File name:

Silviozas-Premium-Proxy-V3.85-CRACKED.exe

Full analysis: https://app.any.run/tasks/f6ae6eee-f485-4176-b09e-988319f4e731
Verdict: Malicious activity
Analysis date: January 03, 2024, 12:06:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

1A60FBD63948CB13126D88C0E71F7A6B

SHA1:

764B74A28EBD0E657FD7BA8A7F2616FD24D23FD3

SHA256:

B0EB1ABD740144014DBDC0D1C6F61BCFB5A640AE238506415BB305BAFCBBB791

SSDEEP:

49152:cdS48cPgnZWnTgBtEa/OxT+ZidVvydDbgD+m:cdS48tW0BtEuQZqS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
    • Reads settings of System Certificates

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
  • INFO

    • Drops the executable file immediately after the start

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
    • Checks supported languages

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
      • dcd.exe (PID: 392)
    • Reads the computer name

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
    • Create files in a temporary directory

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
    • Reads Environment values

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
    • Reads the machine GUID from the registry

      • Silviozas-Premium-Proxy-V3.85-CRACKED.exe (PID: 120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:08 19:18:53+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 272384
InitializedDataSize: 265216
UninitializedDataSize: -
EntryPoint: 0x447ce
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: Silviozas-Premium-Proxy-V3.85-CRACKED.exe
LegalCopyright:
OriginalFileName: Silviozas-Premium-Proxy-V3.85-CRACKED.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start silviozas-premium-proxy-v3.85-cracked.exe dcd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Users\admin\AppData\Local\Temp\Silviozas-Premium-Proxy-V3.85-CRACKED.exe" C:\Users\admin\AppData\Local\Temp\Silviozas-Premium-Proxy-V3.85-CRACKED.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\silviozas-premium-proxy-v3.85-cracked.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
392"C:\Users\admin\AppData\Local\Temp\dcd.exe" -path=""C:\Users\admin\AppData\Local\Temp\dcd.exeSilviozas-Premium-Proxy-V3.85-CRACKED.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dcd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
Total events
3 333
Read events
3 319
Write events
14
Delete events
0

Modification events

(PID) Process:(120) Silviozas-Premium-Proxy-V3.85-CRACKED.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
120Silviozas-Premium-Proxy-V3.85-CRACKED.exeC:\Users\admin\AppData\Local\Temp\dcd.exeexecutable
MD5:B5AC46E446CEAD89892628F30A253A06
SHA256:DEF7AFCB65126C4B04A7CBF08C693F357A707AA99858CAC09A8D5E65F3177669
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
3
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
120
Silviozas-Premium-Proxy-V3.85-CRACKED.exe
GET
204
172.217.18.14:80
http://google.com/generate_204
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
120
Silviozas-Premium-Proxy-V3.85-CRACKED.exe
172.217.18.14:80
google.com
GOOGLE
US
whitelisted
4
System
192.168.100.255:138
whitelisted
120
Silviozas-Premium-Proxy-V3.85-CRACKED.exe
172.67.194.181:443
eterprx.net
CLOUDFLARENET
US
unknown
120
Silviozas-Premium-Proxy-V3.85-CRACKED.exe
172.67.199.29:443
eternitypr.net
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
eterprx.net
  • 172.67.194.181
  • 104.21.20.223
malicious
eternitypr.net
  • 172.67.199.29
  • 104.21.21.142
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Eternity Stealer CnC Domain in DNS Lookup (eterprx .net)
120
Silviozas-Premium-Proxy-V3.85-CRACKED.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Eternity Stealer Domain (eterprx .net in TLS SNI)
1080
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Eternity Stealer CnC Domain in DNS Lookup (eternitypr .net)
120
Silviozas-Premium-Proxy-V3.85-CRACKED.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Eternity Stealer Domain (eternitypr .net in TLS SNI)
No debug info