File name:

245372.zip

Full analysis: https://app.any.run/tasks/5bc8ddcb-66f9-4942-8999-31d11ae56134
Verdict: Malicious activity
Analysis date: January 10, 2025, 21:09:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

3EF420132F432FD92A8A568329408015

SHA1:

5AE2CF27A4340DC04EB915A95190D676E274FA0B

SHA256:

010DC3ACE5821FC898D356C1AE185765F00C1A692A3FF5BC9D61E8F0C0289008

SSDEEP:

49152:GzQ+A9jqWkTejjzHmmwnn63J6ow/xZ/1RAkH8ezvyZfz97cCS5dCK7asYF7oGxVo:GzPABbkCjjzGmwnY6ow5ZtKkdeJYNn5j

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 245372.exe (PID: 3436)
      • 245372.exe (PID: 3224)
      • 245372.exe (PID: 6540)
  • SUSPICIOUS

    • Executes application which crashes

      • 245372.exe (PID: 3436)
      • 245372.exe (PID: 6540)
  • INFO

    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7108)
    • The process uses the downloaded file

      • OpenWith.exe (PID: 6820)
      • WinRAR.exe (PID: 2756)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 6820)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 2756)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2756)
    • Manual execution by a user

      • 245372.exe (PID: 3224)
      • 245372.exe (PID: 3436)
      • 245372.exe (PID: 6540)
    • Checks proxy server information

      • WerFault.exe (PID: 4596)
      • WerFault.exe (PID: 880)
    • Checks supported languages

      • 245372.exe (PID: 3436)
      • 245372.exe (PID: 6540)
    • Reads the software policy settings

      • WerFault.exe (PID: 880)
    • Reads the computer name

      • 245372.exe (PID: 3436)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 245372
ZipUncompressedSize: 2020136
ZipCompressedSize: 1084674
ZipCRC: 0x52daa11e
ZipModifyDate: 2025:01:10 20:57:10
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
8
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe openwith.exe no specs notepad.exe no specs 245372.exe no specs 245372.exe werfault.exe 245372.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2756"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\245372.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6820C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7108"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\245372C:\Windows\System32\notepad.exeOpenWith.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
3224"C:\Users\admin\Desktop\245372.exe" C:\Users\admin\Desktop\245372.exeexplorer.exe
User:
admin
Company:
Skype Technologies S.A.
Integrity Level:
MEDIUM
Description:
Skype
Exit code:
3221226540
Version:
4.1.0.179
Modules
Images
c:\users\admin\desktop\245372.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3436"C:\Users\admin\Desktop\245372.exe" C:\Users\admin\Desktop\245372.exe
explorer.exe
User:
admin
Company:
Skype Technologies S.A.
Integrity Level:
HIGH
Description:
Skype
Exit code:
1
Version:
4.1.0.179
Modules
Images
c:\users\admin\desktop\245372.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4596C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3436 -s 620C:\Windows\SysWOW64\WerFault.exe
245372.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6540"C:\Users\admin\Desktop\245372.exe" C:\Users\admin\Desktop\245372.exe
explorer.exe
User:
admin
Company:
Skype Technologies S.A.
Integrity Level:
HIGH
Description:
Skype
Exit code:
1
Version:
4.1.0.179
Modules
Images
c:\users\admin\desktop\245372.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
880C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6540 -s 612C:\Windows\SysWOW64\WerFault.exe
245372.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
8 927
Read events
8 899
Write events
22
Delete events
6

Modification events

(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\245372.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4596) WerFault.exeKey:\REGISTRY\A\{5545ce67-80cf-7433-1d36-10eb856eee2f}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(4596) WerFault.exeKey:\REGISTRY\A\{5545ce67-80cf-7433-1d36-10eb856eee2f}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
Executable files
1
Suspicious files
8
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
4596WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_245372.exe_a15f195faac99f45888939e16a574214865f548_16a952e8_8426e67f-d495-4fa6-b138-cd719ec51412\Report.wer
MD5:
SHA256:
880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_245372.exe_a15f195faac99f45888939e16a574214865f548_16a952e8_39c7b24a-596f-4677-9871-3da9f49f6d96\Report.wer
MD5:
SHA256:
2756WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2756.17203\245372executable
MD5:5A324597DED5FAA356A4B0A271940D09
SHA256:175C3FD62C9BC800DA15199F9303C24AD8C27CB7CB5520A2037580FD0F2592DD
880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE0EA.tmp.xmlxml
MD5:5318198786DEFB2DD17B8D8BA43051AB
SHA256:74786B8A06ACDB769340005F057A09871E922CE29F45E9E361A6D5AFA635AC30
880WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\245372.exe.6540.dmpdmp
MD5:C7C1F3DB0D24BAB7B3435520AEB40B13
SHA256:94CF33D622FD798098B7517C70D4CB64D0226EE7F4C5F58110BDA3A6C3ECC8DF
880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE0CA.tmp.WERInternalMetadata.xmlxml
MD5:ADF0F31D237CAF79B79AD4F87C0C3FDD
SHA256:665F007D8D3874D78B8687AD9000291BD6E90117F097C8B7F392528932A2FA90
880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE08B.tmp.dmpbinary
MD5:55B4FA676F5068CB6C5BF968A37992C8
SHA256:51E327A5D7C08970F67FCF5AD9E4506F42DA150DEEC5635A93BB4E65CC489FEC
4596WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
4596WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF245.tmp.xmlxml
MD5:95D910D1139A3E4D0AAE4AAE52728A4B
SHA256:4C2CAC1C1C55F59AA1F00AC5942F522678BA5F6A8E7E42C7C8A13A5FC5599239
4596WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:05F29DA9B4B39A3218F76A9ED05DD250
SHA256:ED4B1703F92C0B8C877283F0CBBE9E55365E689CAFFA00009600C0275F0F4CD2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
36
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4596
WerFault.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4596
WerFault.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.167:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6336
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5340
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5340
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5496
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.167:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.153:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
904
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.167
  • 23.48.23.177
  • 23.48.23.176
  • 23.48.23.193
  • 23.48.23.190
  • 23.48.23.169
  • 23.48.23.138
  • 23.48.23.140
  • 23.48.23.137
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 104.126.37.153
  • 104.126.37.137
  • 104.126.37.144
  • 104.126.37.139
  • 104.126.37.154
  • 104.126.37.145
  • 104.126.37.184
  • 104.126.37.185
  • 104.126.37.130
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.17
  • 20.190.160.20
  • 40.126.32.138
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.14
  • 40.126.32.134
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info