File name:

Discord Nitro Generator.rar

Full analysis: https://app.any.run/tasks/d1eb6170-cbf7-4374-b3e0-1f08e6c76d74
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: June 26, 2022, 19:36:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

64ACBD3059368ADAAA30A94A83A71642

SHA1:

8A1F3FF15DE21106911E38A527E8448644FD4A0A

SHA256:

CB1D6512EE9C37C34836EF472C0A6887FA6914118B1E939230DF69CD21ABD458

SSDEEP:

49152:NJ2sT7sgWqfE6iJVJNt+8xvqunLlnXyOlvyc+WfFAaTSHmgo66vv:NbBfE3PU8lqELAOlf+WfFnTSJ6n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • AppLaunch.exe (PID: 39500)
      • WinRAR.exe (PID: 2944)
    • Steals credentials from Web Browsers

      • AppLaunch.exe (PID: 39500)
      • AppLaunch.exe (PID: 39996)
    • Stealing of credential data

      • AppLaunch.exe (PID: 39500)
      • AppLaunch.exe (PID: 39996)
    • Application was dropped or rewritten from another process

      • Discord Nitro Generator.exe (PID: 3864)
      • Discord Nitro Generator.exe (PID: 5044)
      • Discord Nitro Generator.exe (PID: 4596)
      • Discord Nitro Generator.exe (PID: 2960)
    • Loads dropped or rewritten executable

      • AppLaunch.exe (PID: 39500)
      • AppLaunch.exe (PID: 39996)
    • Actions looks like stealing of personal data

      • AppLaunch.exe (PID: 39996)
      • AppLaunch.exe (PID: 39500)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 2944)
      • AppLaunch.exe (PID: 39996)
      • AppLaunch.exe (PID: 4312)
      • AppLaunch.exe (PID: 39500)
    • Checks supported languages

      • WinRAR.exe (PID: 2944)
      • Discord Nitro Generator.exe (PID: 2960)
      • AppLaunch.exe (PID: 39500)
      • AppLaunch.exe (PID: 39996)
      • Discord Nitro Generator.exe (PID: 5044)
      • Discord Nitro Generator.exe (PID: 4596)
      • AppLaunch.exe (PID: 1396)
      • AppLaunch.exe (PID: 4312)
      • Discord Nitro Generator.exe (PID: 3864)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 2944)
      • AppLaunch.exe (PID: 39500)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2944)
      • AppLaunch.exe (PID: 39500)
    • Creates files in the user directory

      • AppLaunch.exe (PID: 39500)
    • Reads the cookies of Mozilla Firefox

      • AppLaunch.exe (PID: 39500)
    • Reads the cookies of Google Chrome

      • AppLaunch.exe (PID: 39500)
    • Creates files in the program directory

      • AppLaunch.exe (PID: 39500)
      • AppLaunch.exe (PID: 39996)
  • INFO

    • Reads settings of System Certificates

      • AppLaunch.exe (PID: 39500)
      • AppLaunch.exe (PID: 39996)
    • Checks Windows Trust Settings

      • AppLaunch.exe (PID: 39996)
      • AppLaunch.exe (PID: 39500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
9
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start winrar.exe discord nitro generator.exe no specs applaunch.exe discord nitro generator.exe no specs applaunch.exe discord nitro generator.exe no specs applaunch.exe no specs discord nitro generator.exe no specs applaunch.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1396"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeDiscord Nitro Generator.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
2944"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Discord Nitro Generator.rar"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2960"C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.36550\Discord Nitro Generator.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.36550\Discord Nitro Generator.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\rar$exb2944.36550\discord nitro generator.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
3864"C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.37364\Discord Nitro Generator.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.37364\Discord Nitro Generator.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb2944.37364\discord nitro generator.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
4312"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeDiscord Nitro Generator.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\user32.dll
4596"C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.39518\Discord Nitro Generator.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.39518\Discord Nitro Generator.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\rar$exb2944.39518\discord nitro generator.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\apphelp.dll
5044"C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.39099\Discord Nitro Generator.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2944.39099\Discord Nitro Generator.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb2944.39099\discord nitro generator.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
39500"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Discord Nitro Generator.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
3221226505
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
39996"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Discord Nitro Generator.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
3221226505
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
Total events
8 916
Read events
8 821
Write events
94
Delete events
1

