File name:

Diabolic Traffic Bot v6.42 [Cracked By MarkVoid].zip

Full analysis: https://app.any.run/tasks/1bcaa7c9-e08e-4cea-b265-49c56c1c4bd5
Verdict: Malicious activity
Analysis date: May 03, 2024, 18:13:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

370E783A1F4A801C8CF14CA94AB995A0

SHA1:

9A9610BF81987F4741CEF2C02F232D322EEDA38D

SHA256:

D0250B1D2C287D9F2731C7240464D07E1EBE0560C13062D856124ED87FFA2F4A

SSDEEP:

98304:iXAkGQ/WghqMKQ1UlDItuXocBNShI9IhMbVCkXPuZqwiICwM8C7A8+emiDuuTd7y:+UHMt+LXhAPN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3968)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3968)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3968)
    • Reads the Internet Settings

      • TrafficBot [Cracked By MarkVoid].exe (PID: 4028)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 2072)
    • Connects to unusual port

      • putty.exe (PID: 2032)
  • INFO

    • Checks supported languages

      • putty.exe (PID: 4012)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 4028)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 2072)
      • putty.exe (PID: 1064)
      • putty.exe (PID: 2032)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3968)
    • Reads the computer name

      • putty.exe (PID: 4012)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 4028)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 2072)
      • putty.exe (PID: 1064)
      • putty.exe (PID: 2032)
    • Reads Environment values

      • TrafficBot [Cracked By MarkVoid].exe (PID: 4028)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 2072)
    • Reads the machine GUID from the registry

      • TrafficBot [Cracked By MarkVoid].exe (PID: 4028)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 2072)
      • putty.exe (PID: 1064)
      • putty.exe (PID: 2032)
    • Creates files or folders in the user directory

      • putty.exe (PID: 1064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:09:04 03:24:48
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Firefox/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe putty.exe no specs trafficbot [cracked by markvoid].exe trafficbot [cracked by markvoid].exe putty.exe no specs putty.exe

Process information

PID
CMD
Path
Indicators
Parent process
1064"C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.35617\putty.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.35617\putty.exeWinRAR.exe
User:
admin
Company:
Simon Tatham
Integrity Level:
MEDIUM
Description:
SSH, Telnet and Rlogin client
Exit code:
0
Version:
Release 0.69
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3968.35617\putty.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
2032"C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.36352\putty.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.36352\putty.exe
WinRAR.exe
User:
admin
Company:
Simon Tatham
Integrity Level:
MEDIUM
Description:
SSH, Telnet and Rlogin client
Version:
Release 0.69
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3968.36352\putty.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
2072"C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.35420\TrafficBot [Cracked By MarkVoid].exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.35420\TrafficBot [Cracked By MarkVoid].exe
WinRAR.exe
User:
admin
Company:
Diabolic Labs
Integrity Level:
MEDIUM
Description:
Traffic Bot
Version:
6.42
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3968.35420\trafficbot [cracked by markvoid].exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3968"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Diabolic Traffic Bot v6.42 [Cracked By MarkVoid].zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
4012"C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\putty.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\putty.exeWinRAR.exe
User:
admin
Company:
Simon Tatham
Integrity Level:
MEDIUM
Description:
SSH, Telnet and Rlogin client
Exit code:
0
Version:
Release 0.69
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3968.34302\putty.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
4028"C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34869\TrafficBot [Cracked By MarkVoid].exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34869\TrafficBot [Cracked By MarkVoid].exe
WinRAR.exe
User:
admin
Company:
Diabolic Labs
Integrity Level:
MEDIUM
Description:
Traffic Bot
Version:
6.42
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3968.34869\trafficbot [cracked by markvoid].exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
7 681
Read events
7 649
Write events
32
Delete events
0

Modification events

(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3968) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Diabolic Traffic Bot v6.42 [Cracked By MarkVoid].zip
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3968) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
140
Suspicious files
0
Text files
5
Unknown types
1

Dropped files

PID
Process
Filename
Type
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\breakpadinjector.dllexecutable
MD5:8BD17858D43DCFF0B5336C6C5A6B8A17
SHA256:B13177B1DB8E44F333FF63080D97AED8E51767ABB2FECD5DCA3E565C81685E60
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\d3dcompiler_47.dllexecutable
MD5:C5B362BCE86BB0AD3149C4540201331D
SHA256:EFBDBBCD0D954F8FDC53467DE5D89AD525E4E4A9CFFF8A15D07C6FDB350C407F
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\libGLESv2.dllexecutable
MD5:9191452050C86F3B6CA9278A276E0F23
SHA256:348703ADDA8FE086CC8DB304C8638D4A496A4A86F2AE3BE916CB52A9B787C28A
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\lgpllibs.dllexecutable
MD5:6E218202CF13E07DF71B28A5CB797387
SHA256:8546698D1C5E38CD055E41ED9B5787BFD0299AAC0C2923C5759884B5A9B944B8
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\plugin-hang-ui.exeexecutable
MD5:CA7A4661F14428D997C436224C44F31D
SHA256:764A165A2C9B99CDDD81353E304F2BCBB5660943CB019A4CDD6E176F5D2D3543
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\msvcp120.dllexecutable
MD5:FD5CABBE52272BD76007B68186EBAF00
SHA256:87C42CA155473E4E71857D03497C8CBC28FA8FF7F2C8D72E8A1F39B71078F608
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\msvcr120.dllexecutable
MD5:034CCADC1C073E4216E9466B720F9849
SHA256:86E39B5995AF0E042FCDAA85FE2AEFD7C9DDC7AD65E6327BD5E7058BC3AB615F
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\nssckbi.dllexecutable
MD5:CB2C4AB44B14C9567015EC4352A4FBBC
SHA256:E807076EDEFA13AA292A6DB354F98A8243C868F71988C7D80954B14816107588
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\nss3.dllexecutable
MD5:165FA7CD4A06C3B14EB24FFCE036F69B
SHA256:4C965AB79D4C7131F87D5CDE7ECC8923BE8D26E86F4EE3A6A15463AEB97A413A
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3968.34302\Firefox\plugin-container.exeexecutable
MD5:E428725AE38BF1803CCCBF348D280D39
SHA256:70AD689E89C97476474F209A802167EB058DCE71C7EEBE83FA633C8920B24461
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
11
DNS requests
2
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
4028
TrafficBot [Cracked By MarkVoid].exe
49.13.77.253:80
prx.biz
Hetzner Online GmbH
DE
unknown
2072
TrafficBot [Cracked By MarkVoid].exe
49.13.77.253:80
prx.biz
Hetzner Online GmbH
DE
unknown
2032
putty.exe
38.154.227.167:5868
COGENT-174
US
unknown

DNS requests

Domain
IP
Reputation
prx.biz
  • 49.13.77.253
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
1088
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
No debug info