| URL: | https://wareskey.softwaresite.net/luminar-crack/ |
| Full analysis: | https://app.any.run/tasks/99d14158-e5c8-48d9-997e-9efe3752b68e |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 09, 2022, 01:07:06 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | BFF02BAFB6526FFDCCBD9D80A8ABA546 |
| SHA1: | F43D278740768358E65277C4A9CD013B9016341A |
| SHA256: | A8BB72428337E14331707B1B8ADC9A7EF652867D63B64605022B4EBE55693FF0 |
| SSDEEP: | 3:N8VDAAEECexL2XN:2EELNwN |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 284 | "C:\Users\admin\AppData\Local\c39904ff-91e0-4ea1-9dd1-09411552aee1.exe" | C:\Users\admin\AppData\Local\c39904ff-91e0-4ea1-9dd1-09411552aee1.exe | wW9FzscnVHF80slCHphthsyR.exe | ||||||||||||
User: admin Company: gsdufsdfhw Integrity Level: HIGH Description: gsdufsdfhw Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 320 | C:\Windows\system32\cmd.exe /c 61da2ee3eb808_Sun00e9d2f77.exe | C:\Windows\system32\cmd.exe | — | setup_install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 344 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,6310239344549221109,16280871944150092008,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 388 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,6310239344549221109,16280871944150092008,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 388 | "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\admin\AppData\Local\Temp\P6GJMOn6.cpl", | C:\Windows\system32\rundll32.exe | — | control.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 396 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,6310239344549221109,16280871944150092008,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 424 | 61da2ef2767d7_Sun00d5c0fc069f.exe | C:\Users\admin\AppData\Local\Temp\7zS8B29BBE1\61da2ef2767d7_Sun00d5c0fc069f.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 3221225477 Modules
| |||||||||||||||
| 460 | C:\Users\admin\AppData\Local\Temp\7zS8B29BBE1\61da2eea12110_Sun00793d9cfe20.exe | C:\Users\admin\AppData\Local\Temp\7zS8B29BBE1\61da2eea12110_Sun00793d9cfe20.exe | 61da2eea12110_Sun00793d9cfe20.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 472 | "C:\Users\admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe" | C:\Users\admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe | — | File.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 532 | "C:\Users\admin\AppData\Local\Temp\myslanewfile.exe" | C:\Users\admin\AppData\Local\Temp\myslanewfile.exe | LzmwAqmV.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid |
Value: | |||
| (PID) Process: | (3160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid_installdate |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-61DA353C-C58.pma | — | |
MD5:— | SHA256:— | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF112d56.TMP | text | |
MD5:936EB7280DA791E6DD28EF3A9B46D39C | SHA256:CBAF2AFD831B32F6D1C12337EE5D2F090D6AE1F4DCB40B08BEF49BF52AD9721F | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version | text | |
MD5:00046F773EFDD3C8F8F6D0F87A2B93DC | SHA256:593EDE11D17AF7F016828068BCA2E93CF240417563FB06DC8A579110AEF81731 | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat | binary | |
MD5:9C016064A1F864C8140915D77CF3389A | SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787 | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:5BD3C311F2136A7A88D3E197E55CF902 | SHA256:FA331915E1797E59979A3E4BCC2BD0D3DEAA039B94D4DB992BE251FD02A224B9 | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences | text | |
MD5:— | SHA256:— | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF112d56.TMP | text | |
MD5:64AD8ED3E666540337BA541C549F72F7 | SHA256:BECBDB08B5B37D203A85F2E974407334053BB1D2270F0B3C9A4DB963896F2206 | |||
| 2564 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma | binary | |
MD5:03C4F648043A88675A920425D824E1B3 | SHA256:F91DBB7C64B4582F529C968C480D2DCE1C8727390482F31E4355A27BB3D9B450 | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF112d76.TMP | text | |
MD5:81F483F77EE490F35306A4F94DB2286B | SHA256:82434CE3C9D13F509EBEEBE3A7A1A1DE9AB4557629D9FC855761E0CFA45E8BCE | |||
