| File name: | archive.zip |
| Full analysis: | https://app.any.run/tasks/d555d89a-f047-4687-aac1-d728a3ceb182 |
| Verdict: | Malicious activity |
| Threats: | PrivateLoader is a malware family that is specifically created to infect computer systems and drop additional malicious programs. It operates using a pay-per-install business model, which means that the individuals behind it are paid for each instance of successful deployment of different types of harmful programs, including trojans, stealers, and other ransomware. |
| Analysis date: | July 24, 2024, 12:39:27 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | 1C4D4C0E6F6A93464E453FF974082DEE |
| SHA1: | B03EB716EE3FA8CD6FD13D801C53FFFAEE6DD615 |
| SHA256: | A04DD35B68FE732930D0D22D08020374FF6AF450A91231EB7DE4BAAFA3F4E00E |
| SSDEEP: | 98304:/sm68/oADb9YruubYbyGSs81bG/ZS9wmDQPkIAyubijWojdeKq0oYOQBveJ6fVz0:3EwbG8MgJb7r4oUpfpX |
| .zip | | | ZIP compressed archive (99.9) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:07:24 14:31:52 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | archive/ |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 1008 | "C:\Users\admin\Desktop\archive\File.exe" | C:\Users\admin\Desktop\archive\File.exe | — | explorer.exe |
User: admin Integrity Level: MEDIUM Exit code: 3221226540 | ||||
| 1164 | C:\Users\admin\Documents\piratemamm\jrDUrAHNKxBLsDh8ZbyZBkJt.exe | C:\Users\admin\Documents\piratemamm\jrDUrAHNKxBLsDh8ZbyZBkJt.exe | — | File.exe |
User: admin Company: Integrity Level: HIGH Description: Mobile Media Converter Setup Exit code: 1 Version: | ||||
| 1568 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 1800 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | QlOCbkYUHcZrZiQOrSV5kgHj.exe | |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: MSBuild.exe Version: 4.8.9037.0 built by: NET481REL1 Vidar(PID) Process(1800) MSBuild.exe C2https://t.me/armad2a URLhttps://steamcommunity.com/profiles/76561199747278259 Strings (310)INSERT_KEY_HERE GetEnvironmentVariableA shlwapi.dll InternetConnectA FALSE %d/%d/%d %d:%d:%d Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ DialogConfig.vdf GetProcAddress LoadLibrary lstrcatA OpenEventA CreateEventA CloseHandle Sleep GetUserDefaultLangID VirtualAllocExNuma VirtualFree GetSystemInfo VirtualAlloc HeapAlloc GetComputerNameA lstrcpyA GetProcessHeap GetCurrentProcess lstrlenA ExitProcess GlobalMemoryStatusEx GetSystemTime SystemTimeToFileTime advapi32.dll gdi32.dll user32.dll crypt32.dll ntdll.dll GetUserNameA CreateDCA GetDeviceCaps CryptStringToBinaryA sscanf NtQueryInformationProcess VMwareVMware HAL9TH JohnDoe DISPLAY %hu/%hu/%hu GetFileAttributesA GlobalLock HeapFree GetFileSize GlobalSize CreateToolhelp32Snapshot IsWow64Process Process32Next GetLocalTime FreeLibrary GetTimeZoneInformation GetSystemPowerStatus GetVolumeInformationA GetWindowsDirectoryA Process32First GetLocaleInfoA GetUserDefaultLocaleName GetModuleFileNameA DeleteFileA FindNextFileA LocalFree FindClose SetEnvironmentVariableA LocalAlloc GetFileSizeEx ReadFile SetFilePointer WriteFile CreateFileA FindFirstFileA VirtualProtect GetLogicalProcessorInformationEx GetLastError lstrcpynA MultiByteToWideChar GlobalFree WideCharToMultiByte GlobalAlloc OpenProcess TerminateProcess GetCurrentProcessId gdiplus.dll ole32.dll bcrypt.dll wininet.dll shell32.dll psapi.dll rstrtmgr.dll CreateCompatibleBitmap SelectObject BitBlt DeleteObject CreateCompatibleDC GdipGetImageEncodersSize GdipGetImageEncoders GdipCreateBitmapFromHBITMA GdiplusStartup GdiplusShutdown GdipSaveImageToStream GdipDisposeImage GdipFree GetHGlobalFromStream CreateStreamOnHGlobal CoUninitialize CoInitialize CoCreateInstance BCryptGenerateSymmetricKey BCryptCloseAlgorithmProvider BCryptDecrypt BCryptSetProperty BCryptDestroyKey BCryptOpenAlgorithmProvider GetWindowRect GetDesktopWindow GetDC wsprintfA EnumDisplayDevicesA GetKeyboardLayoutList CharToOemW wsprintfW RegQueryValueExA RegEnumKeyExA RegOpenKeyExA RegCloseKey RegEnumValueA CryptBinaryToStringA CryptUnprotectData SHGetFolderPathA ShellExecuteExA InternetOpenUrlA InternetCloseHandle InternetOpenA HttpSendRequestA