File name:

cripter.zip

Full analysis: https://app.any.run/tasks/ad1e6054-1e3c-44a9-b9b8-0b3169bc1159
Verdict: Malicious activity
Analysis date: March 08, 2018, 01:08:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

BB11B1EC77321DE8E01BF38E53789AF3

SHA1:

AB1CD1E394765C90EDB3B41FF6DC5B1EC3FD6D0B

SHA256:

0335E06EAB42F1ABB4F776F255B2936777B46E422954C2C30F127A209D6973D9

SSDEEP:

24576:Bk9Vv3vq2eERjeX3KZaPc3zanBPyL6M4TqsLJ2DrmcmDEDF:GTb7jzZaeuwLGTM+DSF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application loaded dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1440)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2018:03:05 10:48:29
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: cripter/
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 7zfm.exe no specs searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1260"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\admin\AppData\Local\Temp\cripter.zip"C:\Program Files\7-Zip\7zFM.exeexplorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip File Manager
Exit code:
0
Version:
16.04
Modules
Images
c:\program files\7-zip\7zfm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1440"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
385
Read events
370
Write events
15
Delete events
0

Modification events

(PID) Process:(1440) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\8F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1440) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\8F\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(1440) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\8F\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(1440) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\8F\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6003
Value:
Windows Command Script
(PID) Process:(1260) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FolderShortcuts
Value:
(PID) Process:(1260) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FolderHistory
Value:
43003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C0063007200690070007400650072002E007A00690070005C000000
(PID) Process:(1260) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:PanelPath0
Value:
C:\Users\admin\AppData\Local\Temp\
(PID) Process:(1260) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FlatViewArc0
Value:
0
(PID) Process:(1260) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:PanelPath1
Value:
(PID) Process:(1260) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FlatViewArc1
Value:
0
Executable files
0
Suspicious files
0
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\libeay32.dll
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\msvcr90.dll
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\start_notepad.bat
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\svhosts.exe
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\DesktopImgini
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\config.cfgtext
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\INFOFILEtext
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\How_return_files.txttext
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\image.jpgimage
MD5:
SHA256:
12607zFM.exeC:\Users\admin\AppData\Local\Temp\7zECE4E6560\cripter\Clearr.cmdtext
MD5:B82BED2B3FB24C6F93F442BB2D3EEC63
SHA256:E6DAC19ECE3C148436B4A562598883BF9C989ADAB2360F7173CC5B88706F9AAF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info