| 3160 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old | text | |
MD5:7721CDA9F5B73CE8A135471EB53B4E0E | SHA256:DD730C576766A46FFC84E682123248ECE1FF1887EC0ACAB22A5CE93A450F4500 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2072 | chrome.exe | GET | 301 | 104.21.14.19:80 | http://irnaipa.xyz/?s=2155&q=Luminar+3.1.3.3920+Crack+With+Activation+Key+Full+Free&dedica=20&hmac=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 | US | — | — | malicious |
5628 | 61da2eee7b42e_Sun007615f757ff.exe | GET | — | 37.220.10.229:80 | http://ad-postback.biz/stats/1.php?pub=/mixtwo&badparam=NOPE | GB | — | — | malicious |
2072 | chrome.exe | GET | 302 | 18.223.3.115:80 | http://ec2-18-223-3-115.us-east-2.compute.amazonaws.com/?dedica=20Array&m=2155&q=Luminar%203.1.3.3920%20Crack%20With%20Activation%20Key%20Full%20Free&tron=MjBiMGVmMDkxNmVmYjNiOGNmYzAyMWE3YmZjYjdiZjMyZTQ5OTRhMQ== | US | html | 19.0 Kb | shared |
3092 | 61da2ef065ec0_Sun00935fdf6e.exe | GET | 400 | 212.193.30.45:80 | http://212.193.30.45/proxies.txt | RU | html | 301 b | malicious |
2072 | chrome.exe | POST | 200 | 18.223.3.115:80 | http://ec2-18-223-3-115.us-east-2.compute.amazonaws.com/?go=96ccc6fbc18f87&dedica=20Array | US | html | 731 b | shared |
3092 | 61da2ef065ec0_Sun00935fdf6e.exe | GET | 200 | 45.144.225.57:80 | http://45.144.225.57/server.txt | unknown | text | 15 b | malicious |
5052 | 61da2eeb98df8_Sun00bd121dfc.exe | GET | 200 | 45.144.2.131:80 | http://artmy.top/check.php?source=MIX1h1 | unknown | text | 31 b | malicious |
2072 | chrome.exe | POST | 200 | 18.223.3.115:80 | http://ec2-18-223-3-115.us-east-2.compute.amazonaws.com/?verify-id=2155&verify-hash=9d985188444175d30c709f634f65967f67f1ae22&verify-msch=THVtaW5hciAzLjEuMy4zOTIwIENyYWNrIFdpdGggQWN0aXZhdGlvbiBLZXkgRnVsbCBGcmVl&download=1&xtrans=MTM4 | US | compressed | 8.65 Mb | shared |
3092 | 61da2ef065ec0_Sun00935fdf6e.exe | GET | 200 | 2.56.59.42:80 | http://2.56.59.42/base/api/statistics.php | unknown | binary | 94 b | malicious |
2072 | chrome.exe | GET | 200 | 104.16.19.94:80 | http://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.0/css/bootstrap.min.css | US | text | 20.4 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2072 | chrome.exe | 142.250.185.138:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
2072 | chrome.exe | 172.67.39.148:443 | static.addtoany.com | — | US | unknown |
2072 | chrome.exe | 139.45.197.236:443 | tovespiquener.com | — | US | malicious |
2072 | chrome.exe | 192.0.76.3:443 | stats.wp.com | Automattic, Inc | US | suspicious |
2072 | chrome.exe | 23.32.238.178:80 | ctldl.windowsupdate.com | XO Communications | US | suspicious |
2072 | chrome.exe | 142.250.185.141:443 | accounts.google.com | Google Inc. | US | whitelisted |
2072 | chrome.exe | 142.250.185.206:443 | clients2.google.com | Google Inc. | US | whitelisted |
2072 | chrome.exe | 139.45.197.237:443 | e2ertt.com | — | US | malicious |
2072 | chrome.exe | 142.250.185.202:443 | content-autofill.googleapis.com | Google Inc. | US | whitelisted |
2072 | chrome.exe | 139.45.197.240:443 | propeller-tracking.com | — | US | unknown |
Domain | IP | Reputation |
|---|---|---|
clients2.google.com |
| whitelisted |
wareskey.softwaresite.net |
| malicious |
accounts.google.com |
| shared |
c0.wp.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
hastrenmon.xyz |
| malicious |
i0.wp.com |
| whitelisted |
i1.wp.com |
| whitelisted |
i2.wp.com |
| whitelisted |
s.w.org |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2072 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port) |
2072 | chrome.exe | A Network Trojan was detected | ET TROJAN Fake Software Download Redirect Leading to Malware M3 |
2072 | chrome.exe | A Network Trojan was detected | AV TROJAN Malware Dropper As a Service Download Request |
2072 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2072 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port) |
2072 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port) |
2072 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port) |
1948 | setup_install.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |