URL:

https://www.crackingcity.com/idm-crack/

Full analysis: https://app.any.run/tasks/d9f880c8-8b29-457b-8fef-2d07190e916d
Verdict: Malicious activity
Analysis date: February 26, 2024, 07:42:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

5D91DA13F2DE9367F54F80D3D118E9AF

SHA1:

4662EFF267E35446C40CD13D31ABBFA09801E272

SHA256:

D00B8E831BD1D0303B23DA37F8CDB7BEA97B696F593F1DCEE29E152FD8CBBA48

SSDEEP:

3:N8DSLbMLF8TKtfl:2OLQ9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IDMan.exe (PID: 2448)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
      • 7za.exe (PID: 4728)
      • 7za.exe (PID: 4696)
    • Creates a writable file in the system directory

      • rundll32.exe (PID: 3168)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 3168)
      • IDMan.exe (PID: 2448)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 908)
      • net.exe (PID: 3756)
    • Starts CMD.EXE for commands execution

      • msedge.exe (PID: 1384)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • idman642build3.exe (PID: 1056)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 2548)
      • IDMan.exe (PID: 2448)
      • Uninstall.exe (PID: 908)
    • Reads the Internet Settings

      • IDM1.tmp (PID: 2548)
      • IDMan.exe (PID: 2448)
      • Uninstall.exe (PID: 908)
      • runonce.exe (PID: 2360)
      • IDMan.exe (PID: 3748)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
    • Reads security settings of Internet Explorer

      • IDM1.tmp (PID: 2548)
      • IDMan.exe (PID: 2448)
      • Uninstall.exe (PID: 908)
      • IDMan.exe (PID: 3748)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 2548)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 2548)
    • Executable content was dropped or overwritten

      • IDMan.exe (PID: 2448)
      • rundll32.exe (PID: 3168)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
      • 7za.exe (PID: 4728)
      • 7za.exe (PID: 4696)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 908)
    • Checks Windows Trust Settings

      • IDMan.exe (PID: 2448)
      • IDMan.exe (PID: 3748)
    • Reads settings of System Certificates

      • IDMan.exe (PID: 2448)
      • IDMan.exe (PID: 3748)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 3168)
    • Creates or modifies Windows services

      • Uninstall.exe (PID: 908)
    • Drops 7-zip archiver for unpacking

      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
    • The executable file from the user directory is run by the CMD process

      • 7za.exe (PID: 4648)
      • 7za.exe (PID: 4672)
      • 7za.exe (PID: 4696)
      • 7za.exe (PID: 4728)
      • AB2EF.exe (PID: 5048)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 4612)
    • Executing commands from a ".bat" file

      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
    • Starts CMD.EXE for commands execution

      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
      • cmd.exe (PID: 4788)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 4908)
      • cmd.exe (PID: 4788)
    • Get information on the list of running processes

      • cmd.exe (PID: 4788)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 4788)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 4788)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4788)
    • Application launched itself

      • cmd.exe (PID: 4788)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 4788)
  • INFO

    • The process uses the downloaded file

      • msedge.exe (PID: 3544)
      • WinRAR.exe (PID: 1336)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2028)
      • idman642build3.exe (PID: 1056)
      • IDM1.tmp (PID: 2548)
      • idmBroker.exe (PID: 796)
      • IDMan.exe (PID: 2448)
      • Uninstall.exe (PID: 908)
      • MediumILStart.exe (PID: 3788)
      • IDMan.exe (PID: 3748)
      • IEMonitor.exe (PID: 2232)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
      • 7za.exe (PID: 4648)
      • 7za.exe (PID: 4672)
      • 7za.exe (PID: 4696)
      • 7za.exe (PID: 4728)
      • mode.com (PID: 4964)
      • AB2EF.exe (PID: 5048)
      • IDMMsgHost.exe (PID: 4508)
      • IDMMsgHost.exe (PID: 1892)
      • mode.com (PID: 5164)
      • IDMMsgHost.exe (PID: 5372)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2028)
      • IDMan.exe (PID: 2448)
      • IDM1.tmp (PID: 2548)
      • Uninstall.exe (PID: 908)
      • MediumILStart.exe (PID: 3788)
      • IDMan.exe (PID: 3748)
      • IEMonitor.exe (PID: 2232)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
      • 7za.exe (PID: 4648)
      • 7za.exe (PID: 4672)
      • 7za.exe (PID: 4728)
      • 7za.exe (PID: 4696)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1336)
      • WinRAR.exe (PID: 4388)
    • Manual execution by a user

      • idman642build3.exe (PID: 2424)
      • idman642build3.exe (PID: 1056)
      • wmpnscfg.exe (PID: 2028)
      • firefox.exe (PID: 2492)
      • WinRAR.exe (PID: 4388)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4480)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1336)
      • rundll32.exe (PID: 3168)
      • WinRAR.exe (PID: 4388)
    • Create files in a temporary directory

