File name:

URET v1.7 Keygen For Malwarebytes.zip

Full analysis: https://app.any.run/tasks/77b103bb-e19f-4121-86a6-b0a2a62a210e
Verdict: Malicious activity
Analysis date: June 27, 2024, 10:17:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

735F77B30670F266B0F7433CCE61E6C2

SHA1:

8E8D2A36F27CE3D102FE2756621768FB743B3DAA

SHA256:

E06C77B1CF1440E494009A769A3A837D3B1E14E736466B746771604CCDE817B9

SSDEEP:

12288:Z3x0LZjzhuQD15/TMUwKssdNwCHXcjvb58b9:Z3x0dRJp5/T3BsOwCMj98h

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1068)
    • Modifies hosts file to block updates

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1068)
      • WinRAR.exe (PID: 4728)
    • Application launched itself

      • WinRAR.exe (PID: 1068)
    • Reads the Windows owner or organization settings

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
    • Searches for installed software

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
    • Creates a software uninstall entry

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4728)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 4728)
    • Checks supported languages

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
    • Reads the computer name

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
    • Creates files or folders in the user directory

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
    • Reads the machine GUID from the registry

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
    • Creates files in the program directory

      • MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe (PID: 3232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2018:12:06 01:02:32
ZipCRC: 0xc6cb8653
ZipCompressedSize: 242
ZipUncompressedSize: 342
ZipFileName: English Tutorial.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe malwarebytes_anti-malware_keygen_v1.7_uret.exe no specs malwarebytes_anti-malware_keygen_v1.7_uret.exe

Process information

PID
CMD
Path
Indicators
Parent process
1068"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\URET v1.7 Keygen For Malwarebytes.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1096"C:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exeWinRAR.exe
User:
admin
Company:
URET
Integrity Level:
MEDIUM
Description:
MalwareBytes_Anti-Malware_DFoX
Exit code:
3221226540
Version:
1.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4728.25812\malwarebytes_anti-malware_keygen_v1.7_uret.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3232"C:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exe
WinRAR.exe
User:
admin
Company:
URET
Integrity Level:
HIGH
Description:
MalwareBytes_Anti-Malware_DFoX
Version:
1.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4728.25812\malwarebytes_anti-malware_keygen_v1.7_uret.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4728"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa1068.25618\URET v1.7 Keygen Malwarebytes.rar"C:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
9 201
Read events
9 130
Write events
71
Delete events
0

Modification events

(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\URET v1.7 Keygen For Malwarebytes.zip
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1068) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
1
Suspicious files
2
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exeexecutable
MD5:31CEA736B899295526B0F750BFC5362B
SHA256:6AB07188EF43720F78D19FBCBDF31A65768C27FCAE0899E9DC96106A5589C574
4728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\Pasta de exclusão.txttext
MD5:65A0201F8283C2F3C1960146EF063A83
SHA256:73A27AF4300C85E32A5060BBCE2F6B9B41240FEE05D4FA8D331B5F7B21AC7132
3232MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exeC:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\Configuration\license.confbinary
MD5:88A1F7F17383A9D7C1152ECF2E4E3134
SHA256:C624D20E4F6BA44C6D91473C4E951FBF14B271F209CBB0A6094CA4C8023FF0EE
3232MalwareBytes_Anti-Malware_Keygen_v1.7_URET.exeC:\WINDOWS\system32\drivers\etc\hoststext
MD5:66A51EB3EF38C119B77A7A23B2872598
SHA256:A8ED90D89CE28CC2EBFA9B77D59CA509400CF77DC73D76FC8158C5E78923AFAC
4728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4728.25812\Tutorial.txttext
MD5:819F090666638D7AADA0A5F448FAB510
SHA256:3933A2F4F693A38DF61D80221A09089AB031B62F8260A9DF4D525386640EB342
1068WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa1068.25618\URET v1.7 Keygen Malwarebytes.rarcompressed
MD5:DE7E46FE549A6B1866FA95823B2251B0
SHA256:9EA7FB86A816A5126CC81235B6CDF885DF5921BEA436582C79C410845E2EE0BD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
47
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1544
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
unknown
3040
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
unknown
4052
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
unknown
1280
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
DE
binary
419 b
unknown
1280
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
DE
binary
408 b
unknown
1828
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4032
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
2536
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
1544
svchost.exe
192.229.221.95:80
EDGECAST
US
unknown
4656
SearchApp.exe
184.86.251.21:443
Akamai International B.V.
DE
unknown
1060
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
unknown
3040
OfficeClickToRun.exe
20.189.173.13:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3040
OfficeClickToRun.exe
192.229.221.95:80
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.20
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.72
  • 40.126.32.76
  • 40.126.32.74
  • 40.126.32.140
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
self.events.data.microsoft.com
  • 20.189.173.13
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info