File name:

UFED 4PC 7.47.0.194CRACK.zip

Full analysis: https://app.any.run/tasks/c616c1da-57e5-41a2-bf48-40de32bc8fc9
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: February 19, 2022, 20:55:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

E0380A893A7E99D2AB782C13268D7785

SHA1:

8C9B960117BE6C4C2273D9AB30C2189F0DF3AB4D

SHA256:

EC7FFBF5E5522BCB381F9F4FD3A0467B5FB4995D12653AE98C4972652CA6B914

SSDEEP:

24576:Op5uur8ioKfw6kbyIs5VcrvXyrw11O7UNPICVY1dpuz7d5hzP8puqeNRCbUR:Op5BVQ6kbNDRDOGK1dpC7XhP805bR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3776)
  • SUSPICIOUS

    • Creates files like Ransomware instruction

      • WinRAR.exe (PID: 3020)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3020)
    • Checks supported languages

      • WinRAR.exe (PID: 3020)
      • cmd.exe (PID: 4064)
      • cmd.exe (PID: 2884)
    • Reads the computer name

      • WinRAR.exe (PID: 3020)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 3020)
  • INFO

    • Manual execution by user

      • rundll32.exe (PID: 2844)
      • cmd.exe (PID: 2884)
      • cmd.exe (PID: 4064)
    • Checks supported languages

      • xcopy.exe (PID: 2364)
      • rundll32.exe (PID: 2844)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 1 - Install 1 time/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2021:11:23 09:12:02
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs cmd.exe no specs rundll32.exe no specs cmd.exe no specs xcopy.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2364xcopy /Y "File\licenseforreadingdata.dat" "X:\*"C:\Windows\system32\xcopy.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extended Copy Utility
Exit code:
4
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\xcopy.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ulib.dll
c:\windows\system32\lpk.dll
2844"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\3 - Dongle emolator\.DS_StoreC:\Windows\system32\rundll32.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2884C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\3 - Dongle emolator\Mount dongle.bat" "C:\Windows\system32\cmd.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
4
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
3020"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\UFED 4PC 7.47.0.194CRACK.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3776"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4064C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\3 - Dongle emolator\Umount dongle.bat" "C:\Windows\system32\cmd.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 767
Read events
1 750
Write events
17
Delete events
0

Modification events

(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3020) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\UFED 4PC 7.47.0.194CRACK.zip
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3020) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
5
Suspicious files
0
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
3020WinRAR.exeC:\Users\admin\Desktop\3 - Dongle emolator\.DS_Storeds_store
MD5:36DCE313EFF3795177E946D0D44CE1F5
SHA256:3C4F543249A79ACEB96C2178C0C8C20C5C69C7AF781A3853AEEFE343E639DA9A
3020WinRAR.exeC:\Users\admin\Desktop\3 - Dongle emolator\File\licenseforreadingdata.dattw
MD5:C7EDB0A05D8E8FD0AB0EBE678B936B3E
SHA256:6C0C51A5D61823F6AD3A600AE4398913857BB96DB1709CAD73ACE887857F008A
3020WinRAR.exeC:\Users\admin\Desktop\3 - Dongle emolator\Umount dongle.battext
MD5:61E3B8319CBFE02D9A13BF5E6A8A5933
SHA256:6C7ECD2499A76958E5256456D806DF98B4385753A847DBA2713812026DA6CB97
3020WinRAR.exeC:\Users\admin\Desktop\README.txttext
MD5:7430A96A84C6AA36839BABABC1F5E0B6
SHA256:CB5A28C61825983D07FBB4452422F7407EFBA7A75F7E021176867488D45DF112
3020WinRAR.exeC:\Users\admin\Desktop\2 - Copy to software folder\Cellebrite.Exodus.Devices.dllexecutable
MD5:A5534DFA7198B7D1C2D2C2B80BA903D5
SHA256:FC3D1A48DD961C247283BA17D663272847A4B9191EDF39EBE90EE078C9C7C613
3020WinRAR.exeC:\Users\admin\Desktop\2 - Copy to software folder\Cellebrite.License.Connector.dllexecutable
MD5:E90BCE910A502CDD87CFDD1B99D43833
SHA256:B4913273051B259604CD2D15D23C026ABE1BA3D0019212BE1958035F383D9DBD
3020WinRAR.exeC:\Users\admin\Desktop\2 - Copy to software folder\Cellebrite.CMS.Client.dllexecutable
MD5:07407D9775BB089BEF4CADBDC81932A3
SHA256:4F62737F59499AC2276711C4C1F3FB18C2EEF3BB9DA2FC09306A015370495C46
3020WinRAR.exeC:\Users\admin\Desktop\1 - Install 1 time\UFED4PC_CR.exeexecutable
MD5:AB8EAFE7340C6F2CD58D2B754A714FDB
SHA256:71A46DD5EBF756F390AA84B871058836DC9CC06236E0DDFAFF9547376DE519F2
3020WinRAR.exeC:\Users\admin\Desktop\2 - Copy to software folder\Exodus.Core.dllexecutable
MD5:9D976941358BBF1F538042129700B9CE
SHA256:2E49AC3FB498581CABA9238BD1E10AE6BA88E04717885B664772671D0DA36EEF
3020WinRAR.exeC:\Users\admin\Desktop\3 - Dongle emolator\Mount dongle.battext
MD5:8E23F013F62FEAF6619F86073C2911A2
SHA256:6103F82E6946065833BEBE18EF23C00589BA8B89EED5CF2227D1CD8F4A46D534
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info