Modification events

(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2944) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
1
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Discord Nitro Generator.rar
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2944) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
26
Suspicious files
9
Text files
1
Unknown types
19

Dropped files

PID
Process
Filename
Type
2944WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2944.36550\Scrafy.dll
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
2944WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2944.36550\Discord Nitro Generator.exeexecutable
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dbinary
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dder
MD5:
SHA256:
39500AppLaunch.exeC:\ProgramData\16003383176753443601511181
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771binary
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\738FBC066DBD9E6001113366624890A3_53C5D34017BDB72400155AC2819BA60Dbinary
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771der
MD5:
SHA256:
39500AppLaunch.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\738FBC066DBD9E6001113366624890A3_53C5D34017BDB72400155AC2819BA60Dder
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
8
DNS requests
5
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
39500
AppLaunch.exe
GET
200
192.124.249.24:80
http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
US
der
1.66 Kb
whitelisted
39500
AppLaunch.exe
GET
200
192.124.249.24:80
http://ocsp.godaddy.com//MEowSDBGMEQwQjAJBgUrDgMCGgUABBS2CA1fbGt26xPkOKX4ZguoUjM0TgQUQMK9J47MNIMwojPX%2B2yz8LQsgM4CCQC2T6rhHiP0ng%3D%3D
US
der
1.74 Kb
whitelisted
39500
AppLaunch.exe
GET
200
23.216.77.80:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?38fa4975e63f74e6
US
compressed
4.70 Kb
whitelisted
39996
AppLaunch.exe
GET
200
159.69.102.192:80
http://159.69.102.192/4537293036.zip
US
compressed
1.49 Mb
malicious
39996
AppLaunch.exe
GET
200
159.69.102.192:80
http://159.69.102.192/1375
US
text
186 b
malicious
39500
AppLaunch.exe
GET
200
159.69.102.192:80
http://159.69.102.192/1375
US
text
186 b
malicious
39500
AppLaunch.exe
GET
200
192.124.249.24:80
http://ocsp.godaddy.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D
US
der
1.69 Kb
whitelisted
39500
AppLaunch.exe
GET
200
159.69.102.192:80
http://159.69.102.192/1875310718.zip
US
compressed
1.49 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
39500
AppLaunch.exe
23.216.77.80:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
suspicious
39500
AppLaunch.exe
159.69.102.192:80
US
malicious
39500
AppLaunch.exe
192.124.249.24:80
ocsp.godaddy.com
Sucuri
US
suspicious
39996
AppLaunch.exe
159.69.102.192:80
US
malicious
3828
WerFault.exe
20.42.73.29:443
watson.microsoft.com
US
suspicious
39996
AppLaunch.exe
149.154.167.99:443
t.me
Telegram Messenger LLP
GB
malicious
39500
AppLaunch.exe
149.154.167.99:443
t.me
Telegram Messenger LLP
GB
malicious

DNS requests

Domain
IP
Reputation
t.me
  • 149.154.167.99
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.80
  • 23.216.77.69
whitelisted
ocsp.godaddy.com
  • 192.124.249.24
  • 192.124.249.23
  • 192.124.249.22
  • 192.124.249.41
  • 192.124.249.36
whitelisted
watson.microsoft.com
  • 20.42.73.29
whitelisted

Threats

PID
Process
Class
Message
39500
AppLaunch.exe
A Network Trojan was detected
ET TROJAN Vidar/Arkei/Megumin Stealer Keywords Retrieved
39500
AppLaunch.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host ZIP Request
39996
AppLaunch.exe
A Network Trojan was detected
ET TROJAN Vidar/Arkei/Megumin Stealer Keywords Retrieved
39996
AppLaunch.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host ZIP Request
No debug info