File name:

f9ff1847-2ddc-445a-b2b6-4d74626df083.zip

Full analysis: https://app.any.run/tasks/014072e4-4355-4159-8643-a52d78af0dc9
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 25, 2019, 20:03:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
adware
installcore
pup
addrop
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

88C9511CB449A85AB0E78DDDA423EA69

SHA1:

9D93E122DED8A9FCFC0A806A05CF5EF231A5A0EE

SHA256:

E645D18D739E06ED5D690E2DF7B2D34D1044BB3F02A65120008FB212086333E0

SSDEEP:

24576:g3U5pjVeSB/jwB60Tv6l4cQquiZKUEnoD+gh0JMLVgvydtxxkVU0qgLu5VDjmA/k:gE5pjVe48BtcbulkyOwoKydPxIsJlCAc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • adobe_flash_setup_2286150208.exe (PID: 2780)
      • adobe_flash_setup_2286150208.exe (PID: 3116)
      • adobe_flash_setup_2286150208.exe (PID: 3188)
    • INSTALLCORE was detected

      • adobe_flash_setup_2286150208.exe (PID: 3116)
    • Connects to CnC server

      • adobe_flash_setup_2286150208.exe (PID: 3116)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3276)
    • Reads the machine GUID from the registry

      • adobe_flash_setup_2286150208.exe (PID: 3116)
    • Application launched itself

      • adobe_flash_setup_2286150208.exe (PID: 2780)
      • adobe_flash_setup_2286150208.exe (PID: 3116)
    • Reads Environment values

      • adobe_flash_setup_2286150208.exe (PID: 3116)
    • Reads CPU info

      • adobe_flash_setup_2286150208.exe (PID: 3116)
    • Reads internet explorer settings

      • adobe_flash_setup_2286150208.exe (PID: 3116)
    • Reads Windows Product ID

      • adobe_flash_setup_2286150208.exe (PID: 3116)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2017:10:14 22:50:28
ZipCRC: 0x91b98f3c
ZipCompressedSize: 1543528
ZipUncompressedSize: 1569483
ZipFileName: Users/legag/Desktop/adobe_flash_setup_2286150208.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe adobe_flash_setup_2286150208.exe no specs #INSTALLCORE adobe_flash_setup_2286150208.exe adobe_flash_setup_2286150208.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2780"C:\Users\admin\Desktop\adobe_flash_setup_2286150208.exe" C:\Users\admin\Desktop\adobe_flash_setup_2286150208.exeexplorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Nonaranelu Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\desktop\adobe_flash_setup_2286150208.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3116"C:\Users\admin\Desktop\adobe_flash_setup_2286150208.exe" /RSF /ppn:YyhwYgxaFRAiP211FM5W /mnlC:\Users\admin\Desktop\adobe_flash_setup_2286150208.exe
adobe_flash_setup_2286150208.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Nonaranelu Setup
Exit code:
4294967206
Version:
Modules
Images
c:\users\admin\desktop\adobe_flash_setup_2286150208.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
3188"C:\Users\admin\Desktop\adobe_flash_setup_2286150208.exe" /_ShowProgress /PrTxt:TG9hZGluZy4uLg== /mnlC:\Users\admin\Desktop\adobe_flash_setup_2286150208.exeadobe_flash_setup_2286150208.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Nonaranelu Setup
Exit code:
259
Version:
Modules
Images
c:\users\admin\desktop\adobe_flash_setup_2286150208.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3276"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\f9ff1847-2ddc-445a-b2b6-4d74626df083.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
505
Read events
451
Write events
54
Delete events
0

Modification events

(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3276) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\f9ff1847-2ddc-445a-b2b6-4d74626df083.zip
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(3276) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
1
Suspicious files
2
Text files
97
Unknown types
0

