File name:

Installer_Regwork.exe.7z

Full analysis: https://app.any.run/tasks/bfefa167-6dde-4c84-9cba-5c599b61556a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 15, 2023, 19:39:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

6F3D17F046C3B043C79F678CD58C413B

SHA1:

9237EE7DB9C592E2D98C6975402D59AF78B33127

SHA256:

0123FFB9C0B8FDC947EAFCD79076FEBDE833A80E34D9204218D4F6622D55A3B7

SSDEEP:

98304:L/I152PiGfLhQP61l9tmWKxdW/59yqxvuYVpsVfmKAGceQhLSaNOOKrchydwqybr:ndJI0a

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Installer_Regwork.exe (PID: 3924)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
      • cmd.exe (PID: 2968)
    • Changes the autorun value in the registry

      • RegWork.exe (PID: 3668)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Installer_Regwork.exe (PID: 3924)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
    • The process creates files with name similar to system file names

      • Installer_Regwork.exe (PID: 3924)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
    • Starts CMD.EXE for commands execution

      • Installer_Regwork.exe (PID: 3924)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
    • The process drops C-runtime libraries

      • Installer_Regwork.exe (PID: 3924)
    • Process drops legitimate windows executable

      • Installer_Regwork.exe (PID: 3924)
    • Reads the Internet Settings

      • Installer_Regwork.exe (PID: 3924)
      • RegWork.exe (PID: 3668)
    • Process requests binary or script from the Internet

      • Installer_Regwork.exe (PID: 3924)
  • INFO

    • Manual execution by a user

      • Installer_Regwork.exe (PID: 3924)
      • Installer_Regwork.exe (PID: 1352)
      • wmpnscfg.exe (PID: 3156)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1864)
    • Checks supported languages

      • Installer_Regwork.exe (PID: 3924)
      • CUSTOM_ZASKCHECKER.EXE (PID: 3112)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • BackUpDutyLite.exe (PID: 3684)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
      • wmpnscfg.exe (PID: 3156)
      • RegWork.exe (PID: 3668)
    • Reads the computer name

      • Installer_Regwork.exe (PID: 3924)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • BackUpDutyLite.exe (PID: 3684)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
      • wmpnscfg.exe (PID: 3156)
      • RegWork.exe (PID: 3668)
    • Create files in a temporary directory

      • Installer_Regwork.exe (PID: 3924)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
    • The executable file from the user directory is run by the CMD process

      • CUSTOM_ZASKCHECKER.EXE (PID: 3112)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
    • Creates files in the program directory

      • Installer_Regwork.exe (PID: 3924)
      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • FILESOPENEDINSTALLER.EXE (PID: 3916)
      • RegWork.exe (PID: 3668)
      • cmd.exe (PID: 2968)
    • Checks proxy server information

      • Installer_Regwork.exe (PID: 3924)
    • Reads Environment values

      • FILESOPENEDINSTALLER.EXE (PID: 3916)
    • Creates files or folders in the user directory

      • BACKUPDUTYLITE_INSTALLER.EXE (PID: 2988)
      • Installer_Regwork.exe (PID: 3924)
      • RegWork.exe (PID: 3668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
15
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs installer_regwork.exe no specs installer_regwork.exe cmd.exe no specs custom_zaskchecker.exe no specs cmd.exe no specs cmd.exe no specs backupdutylite_installer.exe no specs cmd.exe no specs backupdutylite.exe no specs cmd.exe no specs filesopenedinstaller.exe no specs cmd.exe no specs wmpnscfg.exe no specs regwork.exe

Process information

PID
CMD
Path
Indicators
Parent process
1352"C:\Users\admin\Desktop\Installer_Regwork.exe" C:\Users\admin\Desktop\Installer_Regwork.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\installer_regwork.exe
c:\windows\system32\ntdll.dll
1864"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Installer_Regwork.exe.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1936C:\Windows\system32\cmd.exe /C "C:\Users\admin\Local Settings\Temp\RegWork\custom_zaskchecker.exe"C:\Windows\System32\cmd.exeInstaller_Regwork.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2520C:\Windows\system32\cmd.exe /C "C:\Users\admin\Local Settings\Temp\RegWork\BackUpDutyLite_Installer.exe" /SC:\Windows\System32\cmd.exeInstaller_Regwork.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2968C:\Windows\system32\cmd.exe /C COPY "C:\Program Files\Files Opened\FilesOpened.ex1" /B + "C:\Program Files\Files Opened\FilesOpened.ex2" /B "C:\Program Files\Files Opened\FilesOpened.exe" /BC:\Windows\System32\cmd.exeFILESOPENEDINSTALLER.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2988"C:\Users\admin\Local Settings\Temp\RegWork\BackUpDutyLite_Installer.exe" /SC:\Users\admin\AppData\Local\Temp\RegWork\BACKUPDUTYLITE_INSTALLER.EXEcmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\regwork\backupdutylite_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3092C:\Windows\system32\cmd.exe /C "C:\Users\admin\Local Settings\Temp\RegWork\filesopenedinstaller.exe" /SC:\Windows\System32\cmd.exeInstaller_Regwork.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3112"C:\Users\admin\Local Settings\Temp\RegWork\custom_zaskchecker.exe"C:\Users\admin\AppData\Local\Temp\RegWork\CUSTOM_ZASKCHECKER.EXEcmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\regwork\custom_zaskchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3156"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3276C:\Windows\system32\cmd.exe /C "C:\Users\admin\Local Settings\Temp\RegWork\ApnToolbarInstaller.exe" /tbr /sa /hpr toolbar=BCPAC:\Windows\System32\cmd.exeInstaller_Regwork.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
4 215
Read events
4 164
Write events
51
Delete events
0

Modification events

(PID) Process:(1864) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(1864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
28
Suspicious files
11
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3924Installer_Regwork.exeC:\Users\admin\AppData\Local\Temp\nsm4C4B.tmp\ioSpecial.initext
MD5:E2D5070BC28DB1AC745613689FF86067
SHA256:D95AED234F932A1C48A2B1B0D98C60CA31F962310C03158E2884AB4DDD3EA1E0
3924Installer_Regwork.exeC:\Users\admin\AppData\Local\Temp\nsm4C4B.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
3924Installer_Regwork.exeC:\Users\admin\AppData\Local\Temp\nsm4C4B.tmp\ExecCmd.dllexecutable
MD5:B9380B0BEA8854FD9F93CC1FDA0DFEAC
SHA256:1F4BD9C9376FE1B6913BAECA7FB6DF6467126F27C9C2FE038206567232A0E244
3924Installer_Regwork.exeC:\Program Files\RegWork\RegWork.exeexecutable
MD5:2780DD304C2701358F92B74AC8EAE51F
SHA256:07DA3A4728F336CB377D5DD8052BE08703AC2416A34FFB67C26A61482AFA7D43
3924Installer_Regwork.exeC:\Users\admin\AppData\Local\Temp\nsm4C4B.tmp\System.dllexecutable
MD5:C17103AE9072A06DA581DEC998343FC1
SHA256:DC58D8AD81CACB0C1ED72E33BFF8F23EA40B5252B5BB55D393A0903E6819AE2F
3924Installer_Regwork.exeC:\Program Files\RegWork\RegWorkStartUpService.exeexecutable
MD5:A1809830A96974BC29093EF81BF9C83D
SHA256:0523EFECF98D157FCF3F0EA25892C404223BA6525FC85A75133541020FC4A644
1864WinRAR.exeC:\Users\admin\Desktop\Installer_Regwork.exeexecutable
MD5:B440EAC5600B169BE51F5FB8411B2910
SHA256:1E7E67DE997272ADBFE616C040D5C835AF728980A648333CA96A267D84093A0B
3924Installer_Regwork.exeC:\Users\admin\AppData\Local\Temp\nsm4C4B.tmp\nsDialogs.dllexecutable
MD5:C10E04DD4AD4277D5ADC951BB331C777
SHA256:E31AD6C6E82E603378CB6B80E67D0E0DCD9CF384E1199AC5A65CB4935680021A
3924Installer_Regwork.exeC:\Program Files\RegWork\mfcm90u.dllexecutable
MD5:371226B8346F29011137C7AA9E93F2F6
SHA256:5B08FE55E4BBF2FBFD405E2477E023137CFCEB4D115650A5668269C03300A8F8
3924Installer_Regwork.exeC:\Program Files\RegWork\msvcm90.dllexecutable
MD5:4A8BC195ABDC93F0DB5DAB7F5093C52F
SHA256:B371AF3CE6CB5D0B411919A188D5274DF74D5EE49F6DD7B1CCB5A31466121A18
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
2
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
Installer_Regwork.exe
GET
200
54.231.194.201:80
http://regwork.s3.amazonaws.com/filesopenedinstaller.exe
unknown
executable
151 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3924
Installer_Regwork.exe
54.231.194.201:80
regwork.s3.amazonaws.com
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
apnmedia.ask.com
unknown
regwork.s3.amazonaws.com
  • 54.231.194.201
  • 52.217.75.60
  • 52.217.163.17
  • 16.182.37.65
  • 54.231.199.33
  • 16.182.74.25
  • 3.5.11.226
  • 3.5.29.227
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2 ETPRO signatures available at the full report
No debug info