File name:

camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857.zip

Full analysis: https://app.any.run/tasks/e3c780a9-077e-4897-acc5-de38a6424b2f
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: July 25, 2020, 13:00:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F01F5AFA4DF161058E01382B9584406D

SHA1:

98DD03AD687FDBB20C6379F506BB6B29D02B90B6

SHA256:

EF7E7B6BC7112EC8F7E51704E88E50E22F30FE253CA048577E4019E2EAE433F2

SSDEEP:

98304:VDYxdGKR2f/3e4e5KOvcgBRylS5cDW++pNgMPwMx/9Vy6Hj1uuSe19F:VaUKRE/3e4e5bZRyl6cD7+pCMPwSy6H1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • installer_file.exe (PID: 2472)
      • installer_file.exe (PID: 3396)
      • 31.exe (PID: 4092)
      • ns15E7.tmp (PID: 2728)
      • nhufnisnhyb.exe (PID: 3800)
    • Loads dropped or rewritten executable

      • installer_file.exe (PID: 3396)
    • Changes settings of System certificates

      • CScript.exe (PID: 3668)
      • 31.exe (PID: 4092)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 892)
      • installer_file.exe (PID: 3396)
      • 31.exe (PID: 4092)
    • Starts application with an unusual extension

      • installer_file.exe (PID: 3396)
    • Reads Internet Cache Settings

      • CScript.exe (PID: 3668)
      • 31.exe (PID: 4092)
    • Executes scripts

      • ns15E7.tmp (PID: 2728)
    • Creates files in the program directory

      • installer_file.exe (PID: 3396)
      • nhufnisnhyb.exe (PID: 3800)
    • Adds / modifies Windows certificates

      • CScript.exe (PID: 3668)
      • 31.exe (PID: 4092)
    • Starts CMD.EXE for commands execution

      • 31.exe (PID: 4092)
    • Checks for external IP

      • 31.exe (PID: 4092)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 892)
      • installer_file.exe (PID: 3396)
      • installer_file.exe (PID: 2472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:07:25 12:57:18
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
10
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs winrar.exe installer_file.exe no specs installer_file.exe ns15e7.tmp no specs cscript.exe 31.exe cmd.exe no specs nhufnisnhyb.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
880"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\ruvvuknoy.exe"C:\Windows\system32\cmd.exe31.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
892"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file.zip" "?\"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2248"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2472"C:\Users\admin\Desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file\installer_file.exe" C:\Users\admin\Desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file\installer_file.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
7.2.0.0
Modules
Images
c:\users\admin\desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file\installer_file.exe
c:\systemroot\system32\ntdll.dll
2608"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\admin\AppData\Local\Temp\nhufnisnhyb.exe"C:\Windows\system32\cmd.exe31.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2728"C:\Users\admin\AppData\Local\Temp\nsf1598.tmp\ns15E7.tmp" "C:\Windows\system32\CScript.exe" "C:\Program Files\Logerston\later\31.vbs" //e:vbscript //B //NOLOGO C:\Users\admin\AppData\Local\Temp\nsf1598.tmp\ns15E7.tmpinstaller_file.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsf1598.tmp\ns15e7.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3396"C:\Users\admin\Desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file\installer_file.exe" C:\Users\admin\Desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file\installer_file.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
7.2.0.0
Modules
Images
c:\users\admin\desktop\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file\installer_file.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3668"C:\Windows\system32\CScript.exe" "C:\Program Files\Logerston\later\31.vbs" //e:vbscript //B //NOLOGO C:\Windows\system32\CScript.exe
ns15E7.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3800"C:\Users\admin\AppData\Local\Temp\nhufnisnhyb.exe" C:\Users\admin\AppData\Local\Temp\nhufnisnhyb.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nhufnisnhyb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
4092"C:\Program Files\Logerston\later\31.exe"C:\Program Files\Logerston\later\31.exe
installer_file.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\logerston\later\31.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
Total events
728
Read events
670
Write events
58
Delete events
0

Modification events

(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2248) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\132\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857.zip
(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(892) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(892) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
Executable files
10
Suspicious files
11
Text files
11
Unknown types
5

Dropped files

PID
Process
Filename
Type
2248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2248.39766\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\File Password is 44556677.txt
MD5:
SHA256:
2248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2248.39766\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\NOTE - USE winrar to extract files .txt
MD5:
SHA256:
2248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2248.39766\camtasia-studio-2020-0-5-crack-keygen-full-key-download-1595681857-zip\installer_file.zip
MD5:
SHA256:
3668CScript.exeC:\Users\admin\AppData\Local\Temp\Cab1A88.tmp
MD5:
SHA256:
3668CScript.exeC:\Users\admin\AppData\Local\Temp\Tar1A89.tmp
MD5:
SHA256:
409231.exeC:\Users\admin\AppData\Local\Temp\Cab2C3C.tmp
MD5:
SHA256:
409231.exeC:\Users\admin\AppData\Local\Temp\Tar2C3D.tmp
MD5:
SHA256:
3668CScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08binary
MD5:
SHA256:
3668CScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08der
MD5:
SHA256:
409231.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
12
DNS requests
8
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3668
CScript.exe
GET
200
2.16.186.35:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
4092
31.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D
US
der
1.47 Kb
whitelisted
3668
CScript.exe
GET
200
2.16.186.11:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgObfHHgHlsa0R7fVL2Sj72S7g%3D%3D
unknown
der
527 b
whitelisted
4092
31.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
4092
31.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAgt9o7pxpMVvr9yB5s4EP0%3D
US
der
471 b
whitelisted
GET
200
208.95.112.1:80
http://ip-api.com/line
unknown
text
205 b
malicious
4092
31.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
text
346 b
malicious
POST
200
37.46.132.97:80
http://gfile08.top/index.php
RU
text
39 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3668
CScript.exe
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
3668
CScript.exe
2.16.186.35:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
3668
CScript.exe
2.16.186.11:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
4092
31.exe
18.205.93.0:443
bitbucket.org
US
malicious
4092
31.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
88.99.66.31:443
iplogger.org
Hetzner Online GmbH
DE
malicious
37.46.132.97:80
gfile08.top
JSC ISPsystem
RU
malicious
4092
31.exe
52.216.89.59:443
bbuseruploads.s3.amazonaws.com
Amazon.com, Inc.
US
unknown
4092
31.exe
208.95.112.1:80
ip-api.com
IBURST
malicious
208.95.112.1:80
ip-api.com
IBURST
malicious

DNS requests

Domain
IP
Reputation
iplogger.org
  • 88.99.66.31
shared
isrg.trustid.ocsp.identrust.com
  • 2.16.186.35
  • 2.16.186.11
whitelisted
ocsp.int-x3.letsencrypt.org
  • 2.16.186.11
  • 2.16.186.27
whitelisted
bitbucket.org
  • 18.205.93.0
  • 18.205.93.1
  • 18.205.93.2
shared
ocsp.digicert.com
  • 93.184.220.29
whitelisted
bbuseruploads.s3.amazonaws.com
  • 52.216.89.59
shared
ip-api.com
  • 208.95.112.1
malicious
gfile08.top
  • 37.46.132.97
  • 193.201.126.21
malicious

Threats

PID
Process
Class
Message
3668
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
3668
CScript.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
4092
31.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
4092
31.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
10 ETPRO signatures available at the full report
Process
Message
31.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
nhufnisnhyb.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------