download:

/rokytd/files/raw/refs/heads/master/Software.zip

Full analysis: https://app.any.run/tasks/5e22c77f-bd6e-4d8d-9832-e0e2eec7094a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 19, 2025, 23:29:02
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
arch-exec
arch-doc
smartloader
loader
lua
pastebin
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

9606AD04F6AEE2D5D89574C09C17C4AC

SHA1:

1DBFD4A2C40E7A67AE363E7487A64A60D36C72C8

SHA256:

04FC389B32E1A1629BE7EEBCF03DB3ADC08BE69663A45CCBE0249A57C2CCEB96

SSDEEP:

24576:nGRAmbJKMIEUlL+hWqg8V0F6ybKQmsXGeXagEk8/yIC8TB5ZGSjb301QU:GRDJKMIEUlL+hWqg8V0F6ymQmsXGeXac

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • lua.exe (PID: 7088)
    • SMARTLOADER has been detected (SURICATA)

      • lua.exe (PID: 7088)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • lua.exe (PID: 7088)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • lua.exe (PID: 7088)
    • Checks Windows Trust Settings

      • lua.exe (PID: 7088)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6404)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6404)
    • Checks supported languages

      • lua.exe (PID: 7088)
    • Manual execution by a user

      • cmd.exe (PID: 7028)
    • Reads the computer name

      • lua.exe (PID: 7088)
    • Creates files or folders in the user directory

      • lua.exe (PID: 7088)
    • Checks proxy server information

      • lua.exe (PID: 7088)
    • Reads the software policy settings

      • lua.exe (PID: 7088)
    • Reads the machine GUID from the registry

      • lua.exe (PID: 7088)
    • The process uses Lua

      • lua.exe (PID: 7088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: config.txt
ZipUncompressedSize: 225600
ZipCompressedSize: 225600
ZipCRC: 0x5d317653
ZipModifyDate: 2024:12:29 02:12:34
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs cmd.exe no specs conhost.exe no specs #SMARTLOADER lua.exe conhost.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
6404"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Software.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6992C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7028C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\Software\Launcher.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
7036\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7088lua.exe config.txtC:\Users\admin\Desktop\Software\lua.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\software\lua.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\desktop\software\lua51.dll
7096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exelua.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
2 553
Read events
2 516
Write events
24
Delete events
13

Modification events

(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Software.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
3
Suspicious files
7
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7088lua.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:40EB057DDA4448A86928E27A590A02C7
SHA256:CC5353FD72630F56E98C6931B1AADC131A22580EFCDEB63D9C9460AA2D1756DE
7088lua.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\json[1].jsonbinary
MD5:025D142555D3CFE805C97ECF4D5D84B2
SHA256:0BCECAD5453E13FFCF60BFDF9B691A5ADA40DD3E421C40E59733498F35FF0A07
6404WinRAR.exeC:\Users\admin\Desktop\Software\config.txttext
MD5:96C673C9E9DEDEFEC5FD5E27284E4F29
SHA256:D92B9E01E24935E1CC6144734C0B39379EDEF1E3C06AEDBD547DC304E7334D77
6404WinRAR.exeC:\Users\admin\Desktop\Software\lua.exeexecutable
MD5:DD98A43CB27EFD5BCC29EFB23FDD6CA5
SHA256:1CF20B8449EA84C684822A5E8AB3672213072DB8267061537D1CE4EC2C30C42A
6404WinRAR.exeC:\Users\admin\Desktop\Software\lua51.dllexecutable
MD5:3DFF7448B43FCFB4DC65E0040B0FFB88
SHA256:FF976F6E965E3793E278FA9BF5E80B9B226A0B3932B9DA764BFFC8E41E6CDB60
7088lua.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\DMJhfVFs[1].txttext
MD5:DA1BB6C9E04D04621F05C874DA3D9A08
SHA256:708CFDBC3879CBC28FB95B39E8B929571C42D7DE671FCB26103B3621F6B1455B
7088lua.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64Abinary
MD5:8ED6C52CDCF18FDF1BDAAD357C00FA27
SHA256:1174BE7CEB047FCA0450A7A9AB3A92C740AAFB77179171CA0AB3C5A2916C590D
7088lua.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:C9BE626E9715952E9B70F92F912B9787
SHA256:C13E8D22800C200915F87F71C31185053E4E60CA25DE2E41E160E09CD2D815D4
7088lua.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64Abinary
MD5:68FD6D6AC7C050CD99F9D78ED2D1140F
SHA256:CA6E0988732DAC7637CFA9DBA98384E5D8238EB759F7F6745C0317F385063092
6404WinRAR.exeC:\Users\admin\Desktop\Software\Launcher.battext
MD5:A9502A922AE070695BFF1D7E65B05766
SHA256:171C15995DA991E96BD662286633831F175A768A3203E0789863894B8C5AA0C6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
15
DNS requests
5
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7088
lua.exe
GET
200
142.251.36.3:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7088
lua.exe
GET
200
104.78.173.167:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7088
lua.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/
unknown
shared
7088
lua.exe
GET
200
142.251.36.3:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4712
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
3220
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
7088
lua.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
shared
7088
lua.exe
173.223.117.131:443
AKAMAI-AS
US
unknown
7088
lua.exe
104.78.173.167:80
ocsp.digicert.com
AKAMAI-AS
GB
whitelisted
7088
lua.exe
87.120.36.50:80
Ophidian Network Limited
BG
unknown
7088
lua.exe
80.66.81.11:80
Shulzhenko Bohdana Valentynivna
UA
unknown

DNS requests

Domain
IP
Reputation
ip-api.com
  • 208.95.112.1
shared
ocsp.digicert.com
  • 104.78.173.167
whitelisted
pastebin.com
  • 172.67.19.24
shared
c.pki.goog
  • 142.251.36.3
whitelisted
self.events.data.microsoft.com
  • 40.79.150.120
whitelisted

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
A Network Trojan was detected
LOADER [ANY.RUN] SmartLoader Check-in
A Network Trojan was detected
LOADER [ANY.RUN] SmartLoader Check-in
A Network Trojan was detected
LOADER [ANY.RUN] SmartLoader Check-in
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
A Network Trojan was detected
LOADER [ANY.RUN] SmartLoader Check-in
No debug info