      • idman642build3.exe (PID: 1056)
      • IDM1.tmp (PID: 2548)
      • IDMan.exe (PID: 2448)
      • IDMan.exe (PID: 3748)
      • IDM 6.xx Activator or Resetter v3.1.exe (PID: 4580)
      • 7za.exe (PID: 4648)
      • 7za.exe (PID: 4672)
      • 7za.exe (PID: 4728)
      • 7za.exe (PID: 4696)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 2548)
      • IDMan.exe (PID: 2448)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 2448)
      • IDM1.tmp (PID: 2548)
      • MediumILStart.exe (PID: 3788)
      • IDMan.exe (PID: 3748)
    • Creates files in the program directory

      • IDM1.tmp (PID: 2548)
      • IDMan.exe (PID: 2448)
    • Application launched itself

      • msedge.exe (PID: 1384)
      • firefox.exe (PID: 2492)
      • firefox.exe (PID: 2296)
    • Checks proxy server information

      • IDMan.exe (PID: 2448)
    • Creates files in the driver directory

      • rundll32.exe (PID: 3168)
    • Reads the software policy settings

      • IDMan.exe (PID: 2448)
      • IDMan.exe (PID: 3748)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 2360)
    • Reads the time zone

      • runonce.exe (PID: 2360)
    • Checks operating system version

      • cmd.exe (PID: 4788)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
10 097
Monitored processes
10 040
Malicious processes
9
Suspicious processes
3

Behavior graph

Click at the process to see the details

Process information

PID
CMD
Path
Indicators
Parent process
268findstr /r "{.*-.*-.*-.*-.*}" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
268reg query HKCU\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0124-ABCDEFFEDCBB} C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
268C:\Windows\system32\cmd.exe /S /D /c" echo {CAFEEFAC-0016-0000-0206-ABCDEFFEDCBC}"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
268findstr /i "LocalServer32 InProcServer32 InProcHandler32" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
268findstr /r "{.*-.*-.*-.*-.*}" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
268C:\Windows\system32\cmd.exe /S /D /c" echo {CAFEEFAC-0017-0000-0113-ABCDEFFEDCBA}"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
268findstr /r "{.*-.*-.*-.*-.*}" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
268findstr /i "LocalServer32 InProcServer32 InProcHandler32" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
268findstr /i "LocalServer32 InProcServer32 InProcHandler32" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
268reg query HKCU\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0260-ABCDEFFEDCBB} C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
170 548
Read events
169 731
Write events
702
Delete events
115

Modification events

(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1384) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
7D6C9754DA702F00
(PID) Process:(1384) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
(PID) Process:(1384) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
Executable files
27
Suspicious files
241
Text files
189
Unknown types
213

Dropped files

PID
Process
Filename
Type
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF17f702.TMP
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF17f721.TMP
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF17f731.TMP
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF17f78f.TMP
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old~RF17f721.TMPtext
MD5:BC5665331C6B5366D725CB1970BD7406
SHA256:5D33599D48DC5F3D65BA548DDBAE25868B979EABA17BC310F0D2C7543341F80D
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:72265FBF816F9AAE473C0CEB421DE724
SHA256:C549BD4A176A3744A5D91391D311E28F0503BB69213E38835A1CB213038D938C
1384msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
217
DNS requests
344
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2448
IDMan.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3b0b32ea15497bc5
unknown
compressed
65.2 Kb
unknown
2296
firefox.exe
POST
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
2296
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
2296
firefox.exe
POST
200
95.101.54.121:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
2296
firefox.exe
POST
200
95.101.54.121:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
2296
firefox.exe
POST
200
95.101.54.121:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
2296
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
2296
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
unknown
binary
471 b
unknown
2296
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
unknown
binary
471 b
unknown
2296
firefox.exe
POST
200
95.101.54.121:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1492
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1384
msedge.exe
239.255.255.250:1900
unknown
1492
msedge.exe
188.114.97.3:443
www.crackingcity.com
CLOUDFLARENET
NL
unknown
1492
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1492
msedge.exe
142.250.185.163:443
fonts.gstatic.com
GOOGLE
US
whitelisted
1492
msedge.exe
192.0.77.2:443
i0.wp.com
unknown
1492
msedge.exe
142.250.185.106:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
www.crackingcity.com
  • 188.114.97.3
  • 188.114.96.3
unknown
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
fonts.gstatic.com
  • 142.250.185.163
whitelisted
ajax.googleapis.com
  • 216.58.212.170
whitelisted
fonts.googleapis.com
  • 142.250.185.106
whitelisted
c0.wp.com
  • 192.0.77.37
whitelisted
i0.wp.com
  • 192.0.77.2
whitelisted
stats.wp.com
  • 192.0.76.3
whitelisted
secure.gravatar.com
  • 192.0.73.2
whitelisted

Threats

PID
Process
Class
Message
1492
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Global content delivery network (unpkg .com)
No debug info