File name:

rookie-pcvr-1.2_portable.zip

Full analysis: https://app.any.run/tasks/578a6903-76c2-4e29-8632-e3a8ab7a4c65
Verdict: Malicious activity
Analysis date: October 30, 2023, 17:36:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

1F19179920FB935B69FD224C9CF72C89

SHA1:

BEB37FF31F4FD53B95CBAF57926503D75F2A9910

SHA256:

044B9210564DE54E445D9BB40F9FAE1E1B4C27F07EDF70CACB7D85B2B59CA775

SSDEEP:

12288:AuXwFvVTSUjphx7OP+s0L4Y97aa8PGy6SnIpRqA2ZoC2N8hG:AYwFvVTSUj/x7OP+s0kY9B8PGy6zpRqu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Rookie-PCVR_v1.2.exe (PID: 3928)
      • 7z.exe (PID: 3980)
      • 7z.exe (PID: 2820)
    • Drops the executable file immediately after the start

      • Rookie-PCVR_v1.2.exe (PID: 3928)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Rookie-PCVR_v1.2.exe (PID: 3928)
    • Reads settings of System Certificates

      • Rookie-PCVR_v1.2.exe (PID: 3928)
      • rclone.exe (PID: 3324)
    • Drops 7-zip archiver for unpacking

      • Rookie-PCVR_v1.2.exe (PID: 3928)
    • Adds/modifies Windows certificates

      • Rookie-PCVR_v1.2.exe (PID: 3928)
  • INFO

    • Checks supported languages

      • Rookie-PCVR_v1.2.exe (PID: 3928)
      • 7z.exe (PID: 3980)
      • rclone.exe (PID: 2996)
      • rclone.exe (PID: 3324)
      • 7z.exe (PID: 2820)
    • Manual execution by a user

      • Rookie-PCVR_v1.2.exe (PID: 3928)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2752)
    • Reads the computer name

      • Rookie-PCVR_v1.2.exe (PID: 3928)
      • 7z.exe (PID: 3980)
      • rclone.exe (PID: 2996)
      • rclone.exe (PID: 3324)
      • 7z.exe (PID: 2820)
    • Reads the machine GUID from the registry

      • Rookie-PCVR_v1.2.exe (PID: 3928)
      • rclone.exe (PID: 3324)
    • Reads Environment values

      • Rookie-PCVR_v1.2.exe (PID: 3928)
    • Create files in a temporary directory

      • Rookie-PCVR_v1.2.exe (PID: 3928)
    • Creates files or folders in the user directory

      • Rookie-PCVR_v1.2.exe (PID: 3928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:08:04 08:35:18
ZipCRC: 0xfedff9da
ZipCompressedSize: 421297
ZipUncompressedSize: 943616
ZipFileName: Rookie-PCVR_v1.2.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe no specs rookie-pcvr_v1.2.exe 7z.exe no specs rclone.exe no specs rclone.exe 7z.exe no specs searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1164"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe8_ Global\UsGthrCtrlFltPipeMssGthrPipe8 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2752"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\rookie-pcvr-1.2_portable.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2820"7z.exe" x "C:\Users\admin\Desktop\meta.7z" -y -o"C:\Users\admin\Desktop\meta" -p"gL59VfgPxoHR"C:\Users\admin\Desktop\7z.exeRookie-PCVR_v1.2.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
23.01
Modules
Images
c:\users\admin\desktop\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2996"C:\Users\admin\Desktop\rclone\rclone.exe" listremotes --config vrp.download.configC:\Users\admin\Desktop\rclone\rclone.exeRookie-PCVR_v1.2.exe
User:
admin
Company:
https://rclone.org
Integrity Level:
MEDIUM
Description:
Rsync for cloud storage
Exit code:
0
Version:
1.62.2
Modules
Images
c:\users\admin\desktop\rclone\rclone.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
3324"C:\Users\admin\Desktop\rclone\rclone.exe" sync ":http:/meta.7z" "C:\Users\admin\Desktop" --http-url https://bactio.skizzle.cyou/ --tpslimit 1.0 --tpslimit-burst 3C:\Users\admin\Desktop\rclone\rclone.exe
Rookie-PCVR_v1.2.exe
User:
admin
Company:
https://rclone.org
Integrity Level:
MEDIUM
Description:
Rsync for cloud storage
Exit code:
0
Version:
1.62.2
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\rclone\rclone.exe
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
3928"C:\Users\admin\Desktop\Rookie-PCVR_v1.2.exe" C:\Users\admin\Desktop\Rookie-PCVR_v1.2.exe
explorer.exe
User:
admin
Company:
Rookie.WTF
Integrity Level:
MEDIUM
Description:
AndroidSideloader
Exit code:
0
Version:
2.0.0.0
Modules
Images
c:\users\admin\desktop\rookie-pcvr_v1.2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
3980"7z.exe" x "C:\Users\admin\Desktop\rclone.zip" -y -o"C:\Users\admin\Desktop"C:\Users\admin\Desktop\7z.exeRookie-PCVR_v1.2.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
23.01
Modules
Images
c:\users\admin\desktop\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
Total events
9 807
Read events
9 759
Write events
46
Delete events
2

