analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Setup_inc_Crack.zip

Full analysis: https://app.any.run/tasks/e56a56b1-3cf3-47b4-b795-46fc4d608fdf
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: January 22, 2019, 16:28:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
installcapital
adware
prepscram
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

87CC1032D1898FCF7807A73916581F53

SHA1:

15C802823F4A1BCEEE2362D93A9C416D602F2E09

SHA256:

E616695353DC1A2F4AB4733886F10F583096081E226FFD1F58B225139A2F278B

SSDEEP:

98304:wrfBNK2jL/PUDJk9veTgUukCErVz1sfd0/2TveTgaBmGXCt69fVXHfpDk1lBzLut:wrK8XfEUY1sfdG1H8i1VXHK1l8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • setup.exe (PID: 3608)
      • setup.exe (PID: 2860)
      • setup.exe (PID: 180)
      • setup.exe (PID: 4080)
      • setup.exe (PID: 2552)
      • setup.exe (PID: 2912)
    • PREPSCRAM was detected

      • setup.exe (PID: 4080)
      • setup.exe (PID: 2912)
      • setup.exe (PID: 2860)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3080)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: setup.isn
ZipUncompressedSize: 260001
ZipCompressedSize: 53893
ZipCRC: 0xfd70f700
ZipModifyDate: 2014:05:13 11:07:24
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe explorer.exe no specs setup.exe no specs #PREPSCRAM setup.exe setup.exe no specs #PREPSCRAM setup.exe setup.exe no specs #PREPSCRAM setup.exe

Process information

PID
CMD
Path
Indicators
Parent process
3080"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Setup_inc_Crack.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3372"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3608"C:\test\setup.exe" C:\test\setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
2860"C:\test\setup.exe" C:\test\setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
180"C:\test\setup.exe" C:\test\setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
2912"C:\test\setup.exe" C:\test\setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2552"C:\test\setup.exe" C:\test\setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
4080"C:\test\setup.exe" C:\test\setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Total events
571
Read events
547
Write events
24
Delete events
0