HttpOpenRequestA InternetReadFile InternetCrackUrlA StrCmpCA StrStrA StrCmpCW PathMatchSpecA GetModuleFileNameExA RmStartSession RmRegisterResources RmGetList RmEndSession sqlite3_open sqlite3_prepare_v2 sqlite3_step sqlite3_column_text sqlite3_finalize sqlite3_close sqlite3_column_bytes sqlite3_column_blob encrypted_key PATH C:\ProgramData\nss3.dll NSS_Init NSS_Shutdown PK11_GetInternalKeySlot PK11_FreeSlot PK11SDR_Decrypt C:\ProgramData\ SELECT origin_url, username_value, password_value FROM logins Soft: profile: Host: Login: Password: Opera OperaGX Network Cookies .txt SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies TRUE Autofill SELECT name, value FROM autofill History SELECT url FROM urls LIMIT 1000 CC SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards Name: Month: Year: Card: Cookies Login Data Web Data History logins.json formSubmitURL usernameField encryptedUsername encryptedPassword guid SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies SELECT fieldname, value FROM moz_formhistory SELECT url FROM moz_places LIMIT 1000 cookies.sqlite formhistory.sqlite places.sqlite Plugins Local Extension Settings Sync Extension Settings IndexedDB Opera GX Stable CURRENT chrome-extension_ _0.indexeddb.leveldb Local State profiles.ini chrome opera firefox Wallets %08lX%04lX%lu SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductName x32 x64 HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall DisplayName DisplayVersion freebl3.dll mozglue.dll msvcp140.dll nss3.dll softokn3.dll vcruntime140.dll \Temp\ .exe runas open /c start %DESKTOP% %APPDATA% %LOCALAPPDATA% %USERPROFILE% %DOCUMENTS% %PROGRAMFILES% %PROGRAMFILES_86% %RECENT% *.lnk Files \discord\ \Local Storage\leveldb\CURRENT \Local Storage\leveldb \Telegram Desktop\ D877F783D5D3EF8C* map* A7FDF864FBC10B77* A92DAA6EA6F891F2* F8806DD0C461824F* Telegram Tox *.tox *.ini Password Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375 Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office
.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ 00000001 00000002 00000003 00000004 \Outlook\accounts.txt Pidgin \.purple\ accounts.xml dQw4w9WgXcQ token: Software\Valve\Steam SteamPath \config\ ssfn* config.vdf DialogConfigOverlay*.vdf libraryfolders.vdf loginusers.vdf \Steam\ sqlite3.dll browsers done Soft \Discord\tokens.txt /c timeout /t 5 & del /f /q " " & del "C:\ProgramData\*.dll"" & exit C:\Windows\system32\cmd.exe https Content-Type: multipart/form-data; boundary=---- HTTP/1.1 Content-Disposition: form-data; name=" hwid build token file_name file message ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 screenshot.jpg | ||||
| 1816 | "C:\Users\admin\Desktop\archive\File.exe" | C:\Users\admin\Desktop\archive\File.exe | explorer.exe | |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
| 3048 | C:\Users\admin\Documents\piratemamm\ujrii7zinag1hPKKtZGVkukS.exe | C:\Users\admin\Documents\piratemamm\ujrii7zinag1hPKKtZGVkukS.exe | — | File.exe |
User: admin Company: Radmin VPN Integrity Level: HIGH Description: motosoft Exit code: 0 Version: 1.4.462.100 | ||||
| 3396 | C:\Users\admin\Documents\piratemamm\QlOCbkYUHcZrZiQOrSV5kgHj.exe | C:\Users\admin\Documents\piratemamm\QlOCbkYUHcZrZiQOrSV5kgHj.exe | — | File.exe |
User: admin Company: Radmin VPN Integrity Level: HIGH Description: fastsoft Exit code: 0 Version: 1.4.462.100 | ||||
| 3840 | C:\Users\admin\Documents\piratemamm\xx2AzW_Ts45egK6bAQwnwcLq.exe | C:\Users\admin\Documents\piratemamm\xx2AzW_Ts45egK6bAQwnwcLq.exe | — | File.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
| 3936 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | 7ZIdSYLeOQihMpdJXT5wk0zn.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | ||||
| 4184 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | 7ZIdSYLeOQihMpdJXT5wk0zn.exe | |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft .NET Assembly Registration Utility Version: 4.8.9037.0 built by: NET481REL1 RedLine(PID) Process(4184) RegAsm.exe C2 (1)77.105.135.107:3445 BotnetLogsDiller Cloud (TG: @logsdillabot) Options ErrorMessage Keys XorTaxying | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\File.exe | — | |
