URL: | https://keygenninja.com/serial/clip_studio_paint_ex.html |
Full analysis: | https://app.any.run/tasks/08b45b9c-a0aa-4fcb-8219-93c0800472a6 |
Verdict: | Malicious activity |
Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
Analysis date: | November 27, 2021, 07:45:20 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MD5: | A0C08C50AE9D7B9F89883536FE9AE25F |
SHA1: | 56E3B12BB5FF84C968E08FEE50F4DC0577A970E0 |
SHA256: | D4853C54FA6144485B0C798E3C6B7F1A125AD486E7A52ADC89EA36C384DECACD |
SSDEEP: | 3:N8FVY3XmGJMQqYMwJ:24nmGC6 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
636 | "C:\Windows\System32\cmd.exe" /q /R cOPY /Y "C:\Users\admin\AppData\Roaming\8691899.exe" ..\QbCcS2vT3RCF.eXe &&sTaRT ..\QBCCS2VT3RCF.EXe -PBGCzmo7oGd9HGeZ5 & iF ""=="" for %g IN ("C:\Users\admin\AppData\Roaming\8691899.exe") do taskkill -F -IM "%~nXg" | C:\Windows\System32\cmd.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
648 | "C:\Users\admin\AppData\Local\Temp\RarSFX2\key.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX2\key.exe | keygen-pr.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
700 | keygen-step-1.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
876 | C:\Users\admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat | C:\Users\admin\AppData\Local\Temp\RarSFX2\key.exe | — | key.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
924 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\system32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
976 | "C:\Windows\System32\cmd.exe" /q /R cOPY /Y "C:\Users\admin\AppData\Local\Temp\QbCcS2vT3RCF.eXe" ..\QbCcS2vT3RCF.eXe &&sTaRT ..\QBCCS2VT3RCF.EXe -PBGCzmo7oGd9HGeZ5 & iF "-PBGCzmo7oGd9HGeZ5 "=="" for %g IN ("C:\Users\admin\AppData\Local\Temp\QbCcS2vT3RCF.eXe") do taskkill -F -IM "%~nXg" | C:\Windows\System32\cmd.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1000 | "C:\Users\admin\AppData\Roaming\1339982.exe" | C:\Users\admin\AppData\Roaming\1339982.exe | — | 5084066.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 2 Modules
| |||||||||||||||
1112 | "C:\Program Files\Internet Explorer\iexplore.exe" "https://keygenninja.com/serial/clip_studio_paint_ex.html" | C:\Program Files\Internet Explorer\iexplore.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
1236 | "C:\Users\admin\AppData\Roaming\1818664.exe" | C:\Users\admin\AppData\Roaming\1818664.exe | PBrowserSetp94213.exe | ||||||||||||
User: admin Company: jsdifaiofdd Integrity Level: MEDIUM Description: jsdifaiofdd Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
1240 | "C:\Users\admin\AppData\Roaming\505498.exe" | C:\Users\admin\AppData\Roaming\505498.exe | PBrowserSetp94213.exe | ||||||||||||
User: admin Company: CRYPTOCOMPANY OU Integrity Level: MEDIUM Description: CryptoTab Update Setup Exit code: 0 Version: 1.3.99.31 Modules
|
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30925666 | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30925666 | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
(PID) Process: | (1112) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\clip_studio_paint_ex[1].htm | html | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | der | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\19FB0810D6D811525C3D80FC1099D26B | der | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | binary | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_E81D30836CB09660A7E3C5D921621623 | binary | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA | binary | |
MD5:— | SHA256:— | |||
2708 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19FB0810D6D811525C3D80FC1099D26B | binary | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1112 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D | US | der | 1.47 Kb | whitelisted |
2708 | iexplore.exe | GET | 200 | 95.100.146.41:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgQs6tApjMiMwW0z0A%2FL85VuiA%3D%3D | unknown | der | 503 b | shared |
2708 | iexplore.exe | GET | 200 | 84.53.161.98:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso | unknown | der | 1.50 Kb | whitelisted |
2708 | iexplore.exe | GET | 200 | 95.100.146.41:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgRf7E0Poc9a0tQKfj36Yw8EuA%3D%3D | unknown | der | 503 b | shared |
1112 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | US | der | 471 b | whitelisted |
2708 | iexplore.exe | GET | 200 | 142.250.185.99:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
2708 | iexplore.exe | GET | 200 | 84.53.161.98:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I | unknown | der | 1.54 Kb | whitelisted |
2708 | iexplore.exe | GET | 200 | 142.250.185.99:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCKJpvy9pIOCwoAAAABGVGE | US | der | 472 b | whitelisted |
2708 | iexplore.exe | GET | 200 | 5.45.205.242:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CECosiqdXosrVzE6LrmbYt3c%3D | RU | der | 1.48 Kb | whitelisted |
2708 | iexplore.exe | GET | 200 | 5.45.205.242:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEGkNl2Doc%2BbvdnQCtyRa5ZY%3D | RU | der | 1.48 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2708 | iexplore.exe | 142.250.185.99:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
1112 | iexplore.exe | 37.1.219.39:443 | keygenninja.com | Leaseweb Deutschland GmbH | DE | suspicious |
2708 | iexplore.exe | 142.250.185.78:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
2708 | iexplore.exe | 142.251.5.155:443 | stats.g.doubleclick.net | Google Inc. | US | unknown |
2708 | iexplore.exe | 37.1.219.39:443 | keygenninja.com | Leaseweb Deutschland GmbH | DE | suspicious |
2708 | iexplore.exe | 142.250.185.163:443 | www.google.fr | Google Inc. | US | whitelisted |
1112 | iexplore.exe | 204.79.197.200:443 | www.bing.com | Microsoft Corporation | US | whitelisted |
1112 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2708 | iexplore.exe | 104.16.19.94:443 | cdnjs.cloudflare.com | Cloudflare Inc | US | suspicious |
2708 | iexplore.exe | 172.67.136.55:443 | keygenbat.com | — | US | suspicious |
Domain | IP | Reputation |
---|---|---|
keygenninja.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
www.googletagmanager.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
www.google-analytics.com |
| whitelisted |
stats.g.doubleclick.net |
| whitelisted |
www.google.com |
| malicious |
www.google.fr |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz) |
— | — | Potentially Bad Traffic | ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz) |
— | — | A Network Trojan was detected | ET TROJAN Win32/AZORult V3.3 Client Checkin M2 |
— | — | A Network Trojan was detected | AV TROJAN Azorult CnC Beacon |
— | — | Potentially Bad Traffic | ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz) |
— | — | A Network Trojan was detected | ET TROJAN Win32.Raccoon Stealer CnC Activity (dependency download) |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potentially Bad Traffic | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
— | — | A Network Trojan was detected | ET TROJAN Win32.Raccoon Stealer CnC Activity (dependency download) |