File name:

Bunifu-UI-WinForms-1.11.5.1_ShareAppsCrack.com.rar

Full analysis: https://app.any.run/tasks/b2d0b093-a465-4dfe-9ff0-f1a86496244b
Verdict: Malicious activity
Analysis date: August 11, 2021, 14:59:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, flags: EncryptedBlockHeader
MD5:

4B19E971E1F5EAC6C0672462EF351D94

SHA1:

2A7EA8A84630362E69FB66BA9018F176DA24E318

SHA256:

F9A6650DF2997FE50BC96E473BAD647976A7432027BB5FEE4509CE8CD6B093A2

SSDEEP:

98304:xUFhd11kltKhFB5PscYV0LkM+oe0sy10pUA/n:cd1mXKB2GVsy10pz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Bunifu_UI_Activator_v1.5_By_DFoX.exe (PID: 3492)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1888)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2220)
      • Bunifu_UI_Activator_v1.5_By_DFoX.exe (PID: 3492)
    • Reads the computer name

      • WinRAR.exe (PID: 2220)
      • Bunifu_UI_Activator_v1.5_By_DFoX.exe (PID: 3492)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2220)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2220)
    • Reads internet explorer settings

      • Bunifu_UI_Activator_v1.5_By_DFoX.exe (PID: 3492)
    • Starts Internet Explorer

      • Bunifu_UI_Activator_v1.5_By_DFoX.exe (PID: 3492)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3568)
  • INFO

    • Manual execution by user

      • Bunifu_UI_Activator_v1.5_By_DFoX.exe (PID: 3492)
    • Changes internet zones settings

      • iexplore.exe (PID: 3704)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 3704)
    • Checks supported languages

      • iexplore.exe (PID: 3704)
      • iexplore.exe (PID: 3568)
    • Reads the computer name

      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 3704)
    • Application launched itself

      • iexplore.exe (PID: 3704)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 3704)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3568)
    • Creates files in the user directory

      • iexplore.exe (PID: 3568)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 3704)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs bunifu_ui_activator_v1.5_by_dfox.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1888"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2220"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Bunifu-UI-WinForms-1.11.5.1_ShareAppsCrack.com.rar"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
3492"C:\Users\admin\Desktop\Bunifu UI WinForms 1.11.5.1\Crack\Bunifu_UI_Activator_v1.5_By_DFoX.exe" C:\Users\admin\Desktop\Bunifu UI WinForms 1.11.5.1\Crack\Bunifu_UI_Activator_v1.5_By_DFoX.exeExplorer.EXE
User:
admin
Company:
DeFconX
Integrity Level:
MEDIUM
Description:
Bunifu_UI_Activator_By_DFoX
Exit code:
0
Version:
1.5.0.0
Modules
Images
c:\users\admin\desktop\bunifu ui winforms 1.11.5.1\crack\bunifu_ui_activator_v1.5_by_dfox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3568"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3704 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3704"C:\Program Files\Internet Explorer\iexplore.exe" https://www.dfox.it/C:\Program Files\Internet Explorer\iexplore.exe
Bunifu_UI_Activator_v1.5_By_DFoX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
17 470
Read events
17 354
Write events
115
Delete events
1

Modification events

(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2220) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Bunifu-UI-WinForms-1.11.5.1_ShareAppsCrack.com.rar
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2220) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
26
Suspicious files
16
Text files
127
Unknown types
19

Dropped files

PID
Process
Filename
Type
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuButton.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuColorTransition.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuCircleProgress.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForm.BunifuShadowPanel.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuCheckBox.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForm.BunifuShadowPanel.dllexecutable
MD5:196F5DF1925C55E0DA4092FB3EE2F633
SHA256:52BD07DD1638F848A336039DDF3E4F157974D6AEF6E4919F8A9F1F09485A93EE
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.Core.dllexecutable
MD5:D9F830DFFEDBB2BC371FA60784C01221
SHA256:5F72650F6D3A4A9B77BCDD74159282FCF724BD34AFB989DF6B6E075EA1DD6BC3
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuDatePicker.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuDataGridView.xmlxml
MD5:
SHA256:
2220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2220.16860\Bunifu UI WinForms 1.11.5.1\Bunifu.UI.WinForms.BunifuDropdown.xmlxml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
53
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3568
iexplore.exe
GET
200
23.55.163.57:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
US
der
1.16 Kb
whitelisted
3568
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3568
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEGq%2BdSta4rCACgAAAADyw3Q%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3568
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEBtpDEx%2Fx4YJCgAAAADyw4g%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCECROUtlrVR%2BWCgAAAADyuvQ%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEAFnXJaHpQX8CgAAAAD26ss%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
104.117.200.9:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
3704
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3568
iexplore.exe
142.250.186.174:443
mt2.google.com
Google Inc.
US
whitelisted
3568
iexplore.exe
89.40.175.209:443
www.dfox.it
Supernova S.r.l.
IT
unknown
3568
iexplore.exe
205.185.216.10:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3568
iexplore.exe
23.55.163.57:80
crl.identrust.com
Akamai International B.V.
US
unknown
3568
iexplore.exe
104.117.200.9:80
x1.c.lencr.org
TPG Telecom Limited
US
unknown
3568
iexplore.exe
104.75.88.126:443
s7.addthis.com
Akamai Technologies, Inc.
NL
suspicious
3568
iexplore.exe
216.58.212.138:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3568
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3568
iexplore.exe
142.250.186.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3568
iexplore.exe
142.250.185.131:443
fonts.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.dfox.it
  • 89.40.175.209
unknown
ctldl.windowsupdate.com
  • 205.185.216.10
  • 205.185.216.42
whitelisted
crl.identrust.com
  • 23.55.163.57
  • 23.55.163.73
whitelisted
x1.c.lencr.org
  • 104.117.200.9
whitelisted
dfox.it
  • 89.40.175.209
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
s7.addthis.com
  • 104.75.88.126
whitelisted
fonts.googleapis.com
  • 216.58.212.138
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

No threats detected
No debug info