Dropped files

PID
Process
Filename
Type
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\0010D534.log
MD5:
SHA256:
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\csshover3.htchtml
MD5:52FA0DA50BF4B27EE625C80D36C67941
SHA256:E37E99DDFC73AC7BA774E23736B2EF429D9A0CB8C906453C75B14C029BDD5493
3276WinRAR.exeC:\Users\admin\Desktop\adobe_flash_setup_2286150208.exeexecutable
MD5:
SHA256:
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\images\Close.pngimage
MD5:C222A4F3D309721C0898606960120266
SHA256:F638CC042B7ADE6F43F2FAF0077E020137562E559178396B7E975DB39AC13DF6
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\css\sdk-ui\images\progress-bg2.pngimage
MD5:B582D9A67BFE77D523BA825FD0B9DAE3
SHA256:AB4EEB3EA1EEF4E84CB61ECCB0BA0998B32108D70B3902DF3619F4D9393F74C3
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\css\sdk-ui\images\progress-bg.pngimage
MD5:E9F12F92A9EEB8EBE911080721446687
SHA256:C1CF449536BC2778E27348E45F0F53D04C284109199FB7A9AF7A61016B91F8BC
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\css\sdk-ui\images\progress-bg-corner.pngimage
MD5:608F1F20CD6CA9936EAA7E8C14F366BE
SHA256:86B6E6826BCDE2955D64D4600A4E01693522C1FDDF156CE31C4BA45B3653A7BD
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\css\sdk-ui\checkbox.csstext
MD5:64773C6B0E3413C81AEBC46CCE8C9318
SHA256:B09504C1BF0486D3EC46500592B178A3A6C39284672AF8815C3687CC3D29560D
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\css\sdk-ui\images\button-bg.pngimage
MD5:98B1DE48DFA64DC2AA1E52FACFBEE3B0
SHA256:2693930C474FE640E2FE8D6EF98ABE2ECD303D2392C3D8B2E006E8942BA8F534
2780adobe_flash_setup_2286150208.exeC:\Users\admin\AppData\Local\Temp\inH110315651648\images\Close_Hover.pngimage
MD5:F5BDB3CABDC15580D97FA94AA3397C08
SHA256:B28DB98F2A6B06B6783B8FCA6AABDCB89234D5BD4306FA71711988DBA1FC71EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
4
DNS requests
2
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3116
adobe_flash_setup_2286150208.exe
POST
18.203.190.76:80
http://info.notatolol2.com/?ciko=0
US
malicious
3116
adobe_flash_setup_2286150208.exe
POST
200
52.214.73.247:80
http://rp.notatolol2.com/
IE
malicious
3116
adobe_flash_setup_2286150208.exe
POST
200
52.214.73.247:80
http://rp.notatolol2.com/
IE
malicious
3116
adobe_flash_setup_2286150208.exe
POST
200
52.214.73.247:80
http://rp.notatolol2.com/
IE
malicious
3116
adobe_flash_setup_2286150208.exe
POST
200
52.214.73.247:80
http://rp.notatolol2.com/
IE
malicious
3116
adobe_flash_setup_2286150208.exe
POST
18.203.190.76:80
http://info.notatolol2.com/?xeciyef=2
US
malicious
3116
adobe_flash_setup_2286150208.exe
POST
500
18.203.190.76:80
http://info.notatolol2.com/?fejev=1
US
text
21 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3116
adobe_flash_setup_2286150208.exe
52.214.73.247:80
rp.notatolol2.com
Amazon.com, Inc.
IE
malicious
3116
adobe_flash_setup_2286150208.exe
18.203.190.76:80
info.notatolol2.com
US
malicious

DNS requests

Domain
IP
Reputation
rp.notatolol2.com
  • 52.214.73.247
  • 54.194.149.175
malicious
info.notatolol2.com
  • 18.203.190.76
  • 52.212.157.66
  • 52.209.116.64
malicious

Threats

PID
Process
Class
Message
3116
adobe_flash_setup_2286150208.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
3116
adobe_flash_setup_2286150208.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
3116
adobe_flash_setup_2286150208.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
3116
adobe_flash_setup_2286150208.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
3116
adobe_flash_setup_2286150208.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
3116
adobe_flash_setup_2286150208.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
6 ETPRO signatures available at the full report
No debug info