File name:

孤立的文件 4949.7z

Full analysis: https://app.any.run/tasks/d91cb0ce-45b4-408f-9b4b-1664febc1d34
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 05, 2025, 03:29:44
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
shellrunner
loader
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.3
MD5:

64FB8D7EFCB9A81C954CB7EB074B6EB0

SHA1:

111E9E589740275E74402142F7A3F0491740EFF9

SHA256:

05E4D9D5391E0E10CC666B06CF5CEEFEC3D453E9C4A255141DEF4FCA69D85D6A

SSDEEP:

98304:w7TTLPCgUbmR8tFMiuM3994DTYX93Yb/sysEMQvecHFqbDuhFZEbYj9Uvr54fCY6:+bSfv+TEbqslMoa8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SHELLRUNNER has been detected

      • g2mupdate.exe (PID: 4816)
  • SUSPICIOUS

    • Executes application which crashes

      • !plsched.exe (PID: 6884)
  • INFO

    • Checks supported languages

      • !plsched.exe (PID: 6884)
      • !PDFLM.exe (PID: 512)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6320)
    • Manual execution by a user

      • !plsched.exe (PID: 6884)
      • !OLKR.exe (PID: 5764)
      • !PDFLM.exe (PID: 512)
      • !OLKR.exe (PID: 932)
      • g2mupdate.exe (PID: 4816)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6320)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6968)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6320)
    • Sends debugging messages

      • !PDFLM.exe (PID: 512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (gen) (100)

EXIF

ZIP

FileVersion: 7z v0.03
ModifyDate: 2023:06:26 02:29:20+00:00
ArchivedFileName: !OLKR.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe !plsched.exe werfault.exe no specs !pdflm.exe !olkr.exe no specs !olkr.exe no specs #SHELLRUNNER g2mupdate.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
512"C:\Users\admin\Desktop\!PDFLM.exe" C:\Users\admin\Desktop\!PDFLM.exe
explorer.exe
User:
admin
Company:
Kofax
Integrity Level:
MEDIUM
Description:
Kofax Power PDF LM
Exit code:
0
Version:
50.00.22223.0100
Modules
Images
c:\users\admin\desktop\!pdflm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
932"C:\Users\admin\Desktop\!OLKR.exe" C:\Users\admin\Desktop\!OLKR.exeexplorer.exe
User:
admin
Company:
DataNumen, Inc.
Integrity Level:
MEDIUM
Description:
DataNumen Outlook Repair
Exit code:
3221225595
Version:
8.8.0.0
Modules
Images
c:\users\admin\desktop\!olkr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\oleaut32.dll
c:\windows\syswow64\msvcp_win.dll
4816"C:\Users\admin\Desktop\g2mupdate.exe" C:\Users\admin\Desktop\g2mupdate.exe
explorer.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoToMeeting
Exit code:
3221225781
Version:
10.18.0 Build 19932
Modules
Images
c:\users\admin\desktop\g2mupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5764"C:\Users\admin\Desktop\!OLKR.exe" C:\Users\admin\Desktop\!OLKR.exeexplorer.exe
User:
admin
Company:
DataNumen, Inc.
Integrity Level:
MEDIUM
Description:
DataNumen Outlook Repair
Exit code:
3221225781
Version:
8.8.0.0
Modules
Images
c:\users\admin\desktop\!olkr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6320"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\孤立的文件 4949.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6884"C:\Users\admin\Desktop\!plsched.exe" C:\Users\admin\Desktop\!plsched.exe
explorer.exe
User:
admin
Company:
IceDeep, Inc.
Integrity Level:
MEDIUM
Description:
MyUSBOnly Device Control 2014
Exit code:
0
Version:
9.7.0
Modules
Images
c:\users\admin\desktop\!plsched.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6968C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6884 -s 156C:\Windows\SysWOW64\WerFault.exe!plsched.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 793
Read events
3 759
Write events
21
Delete events
13

Modification events

(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\孤立的文件 4949.7z
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
7
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6968WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_!plsched.exe_385c97ede74953960eee1801449b072953757e9_1e8458d1_bf3d176a-d707-40e8-97bb-4d3380ad6fb7\Report.wer
MD5:
SHA256:
6968WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\!plsched.exe.6884.dmp
MD5:
SHA256:
6320WinRAR.exeC:\Users\admin\Desktop\wfdrproxy.dllexecutable
MD5:D0AEC875DD42DCEEBC1A480B6AAC1654
SHA256:E493D38DCCA74CC9D8309C966728E71BB3A93B342AB77AB50B4FA3EF7890D0DA
6968WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA7FB.tmp.dmpbinary
MD5:3B1095621C948E6AF092C2597263A293
SHA256:94A0CC2C43580950F94204773CC410CAF3AC3B3E0E8B6D250F5BA40C6EA8E00F
6320WinRAR.exeC:\Users\admin\Desktop\!PDFLM.exeexecutable
MD5:3D58185EF8D1259A2C7007A047FA63C1
SHA256:3E9263E4EF0B8D7593F18E952C3C490278AD3C8FE66CBEB21A0B6677B8F409C9
6968WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA8A8.tmp.WERInternalMetadata.xmlxml
MD5:D3051BBA794281A0646FFE4B1A52690D
SHA256:F2AF47243DEF9102659095D17E42257626566E7F1256395BB5C29AFA92F41EDB
6320WinRAR.exeC:\Users\admin\Desktop\$WinREAgent.zipcompressed
MD5:F1849DC685E6F5E3C050F81AFEF9A0A2
SHA256:6F3B1AD0115147CF75F381C069E272AD468A5F61425866671E01F1B6D35262D7
6968WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA8D8.tmp.xmlxml
MD5:44BD05E016C8E33E1F58061FA9C8E2F3
SHA256:1C1222BC5F32624FF41261E681AAE440986909862C9419FB31775A8756461A18
6320WinRAR.exeC:\Users\admin\Desktop\g2mupdate.exeexecutable
MD5:2BD61EE91994B3E9F9EBC002498D02EA
SHA256:07762231DA2A8CE1DD2A211C49A27A2F06D7D2B7D5426FC5B6B114F845F1ECA6
6320WinRAR.exeC:\Users\admin\Desktop\!plsched.exeexecutable
MD5:B237868F000CAA1E28C04BE79895163F
SHA256:5B36D51D26B03635CFED731C501582A51CFCA27AAF63F00CAC505EE9390FB978
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
30
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7048
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7048
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
440
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
104.126.37.145:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.145
  • 104.126.37.131
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
unknown
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.23
  • 20.190.159.64
  • 20.190.159.71
  • 20.190.159.4
  • 20.190.159.0
  • 20.190.159.73
  • 20.190.159.75
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
Process
Message
!PDFLM.exe
Changed current directory to system
!PDFLM.exe
PdfCreateHookApp started
!PDFLM.exe
PdfCreateHookApp InitInstance