MD5:— | SHA256:— | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Cache_Data\data_3 | — | |
MD5:— | SHA256:— | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Cache_Data\resources.resource | — | |
MD5:— | SHA256:— | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Cache_Data\sharedassets0.assets | — | |
MD5:— | SHA256:— | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Shared Dictionary\history-cache — копия (2).dll | — | |
MD5:— | SHA256:— | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Shared Dictionary\history-cache — копия (3).dll | — | |
MD5:— | SHA256:— | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Cache_Data\data_1 | binary | |
MD5:121CEFE66D326E90BFD9B6997D194E77 | SHA256:81F67418012A5602C72F7CFB2B84A29C4633FDB2549B6487388731D521B1BACD | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\Cache_Data\data_2 | vxd | |
MD5:0962291D6D367570BEE5454721C17E11 | SHA256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7 | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\version.xml | xml | |
MD5:C6E524037A2152D1963A2C29DBFA2966 | SHA256:00E68D05801E95C3207DBEA1E8B448AC8960BE835634DF108F7286E56D0706F7 | |||
| 6932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa6932.9750\archive\updates\ILU.dll | executable | |
MD5:AEE74E686DCF044042C150A75709E367 | SHA256:1CF1841D43767FE2F28A4E2994FE77488D232EBEC3FC4CDE3DCEF106A5274BC8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6352 | File.exe | POST | — | 109.120.176.203:80 | http://109.120.176.203/api/twofish.php | unknown | — | — | unknown |
6352 | File.exe | GET | 200 | 109.120.176.203:80 | http://109.120.176.203/api/crazyfish.php | unknown | — | — | malicious |
6352 | File.exe | POST | — | 109.120.176.203:80 | http://109.120.176.203/api/twofish.php | unknown | — | — | unknown |
6352 | File.exe | POST | — | 109.120.176.203:80 | http://109.120.176.203/api/twofish.php | unknown | — | — | unknown |
6352 | File.exe | POST | — | 109.120.176.203:80 | http://109.120.176.203/api/twofish.php | unknown | — | — | unknown |
6352 | File.exe | POST | — | 109.120.176.203:80 | http://109.120.176.203/api/twofish.php | unknown | — | — | unknown |
1816 | File.exe | GET | 200 | 142.250.185.195:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
1816 | File.exe | GET | 200 | 104.18.21.226:80 | http://ocsp2.globalsign.com/rootr5/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQiD0S5cIHyfrLTJ1fvAkJWflH%2B2QQUPeYpSJvqB8ohREom3m7e0oPQn1kCDQHuXyKVQkkF%2BQGRqNw%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D | unknown | — | — | whitelisted |
1816 | File.exe | GET | 200 | 104.18.21.226:80 | http://ocsp.globalsign.com/gseccovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSTMjK03nNiYoQYvu4Izyfn9OJNdAQUWHuOdSr%2BYYCqkEABrtboB0ZuP0gCDHmsXXQgoaZQ4a3ukw%3D%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3952 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
6200 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4288 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6012 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
— | — | 184.86.251.16:443 | — | Akamai International B.V. | DE | unknown |
4204 | svchost.exe | 4.209.33.156:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4288 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4140 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
www.bing.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6352 | File.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
6352 | File.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
6352 | File.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io) |
2284 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
6352 | File.exe | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6352 | File.exe | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6352 | File.exe | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6352 | File.exe | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6352 | File.exe | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
1816 | File.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |