analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Woxy Cracked by Crank and Yuki.rar

Full analysis: https://app.any.run/tasks/97a23f7d-e0a0-471f-b169-2a23a48c9e02
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 06, 2018, 07:44:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
evasion
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

10419F8F6E1A25F43E4B3347FF1676D6

SHA1:

D93624EF949EA0BBCED6427A2F0D5D79E428547C

SHA256:

C4CB51AA8D733BCBF8C64E1768158594D0B69926C574F28222F7CBB6D9677463

SSDEEP:

196608:JQYH11ve3hR7eOet0KhqEAIwHYalwQWx6ouNZJawvrDtGiF+8o/Dj8yPaT7FTpVi:Jfve3hR7eOet0KwQwHYRDsouu4UYcj8u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 284)
      • explorer.exe (PID: 3464)
    • Application was dropped or rewritten from another process

      • Woxy Cracked by Crank and Yuki.exe (PID: 1816)
      • SeafkoAgent.exe (PID: 2764)
      • woxy.exe (PID: 2540)
      • explorer.exe (PID: 3464)
    • Changes settings of System certificates

      • explorer.exe (PID: 3464)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 3464)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3252)
      • woxy.exe (PID: 2540)
      • explorer.exe (PID: 3464)
      • SeafkoAgent.exe (PID: 2764)
    • Creates executable files which already exist in Windows

      • SeafkoAgent.exe (PID: 2764)
      • explorer.exe (PID: 3464)
    • Starts itself from another location

      • SeafkoAgent.exe (PID: 2764)
    • Adds / modifies Windows certificates

      • explorer.exe (PID: 3464)
    • Connects to unusual port

      • explorer.exe (PID: 3464)
    • Checks for external IP

      • explorer.exe (PID: 3464)
  • INFO

    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 3252)
    • Dropped object may contain Bitcoin addresses

      • woxy.exe (PID: 2540)
    • Application was crashed

      • Woxy Cracked by Crank and Yuki.exe (PID: 1816)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe searchprotocolhost.exe no specs woxy.exe woxy cracked by crank and yuki.exe seafkoagent.exe explorer.exe wmiapsrv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3252"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Woxy Cracked by Crank and Yuki.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
284"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
2540"C:\Users\admin\Desktop\woxy.exe" C:\Users\admin\Desktop\woxy.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
1816"C:\Users\admin\AppData\Local\Temp\Woxy Cracked by Crank and Yuki.exe" C:\Users\admin\AppData\Local\Temp\Woxy Cracked by Crank and Yuki.exe
woxy.exe
User:
admin
Integrity Level:
HIGH
Description:
Woxy
Version:
1.0.0.0
2764"C:\Users\admin\AppData\Local\Temp\SeafkoAgent.exe" C:\Users\admin\AppData\Local\Temp\SeafkoAgent.exe
woxy.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Windows Explorer
Exit code:
0
Version:
1.0.0.0
3464"C:\Users\admin\AppData\Local\explorer.exe" C:\Users\admin\AppData\Local\explorer.exe
SeafkoAgent.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
1.0.0.0
2164C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 327
Read events
1 281
Write events
46
Delete events
0

Modification events

(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3252) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Woxy Cracked by Crank and Yuki.rar
(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3252) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3252) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:@C:\Windows\System32\ieframe.dll,-912
Value:
HTML Document
(PID) Process:(284) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
10
Suspicious files
4
Text files
2
Unknown types
10

Dropped files

PID
Process
Filename
Type
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\domains.txt
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Mail.dll
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Making configs tutorial.html
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Newtonsoft.Json.dll
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\READ PLEASE.txt
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Configs\Amazon.co.uk.ini
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Configs\Amazon.com.ini
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Configs\Amazon.de.ini
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Configs\Amazon.ini
MD5:
SHA256:
3252WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3252.29397\Configs\Amazon.it.ini
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
10
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3464
explorer.exe
GET
204
172.217.21.238:80
http://clients3.google.com/generate_204
US
whitelisted
3464
explorer.exe
GET
200
205.185.216.42:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.2 Kb
whitelisted
3464
explorer.exe
GET
200
205.185.216.42:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/DF3C24F9BFD666761B268073FE06D1CC8D4F82A4.crt
US
der
914 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3464
explorer.exe
216.239.34.21:443
ipinfo.io
Google Inc.
US
whitelisted
3464
explorer.exe
172.217.21.238:80
clients3.google.com
Google Inc.
US
whitelisted
3464
explorer.exe
205.185.216.42:80
www.download.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3464
explorer.exe
145.14.144.231:443
a-rat.000webhostapp.com
Hostinger International Limited
US
shared
3464
explorer.exe
212.83.130.105:6667
irc.europnet.org
Online S.a.s.
FR
unknown
3464
explorer.exe
91.217.189.58:6669
open.ircnet.net
Portlane AB
SE
unknown
3464
explorer.exe
178.62.119.156:6667
irc.chatspike.net
Digital Ocean, Inc.
GB
unknown
3464
explorer.exe
192.184.93.117:6667
irc.esper.net
RamNode LLC
US
unknown
3464
explorer.exe
92.61.32.19:6667
irc.data.lt
Telia Lietuva, AB
LT
unknown
145.14.144.231:443
a-rat.000webhostapp.com
Hostinger International Limited
US
shared

DNS requests

Domain
IP
Reputation
clients3.google.com
  • 172.217.21.238
whitelisted
ipinfo.io
  • 216.239.34.21
  • 216.239.32.21
  • 216.239.36.21
  • 216.239.38.21
shared
a-rat.000webhostapp.com
  • 145.14.144.231
shared
www.download.windowsupdate.com
  • 205.185.216.42
  • 205.185.216.10
  • 205.185.216.10
  • 205.185.216.10
whitelisted
irc.europnet.org
  • 212.83.130.105
  • 193.19.210.21
unknown
irc.data.lt
  • 92.61.32.19
unknown
irc.chatspike.net
  • 178.62.119.156
  • 158.69.114.198
  • 212.129.30.242
  • 54.38.49.85
unknown
irc.esper.net
  • 192.184.93.117
  • 51.255.119.242
  • 45.79.137.210
  • 52.176.63.171
  • 185.34.216.141
  • 139.99.136.176
unknown
open.ircnet.net
  • 91.217.189.58
  • 170.178.184.37
  • 165.254.255.133
  • 165.254.255.132
  • 94.125.182.253
  • 172.107.98.84
unknown

Threats

PID
Process
Class
Message
3464
explorer.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
3464
explorer.exe
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
3464
explorer.exe
A Network Trojan was detected
SC BACKDOOR TeleRAT webhook using attempt
3464
explorer.exe
Misc activity
ET CHAT IRC PONG response
3464
explorer.exe
Misc activity
ET CHAT IRC PING command
3464
explorer.exe
Misc activity
ET CHAT IRC PONG response
3464
explorer.exe
Misc activity
ET CHAT IRC PING command
3464
explorer.exe
Misc activity
ET CHAT IRC authorization message
3464
explorer.exe
Misc activity
ET CHAT IRC PONG response
3464
explorer.exe
Misc activity
ET CHAT IRC PING command
3 ETPRO signatures available at the full report
No debug info