CryptoRipper v1.0.exe | GET | 200 | 176.111.174.140:80 | http://176.111.174.140/nuke.exe | unknown | — | — | unknown |
5400 | svchost.exe | GET | 200 | 176.111.174.140:80 | http://176.111.174.140/vvTBswN.php | unknown | — | — | unknown |
5400 | svchost.exe | GET | 200 | 176.111.174.140:80 | http://176.111.174.140/api/update.pack | unknown | — | — | unknown |
5400 | svchost.exe | GET | 200 | 176.111.174.140:80 | http://176.111.174.140/api/update2.pack | unknown | — | — | unknown |
4552 | explorer.exe | POST | 200 | 176.111.174.140:80 | http://176.111.174.140/api.php?{2F33566DA0B91573532102} | unknown | — | — | unknown |
4552 | explorer.exe | POST | 200 | 176.111.174.140:80 | http://176.111.174.140/api.php?{2F33566DA0B91573532102} | unknown | — | — | unknown |
4552 | explorer.exe | POST | 200 | 176.111.174.140:80 | http://176.111.174.140/api.php?{2F33566DA0B91573532102} | unknown | — | — | unknown |
3272 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
3272 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
3652 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
7008 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2120 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6020 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
7008 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1640 | CryptoRipper v1.0.exe | 176.111.174.140:80 | — | Chang Way Technologies Co. Limited | RU | malicious |
5400 | svchost.exe | 176.111.174.140:80 | — | Chang Way Technologies Co. Limited | RU | malicious |
4552 | explorer.exe | 176.111.174.140:80 | — | Chang Way Technologies Co. Limited | RU | malicious |
3260 | svchost.exe | 40.113.103.199:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1640 | CryptoRipper v1.0.exe | Attempted Information Leak | ET POLICY Python-urllib/ Suspicious User Agent |
1640 | CryptoRipper v1.0.exe | Misc activity | ET INFO Packed Executable Download |
1640 | CryptoRipper v1.0.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
1640 | CryptoRipper v1.0.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1640 | CryptoRipper v1.0.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 30 |
1640 | CryptoRipper v1.0.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
5400 | svchost.exe | A suspicious filename was detected | ET HUNTING Terse Named Filename EXE Download - Possibly Hostile |
5400 | svchost.exe | Misc activity | ET INFO EXE - Served Inline HTTP |
5400 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
5400 | svchost.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |