analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://github.com/Itroublve/ItroublveTSC/releases/download/6.1/ItroublveTSC.v6.Fix.7.2.rar

Full analysis: https://app.any.run/tasks/c7a6e741-6934-43a5-8499-9903e7d09cc8
Verdict: Malicious activity
Analysis date: August 19, 2021, 07:35:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

ABA4D566D8D35A2B0BAC7D8D4CECBC06

SHA1:

052BA2CC0F5D0F0F408FEBF8CFD00390A1DDBA8B

SHA256:

9E58F28797037740CCB580D98CCD938FC97AD5902822C134177E845EEB594825

SSDEEP:

3:N8tEdSzdgdU2KJMkCTPpSdU2QLWSjLO:2ukSvSMb4vQLBLO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3864)
    • Application was dropped or rewritten from another process

      • ItroublveTSC.exe (PID: 2372)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 1808)
      • ItroublveTSC.exe (PID: 2372)
    • Reads the computer name

      • WinRAR.exe (PID: 1808)
      • ItroublveTSC.exe (PID: 2372)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1256)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1808)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 1808)
    • Reads Environment values

      • ItroublveTSC.exe (PID: 2372)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 3820)
    • Reads the computer name

      • iexplore.exe (PID: 3820)
      • iexplore.exe (PID: 1256)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 3820)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1256)
    • Changes internet zones settings

      • iexplore.exe (PID: 3820)
    • Application launched itself

      • iexplore.exe (PID: 3820)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3820)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3820)
      • iexplore.exe (PID: 1256)
    • Manual execution by user

      • ItroublveTSC.exe (PID: 2372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe no specs iexplore.exe winrar.exe searchprotocolhost.exe no specs itroublvetsc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3820"C:\Program Files\Internet Explorer\iexplore.exe" "https://github.com/Itroublve/ItroublveTSC/releases/download/6.1/ItroublveTSC.v6.Fix.7.2.rar"C:\Program Files\Internet Explorer\iexplore.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
1256"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3820 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
1808"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\ItroublveTSC.v6.Fix.7.2.rar"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3864"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe9_ Global\UsGthrCtrlFltPipeMssGthrPipe9 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2372"C:\Users\admin\Desktop\ItroublveTSC.exe" C:\Users\admin\Desktop\ItroublveTSC.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
ItroublveTSC
Version:
6.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\itroublvetsc.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
10 177
Read events
10 067
Write events
109
Delete events
1

Modification events

(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30905548
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30905548
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3820) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
14
Suspicious files
10
Text files
29
Unknown types
7

Dropped files

PID
Process
Filename
Type
3864SearchProtocolHost.exeC:\Users\admin\Downloads\ItroublveTSC.v6.Fix.7.2.rar.w3k3vsc.partial
MD5:
SHA256:
3820iexplore.exeC:\Users\admin\Downloads\ItroublveTSC.v6.Fix.7.2.rar
MD5:
SHA256:
3820iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFA81A76490C3CD090.TMPgmc
MD5:73904F3A9BB57C737E34E3154086E48B
SHA256:67FD7149D36A05E16170E49A967DC1E46C6F4892C39DB1DBA117595D41FA19D6
1256iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ItroublveTSC.v6.Fix.7.2[1].rarcompressed
MD5:68581AEFDEE94C3058B351B22FF1AC1D
SHA256:EE188E7220883E4F73FC4BDC79E6B23733FAEFE62FD26C9DD5B94322B6D47A98
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_3D5FFC72733D0751B94B517D33876F5Bder
MD5:9E6B0B8BF0C061A02E7ECCF679543515
SHA256:388CEDF0F62300ADDE5FBCC81CE6CA101F481785A263A67F49FE7ED4EEE2322F
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3der
MD5:B39E36668BD187891BFE9AEEB59477B3
SHA256:225F9BD244F981D71D06690B182DC48C561599305A4D07EE29664A8A44E47074
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:C6459F4BF4E4C4E43BFA5D5B7AA9D0C6
SHA256:D07A02055DA25A40EE67F426D94423BD4CAA8F95EEB5C6C6BD095157BA564056
3820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{12A2CEA6-00C0-11EC-A146-12A9866C77DE}.datbinary
MD5:533C2F616B0CDAB078B55FBA92A2472B
SHA256:B086B510D0FFF39B42F20B1D83CFA086E75EA6AADAC918FCB9A3F7B17DA60376
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:EB44B546577176D28374A34AD8475C10
SHA256:9BF0B4C91C4B46EE1BC83E3922AD209FEFFD812CD827D48843D0A3E6F45529BE
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1der
MD5:F1416C48E43BE64DCAB622893DB4C3B1
SHA256:E96992BACDE76028CD3C86B2DD250E39FBB54DD059537573A3FE523956FFC496
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
8
DNS requests
6
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1672
svchost.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ed53382d525bee76
US
whitelisted
1256
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
1256
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAJJPgf6njdaLbvGHZRDD88%3D
US
der
471 b
whitelisted
1256
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTGMlruL6P9M9B3if1rTM7wyj%2FQKQQUUGGmoNI1xBEqII0fD6xC8M0pz0sCEA6L83cNktGW8Lth%2BTxBZr4%3D
US
der
280 b
whitelisted
1256
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAZnA1u7FP1jr8DWqFNO%2FhY%3D
US
der
471 b
whitelisted
1256
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?cc400e3b380bef51
US
compressed
4.70 Kb
whitelisted
1256
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9faa5d4c18e82370
US
compressed
4.70 Kb
whitelisted
1672
svchost.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0968e9df1e2aec06
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1256
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1256
iexplore.exe
185.199.110.154:443
github-releases.githubusercontent.com
GitHub, Inc.
NL
suspicious
1256
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1672
svchost.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1256
iexplore.exe
140.82.121.3:443
github.com
US
suspicious

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.121.3
shared
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
github-releases.githubusercontent.com
  • 185.199.110.154
  • 185.199.111.154
  • 185.199.108.154
  • 185.199.109.154
whitelisted
itroublvehacker.gq
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .gq Domain
No debug info