File name: | Skisploit.rar |
Full analysis: | https://app.any.run/tasks/7c88cb5d-78fd-4e1e-b625-506a47ac818b |
Verdict: | Malicious activity |
Analysis date: | November 29, 2020, 11:26:46 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v5 |
MD5: | 5CFD7593357656A86C36842CBECDA744 |
SHA1: | 8577064920CFCBA5EF0D1606BE557307B2181B55 |
SHA256: | F7BBA465958CE016E38201B921EA8B0D38E81B9D08C787944577DD27890DA2DC |
SSDEEP: | 12288:DOS4vFsWo1qV/tM5rzXdw+KyRkvwv5aVp939orzLAhpKTCIgdv+p:v4SaCrztoyyP3urPAq21dWp |
.rar | | | RAR compressed archive (v5.0) (61.5) |
---|---|---|
.rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1952 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Skisploit.rar" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
1800 | "C:\Users\admin\Desktop\Skisploit.exe" | C:\Users\admin\Desktop\Skisploit.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Description: Skisploit Exit code: 0 Version: 2.0.0.5 | ||||
2208 | "C:\Program Files\Internet Explorer\iexplore.exe" https://www.thundermods.com/skisploit/ | C:\Program Files\Internet Explorer\iexplore.exe | Skisploit.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) | ||||
1920 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2208 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) |
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Skisploit.rar | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
(PID) Process: | (1952) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\AppData\Local\Temp |
PID | Process | Filename | Type | |
---|---|---|---|---|
1920 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\Cab97AA.tmp | — | |
MD5:— | SHA256:— | |||
1920 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\Tar97AB.tmp | — | |
MD5:— | SHA256:— | |||
1920 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZI4LVO1F.txt | text | |
MD5:A46D623CBF99C77B9D685B8F2308950C | SHA256:D9FEA1F2EC730A7C572966A8AD092CA733F75CD24556762BE2815CDB567676B7 | |||
1920 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B | binary | |
MD5:DE4E3C097DA202E20CE084971DEBB7B2 | SHA256:5DA1112F489FB36534B14239F66EB503943B5F8161AF7BE17AF6ADDDA6C4A0A8 | |||
1920 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_E352512347F74186AC3F25D8D82AB077 | der | |
MD5:5B175C5F21C26BFED4D6ACAB59F93AEE | SHA256:9C1249F35852D473C22BA6B5031E59EB91D68329DB66062D71A3D069A1A54D27 | |||
1920 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_20A41EFA74E592D2C51332C2C36EBF7F | der | |
MD5:92CC78C3E8AA9F7437BF2A08D3C28E1A | SHA256:3F42810949E895D9B44144D311E086AC58A7D03D2509C816F635538B0F256BD7 | |||
2208 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
1952 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1952.5945\Skisploit.exe | executable | |
MD5:72404D7D768691617FFE3151755548AC | SHA256:24DA4634D57F2BBFB0110AA18747D6E1C642868204FB26F5BF27320C4D7BF5B8 | |||
1920 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:BE439D1F37ED29054A024F7A77AC1070 | SHA256:2CA2B71BAB04FEC9B82094D2B66E7FA47E3B0DB7FB0820A9DF2D01A983D26DE5 | |||
1920 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | der | |
MD5:3C60995A36CA6C29EF469C1899B82CF3 | SHA256:934775ADFA43C2FAF6BC5CF430C4EDD809F74F851743CE2255716921080D0716 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1800 | Skisploit.exe | GET | 200 | 172.67.221.166:80 | http://api.thundermods.com/updatelink.txt | US | text | 38 b | malicious |
1800 | Skisploit.exe | GET | 200 | 172.67.221.166:80 | http://api.thundermods.com/updatemessage.txt | US | text | 189 b | malicious |
1920 | iexplore.exe | GET | 200 | 92.122.214.147:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
1920 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | US | der | 1.47 Kb | whitelisted |
1920 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEATXi7Ndo9ER0%2FY0D5NxnyM%3D | US | der | 278 b | whitelisted |
1920 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEATXi7Ndo9ER0%2FY0D5NxnyM%3D | US | der | 278 b | whitelisted |
1920 | iexplore.exe | GET | 200 | 172.217.18.3:80 | http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDa2MTpyZrzlQgAAAAAYth4 | US | der | 472 b | whitelisted |
1920 | iexplore.exe | GET | 200 | 172.217.18.3:80 | http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDa2MTpyZrzlQgAAAAAYth4 | US | der | 472 b | whitelisted |
1920 | iexplore.exe | GET | 200 | 92.122.214.147:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
1920 | iexplore.exe | GET | 200 | 172.217.18.3:80 | http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDgM%2F2Oalb9SggAAAAAYth0 | US | der | 472 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1920 | iexplore.exe | 216.58.206.10:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
1920 | iexplore.exe | 139.45.196.84:443 | tharbadir.com | — | US | unknown |
1800 | Skisploit.exe | 172.67.221.166:80 | api.thundermods.com | — | US | suspicious |
1920 | iexplore.exe | 104.24.107.9:443 | api.thundermods.com | Cloudflare Inc | US | shared |
1920 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
1920 | iexplore.exe | 172.217.18.3:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
1920 | iexplore.exe | 92.122.214.147:80 | isrg.trustid.ocsp.identrust.com | Akamai International B.V. | — | unknown |
1920 | iexplore.exe | 172.67.75.33:443 | static.lalaping.com | — | US | malicious |
— | — | 172.67.75.33:443 | static.lalaping.com | — | US | malicious |
1920 | iexplore.exe | 151.139.128.14:80 | ocsp.usertrust.com | Highwinds Network Group, Inc. | US | suspicious |
Domain | IP | Reputation |
---|---|---|
api.thundermods.com |
| malicious |
www.thundermods.com |
| malicious |
ocsp.digicert.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
tharbadir.com |
| malicious |
isrg.trustid.ocsp.identrust.com |
| whitelisted |
ocsp.int-x3.letsencrypt.org |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |