analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Diabolic Traffic Bot v6.42 [Cracked By MarkVoid].zip

Full analysis: https://app.any.run/tasks/f079e484-845c-4d9c-90ce-5a379d8fc48e
Verdict: Malicious activity
Analysis date: October 30, 2023, 12:44:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

370E783A1F4A801C8CF14CA94AB995A0

SHA1:

9A9610BF81987F4741CEF2C02F232D322EEDA38D

SHA256:

D0250B1D2C287D9F2731C7240464D07E1EBE0560C13062D856124ED87FFA2F4A

SSDEEP:

98304:iXAkGQ/WghqMKQ1UlDItuXocBNShI9IhMbVCkXPuZqwiICwM8C7A8+emiDuuTd7y:+UHMt+LXhAPN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
    • Loads dropped or rewritten executable

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 1796)
    • Reads the Internet Settings

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
  • INFO

    • Checks supported languages

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
    • Reads the computer name

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
    • Reads the machine GUID from the registry

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
    • Manual execution by a user

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1796)
    • Reads Environment values

      • TrafficBot [Cracked By MarkVoid].exe (PID: 3704)
      • TrafficBot [Cracked By MarkVoid].exe (PID: 1372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipFileName: Firefox/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2020:09:04 03:24:48
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs searchprotocolhost.exe no specs trafficbot [cracked by markvoid].exe no specs trafficbot [cracked by markvoid].exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1796"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Diabolic Traffic Bot v6.42 [Cracked By MarkVoid].zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
520"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3704"C:\Users\admin\Desktop\TrafficBot [Cracked By MarkVoid].exe" C:\Users\admin\Desktop\TrafficBot [Cracked By MarkVoid].exeexplorer.exe
User:
admin
Company:
Diabolic Labs
Integrity Level:
MEDIUM
Description:
Traffic Bot
Version:
6.42
Modules
Images
c:\users\admin\desktop\trafficbot [cracked by markvoid].exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
1372"C:\Users\admin\Desktop\TrafficBot [Cracked By MarkVoid].exe" C:\Users\admin\Desktop\TrafficBot [Cracked By MarkVoid].exeexplorer.exe
User:
admin
Company:
Diabolic Labs
Integrity Level:
MEDIUM
Description:
Traffic Bot
Version:
6.42
Modules
Images
c:\users\admin\desktop\trafficbot [cracked by markvoid].exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\gdi32.dll
Total events
2 395
Read events
2 374
Write events
21
Delete events
0

Modification events

(PID) Process:(1796) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(520) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1796) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
28
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\msvcr120.dllexecutable
MD5:034CCADC1C073E4216E9466B720F9849
SHA256:86E39B5995AF0E042FCDAA85FE2AEFD7C9DDC7AD65E6327BD5E7058BC3AB615F
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\D3DCompiler_43.dllexecutable
MD5:1C9B45E87528B8BB8CFA884EA0099A85
SHA256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\nssckbi.dllexecutable
MD5:CB2C4AB44B14C9567015EC4352A4FBBC
SHA256:E807076EDEFA13AA292A6DB354F98A8243C868F71988C7D80954B14816107588
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\libEGL.dllexecutable
MD5:F761BE1F6E49B08A8724496D1FE16343
SHA256:6806DEF406AE61AFEDBDF8C3D70E5FF8B85B21DDFEF910080AE263932A6E106E
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\icuuc56.dllexecutable
MD5:CD75F5084539123B8664D05A42649498
SHA256:DB4A924F2DE1998590918702ABE526CFC5579646C8F327E14E445E62B1F789D4
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\freebl3.dllexecutable
MD5:D17E43F3F93FE70CBD2B474CBB52749B
SHA256:7917402A4102E301B1C48E68D6C8F45DCD302D604BCCA9822AC707403DB35294
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\plugin-container.exeexecutable
MD5:E428725AE38BF1803CCCBF348D280D39
SHA256:70AD689E89C97476474F209A802167EB058DCE71C7EEBE83FA633C8920B24461
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\mozglue.dllexecutable
MD5:67360640285661EB1004C704D760F7AD
SHA256:0EDCFA424F9DA0D1894D99B99DB4DE8EA1B31F7717E8E14DD643F87D4D1C8EB6
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\AccessibleMarshal.dllexecutable
MD5:59CC6AD62CDB45A281A602369DC69FDA
SHA256:F16C9311830CA1628448AE4ABA4B54DF33AC1CD1682BCBBB129E4B28D6536B6C
1796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1796.38675\Firefox\sandboxbroker.dllexecutable
MD5:E15060600DD74BAFF625E75132BEB6AF
SHA256:C58556EA4237F702C5893756006788CB17B5EF16B8D97BFEDE1C51432C35AB79
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1088
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
prx.biz
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
No debug info