analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Battlefield-1-Keygen-Serial-Key-Generator.rar

Full analysis: https://app.any.run/tasks/0821bc56-a949-439b-b835-4dddeef465a3
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 02, 2019, 17:36:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

77AA0C5E2F0229A0754C5142C83AF412

SHA1:

1C35D845C9D1FBB38728AC64C565A8183587583E

SHA256:

D3BA73321FF1E097902DD5CBBBF69AFF38E1808F2A6D8C5C66AC54E338C9880D

SSDEEP:

12288:/6zqlfEEuVjTRDnrZ8HZDKk/FG5VYGD1KOAbW1GyfuEOSVMSG9WCGOg:/f+EuVd18HZDKk/6YGDq6wyPCSGI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Battlefield-1-Keygen-Serial-Key-Generator.exe (PID: 2300)
  • SUSPICIOUS

    • Executed via COM

      • DllHost.exe (PID: 1908)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2132)
    • Creates files like Ransomware instruction

      • Battlefield-1-Keygen-Serial-Key-Generator.exe (PID: 2300)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2608)
    • Manual execution by user

      • WINWORD.EXE (PID: 2608)
      • explorer.exe (PID: 1516)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2608)
    • Dropped object may contain TOR URL's

      • Battlefield-1-Keygen-Serial-Key-Generator.exe (PID: 2300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

ArchivedFileName: Battlefield-1-Keygen-Serial-Key-Generator.exe
PackingMethod: Normal
ModifyDate: 2016:05:26 11:50:28
OperatingSystem: Win32
UncompressedSize: 736256
CompressedSize: 669128
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe PhotoViewer.dll no specs winword.exe no specs explorer.exe no specs battlefield-1-keygen-serial-key-generator.exe no specs rar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2132"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Battlefield-1-Keygen-Serial-Key-Generator.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1908C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2608"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\receiveaccounts.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
1516"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2300"C:\Users\admin\AppData\Local\Temp\Rar$EXa2132.26805\Battlefield-1-Keygen-Serial-Key-Generator.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2132.26805\Battlefield-1-Keygen-Serial-Key-Generator.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Runners
Exit code:
0
Version:
1.0.0.0
3792"C:\Program Files\Winrar\Rar.exe" u C:\YOUR-locked-FILES\YourFilesHere-0penWithWinrar.ace -inul -os -ow -r -df -pG!o2z3/A8Ri{?9BqN%s4jC7_} -x*.rar C:\*.txt C:\*.doc* C:\*.xls* C:\*.ppt* C:\*.zip C:\*.mdb C:\*.acc* C:\*.mdb* C:\*.avi* C:\*.wma* C:\*.csv* *.csv* C:\*.jpg* C:\*.png* C:\*.svg* C:\*.wallet* C:\*.eps* C:\*.pdf* C:\*.psd* C:\*.dxg* C:\*.dwg* *.rar* *.7z* *.php* *.css* *.js* *.cfm* *.cfc* *.sql* *.tar* *.backup* *.html *.dat *.sln *.c *.MYD *.MYI *.frmC:\Program Files\Winrar\Rar.exeBattlefield-1-Keygen-Serial-Key-Generator.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
Command line RAR
Version:
5.60.0
Total events
1 952
Read events
1 246
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
16
Unknown types
4

Dropped files

PID
Process
Filename
Type
2608WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR1B9C.tmp.cvr
MD5:
SHA256:
2300Battlefield-1-Keygen-Serial-Key-Generator.exeC:\Users\admin\AppData\Local\Runners\DefaultDomain_Path_xam5k2ohvvejk1jbprpvrm3sjdnnomr2\1.0.0.0\n00a9jlj.newcfg
MD5:
SHA256:
2300Battlefield-1-Keygen-Serial-Key-Generator.exeC:\Users\admin\AppData\Local\Runners\DefaultDomain_Path_xam5k2ohvvejk1jbprpvrm3sjdnnomr2\1.0.0.0\8vfngjdk.newcfg
MD5:
SHA256:
2608WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{9328A342-9197-402F-84DA-6193C66A3474}.tmp
MD5:
SHA256:
2608WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:DBB8F58E0CC6F197D1744F76162B3426
SHA256:5CF69F4B6766510BBB1B521002A443410901FB4A821F5B9A703B83FB14C32EA7
2300Battlefield-1-Keygen-Serial-Key-Generator.exeC:\Users\admin\Desktop\RecoverYourFiles2.rtftext
MD5:16F9E48B9A9F5E7154CF498B4CF2CFB9
SHA256:77C6CD6AC5BAD8AD13BF2775C6B1843BF217EF1257162AA8494B1B73AFB0E3B9
2132WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2132.26805\Battlefield-1-Keygen-Serial-Key-Generator.exeexecutable
MD5:5424427B66AB5F107F278ACF72182B4B
SHA256:3A2DD7C89418FF6CCC58DCA8558136229682ECF01C9C01AE4E53A9A919632E31
2300Battlefield-1-Keygen-Serial-Key-Generator.exeC:\Users\admin\Desktop\RecoverYourFiles4.rtftext
MD5:16F9E48B9A9F5E7154CF498B4CF2CFB9
SHA256:77C6CD6AC5BAD8AD13BF2775C6B1843BF217EF1257162AA8494B1B73AFB0E3B9
2300Battlefield-1-Keygen-Serial-Key-Generator.exeC:\Users\admin\Desktop\RecoverYourFiles3.rtftext
MD5:16F9E48B9A9F5E7154CF498B4CF2CFB9
SHA256:77C6CD6AC5BAD8AD13BF2775C6B1843BF217EF1257162AA8494B1B73AFB0E3B9
2300Battlefield-1-Keygen-Serial-Key-Generator.exeC:\Users\admin\AppData\Local\Runners\DefaultDomain_Path_xam5k2ohvvejk1jbprpvrm3sjdnnomr2\1.0.0.0\user.configxml
MD5:0C9D9FFFB723D4B79CC535BA5B4A8D53
SHA256:D771B01421D36ED45ECBB6F7878C178A8ABF475851A33767A076F99363422DEC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info