Modification events

(PID) Process:(2752) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2752) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3928) Rookie-PCVR_v1.2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3928) Rookie-PCVR_v1.2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
2
Suspicious files
6
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
3928Rookie-PCVR_v1.2.exeC:\Users\admin\Desktop\rclone\vrp.download.config
MD5:
SHA256:
2752WinRAR.exeC:\Users\admin\Desktop\Rookie-PCVR_v1.2.exeexecutable
MD5:6F7671B6F4C5583653891C8CCD85411B
SHA256:931CCA55BD22449CD1128FE9537157627DFBD63A3DBA9AB86C510CC9C52814D9
3928Rookie-PCVR_v1.2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:F3441B8572AAE8801C04F3060B550443
SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF
3928Rookie-PCVR_v1.2.exeC:\Users\admin\AppData\Local\Temp\Cab3DA9.tmpcompressed
MD5:F3441B8572AAE8801C04F3060B550443
SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF
3928Rookie-PCVR_v1.2.exeC:\Users\admin\AppData\Local\Temp\Tar3DAA.tmpbinary
MD5:9441737383D21192400ECA82FDA910EC
SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5
39807z.exeC:\Users\admin\Desktop\rclone-v1.62.2-windows-386\rclone.1text
MD5:28913555884B76E183CC217199A74D34
SHA256:F940A104EE3E4BAB9D9A457E2CC0C2BF6619FCEBEF1DEB2D4F733C240682ED4D
3928Rookie-PCVR_v1.2.exeC:\Users\admin\Desktop\rclone\vrp.upload.configtext
MD5:F06F4B0A6775A75A4EC9904520EC8D91
SHA256:1A47B327964843C1C614F7296D6939B69A36A9A0395179C13FC1BDC9D5F05932
28207z.exeC:\Users\admin\Desktop\meta\VRP-GameList.txttext
MD5:FE4F6A5249C2C6A68DDAE87A743251B1
SHA256:1CFB0C39B2547DB56F4042489A85CBB8DDB4677086D63E18E4B01EB7264A92B3
3928Rookie-PCVR_v1.2.exeC:\Users\admin\Desktop\rclone\hash.txttext
MD5:74BE16979710D4C4E7C6647856088456
SHA256:F215FAF9D88B7F0A881632EE22459EE452A296C808D261B6CC993D3A1FD0600E
39807z.exeC:\Users\admin\Desktop\rclone-v1.62.2-windows-386\git-log.txttext
MD5:46AAF84AC25B12D4DB0CD971048539B5
SHA256:DEF9AD3FFF561BF3B46F08BE571D179C5862FD1835BED3C6B8435C731FD2103D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
13
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3928
Rookie-PCVR_v1.2.exe
GET
200
46.228.146.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?cbff904c349f9121
unknown
compressed
61.6 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
3928
Rookie-PCVR_v1.2.exe
185.165.171.105:443
wiki.vrpirates.club
Flokinet Ltd
SC
unknown
3928
Rookie-PCVR_v1.2.exe
46.228.146.0:80
ctldl.windowsupdate.com
LLNW
US
unknown
3928
Rookie-PCVR_v1.2.exe
95.217.6.16:443
downloads.rclone.org
Hetzner Online GmbH
FI
unknown
3928
Rookie-PCVR_v1.2.exe
140.82.121.4:443
github.com
GITHUB
US
unknown
3928
Rookie-PCVR_v1.2.exe
185.199.110.133:443
raw.githubusercontent.com
FASTLY
US
unknown
3324
rclone.exe
188.114.96.3:443
bactio.skizzle.cyou
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
wiki.vrpirates.club
  • 185.165.171.105
malicious
ctldl.windowsupdate.com
  • 46.228.146.0
  • 46.228.146.128
whitelisted
downloads.rclone.org
  • 95.217.6.16
unknown
github.com
  • 140.82.121.4
shared
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.108.133
shared
bactio.skizzle.cyou
  • 188.114.96.3
  • 188.114.97.3
unknown

Threats

No threats detected
No debug info