Modification events

(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3080) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Setup_inc_Crack.zip
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3080) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:@C:\Windows\System32\wshext.dll,-4802
Value:
VBScript Script File
(PID) Process:(3080) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\test
Executable files
3
Suspicious files
4
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
3080WinRAR.exeC:\test\plugin\setup.inxbinary
MD5:59EF8571DB6763B0338FAE4A28B6C019
SHA256:58E1E485675BD451DB517D3155FBB44E8539799479F2E9AB1B45E27B5573592F
3080WinRAR.exeC:\test\lib\sig.dattext
MD5:0A6D46640E3CBD295B811FFFEB44DC4B
SHA256:E1155A5C40EC73FAC59A571F4CDFD9657318FF35AD9C4669FD9AB11A0EAF0806
3080WinRAR.exeC:\test\ISSetup.dllexecutable
MD5:265574C116EE116CDFE0CD7BC4FD23B4
SHA256:B353AA7D1ECB530AA3FD55B3AAC540C05E0E507D9520157283D844BB39508F0E
3080WinRAR.exeC:\test\SERIAL.txttext
MD5:D5BB4ADEC53C3EF9379CF8B27A297FD5
SHA256:DC173DECF45DE990175C47140745259918A0A50E75395C5FFB295FA7B77324D4
3080WinRAR.exeC:\test\setup.exeexecutable
MD5:711821439046FA2E02757282736DF88A
SHA256:5613D86AF98E3D7ACA47B45639D3F506D263836EF7A61C59FFF4765279BFCB0B
3080WinRAR.exeC:\test\unins000.dattext
MD5:0A6D46640E3CBD295B811FFFEB44DC4B
SHA256:E1155A5C40EC73FAC59A571F4CDFD9657318FF35AD9C4669FD9AB11A0EAF0806
3080WinRAR.exeC:\test\setup.inxbinary
MD5:59EF8571DB6763B0338FAE4A28B6C019
SHA256:58E1E485675BD451DB517D3155FBB44E8539799479F2E9AB1B45E27B5573592F
3080WinRAR.exeC:\test\plugin\c_64.cpabinary
MD5:A4346F861EC7F2BC6676F062005847C7
SHA256:B434DD072E15145A5DCB25941B222B134F2D4FC23BD04AD28C6193F8440800D1
3080WinRAR.exeC:\test\DelACShortCut.vbstext
MD5:841EE93A367F8BABD5ABAAE4732E39CD
SHA256:19016A1E699F428251456D0C72ED95C93E0F0D479FF5434E5D13CC9DE975E39A
3080WinRAR.exeC:\test\setup.isnbinary
MD5:2C1EAF7365689693F0DB2867680E26F7
SHA256:AB1DDB8870B410A6DB38F02A8D7763DD3A1FA393B7D617CC11392B25BAFD6175
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
6
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2912
setup.exe
GET
200
52.222.163.31:80
http://alt.tubgiants.host/offer.php?affId=7332&trackingId=398618939&instId=7500&ho_trackingid=HO398618939&cc=US&sb=x86&wv=7sp1&db=InternetExplorer&uac=1&cid=5d979308c3b6ea5ad7e984e628c8cac1&v=3&net=4.6.01055&ie=8%2e0%2e7601%2e17514&res=1280x720&osd=474&kid=hqmrb21aukneu10vm9g
US
whitelisted
4080
setup.exe
GET
200
52.222.163.126:80
http://alt.tubgiants.host/offer.php?affId=7332&trackingId=398618939&instId=7500&ho_trackingid=HO398618939&cc=US&sb=x86&wv=7sp1&db=InternetExplorer&uac=1&cid=5d979308c3b6ea5ad7e984e628c8cac1&v=3&net=4.6.01055&ie=8%2e0%2e7601%2e17514&res=1280x720&osd=474&kid=hqmrb21aukneu10vm9g
US
whitelisted
2860
setup.exe
GET
200
52.222.163.31:80
http://alt.tubgiants.host/offer.php?affId=7332&trackingId=398618939&instId=7500&ho_trackingid=HO398618939&cc=US&sb=x86&wv=7sp1&db=InternetExplorer&uac=1&cid=5d979308c3b6ea5ad7e984e628c8cac1&v=3&net=4.6.01055&ie=8%2e0%2e7601%2e17514&res=1280x720&osd=474&kid=hqmrb21aukneu10vm9g
US
whitelisted
2860
setup.exe
POST
200
52.87.100.16:80
http://ec2-52-87-100-16.compute-1.amazonaws.com/stat/col.php
US
shared
4080
setup.exe
POST
200
52.87.100.16:80
http://ec2-52-87-100-16.compute-1.amazonaws.com/stat/col.php
US
shared
2912
setup.exe
POST
200
52.87.100.16:80
http://ec2-52-87-100-16.compute-1.amazonaws.com/stat/col.php
US
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2912
setup.exe
52.87.100.16:80
ec2-52-87-100-16.compute-1.amazonaws.com
Amazon.com, Inc.
US
shared
2860
setup.exe
52.87.100.16:80
ec2-52-87-100-16.compute-1.amazonaws.com
Amazon.com, Inc.
US
shared
4080
setup.exe
52.87.100.16:80
ec2-52-87-100-16.compute-1.amazonaws.com
Amazon.com, Inc.
US
shared
2912
setup.exe
52.222.163.31:80
alt.tubgiants.host
Amazon.com, Inc.
US
malicious
4080
setup.exe
52.222.163.126:80
alt.tubgiants.host
Amazon.com, Inc.
US
whitelisted
2860
setup.exe
52.222.163.31:80
alt.tubgiants.host
Amazon.com, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
ec2-52-87-100-16.compute-1.amazonaws.com
  • 52.87.100.16
shared
alt.tubgiants.host
  • 52.222.163.31
  • 52.222.163.3
  • 52.222.163.126
  • 52.222.163.93
whitelisted

Threats

PID
Process
Class
Message
2860
setup.exe
A Network Trojan was detected
ET TROJAN Generic - POST To .php w/Extended ASCII Characters
2860
setup.exe
A Network Trojan was detected
ET MALWARE PPI User-Agent (InstallCapital)
2860
setup.exe
Misc activity
ADWARE [PTsecurity] SoftwareBundler:Win32/Prepscram
2912
setup.exe
A Network Trojan was detected
ET MALWARE PPI User-Agent (InstallCapital)
2912
setup.exe
Misc activity
ADWARE [PTsecurity] SoftwareBundler:Win32/Prepscram
2912
setup.exe
A Network Trojan was detected
ET TROJAN Generic - POST To .php w/Extended ASCII Characters
4080
setup.exe
A Network Trojan was detected
ET TROJAN Generic - POST To .php w/Extended ASCII Characters
4080
setup.exe
A Network Trojan was detected
ET MALWARE PPI User-Agent (InstallCapital)
4080
setup.exe
Misc activity
ADWARE [PTsecurity] SoftwareBundler:Win32/Prepscram
No debug info