File name:

prerelease.zip

Full analysis: https://app.any.run/tasks/44e32948-d6c3-45e7-ad5b-ccc6f9893367
Verdict: Malicious activity
Analysis date: May 10, 2025, 01:30:29
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-scr
arch-doc
arch-html
scan
delphi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

BCEC7C96C05A87DF1964DC764F823293

SHA1:

5B7818482963FFC9FACBA239C66ED0639DD65F5B

SHA256:

06706EA75723188800ADE3201A1F2F712DC8D73279A5CAD3DBDDD1338F53AAE1

SSDEEP:

98304:lbtGFdepvE0HLs3FkuYLdhlCgW9XFX6FfUTHwYCsFqxupNN7JVrKODhF2afH3hh9:Fv8qJtY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6808)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6808)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6808)
    • Connects to the server without a host name

      • RouterScan.exe (PID: 5124)
    • Potential Corporate Privacy Violation

      • RouterScan.exe (PID: 5124)
    • Connects to unusual port

      • RouterScan.exe (PID: 5124)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 6808)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6808)
    • Checks supported languages

      • RouterScan.exe (PID: 5124)
    • Reads the computer name

      • RouterScan.exe (PID: 5124)
    • Create files in a temporary directory

      • RouterScan.exe (PID: 5124)
    • Compiled with Borland Delphi (YARA)

      • RouterScan.exe (PID: 5124)
    • Reads the machine GUID from the registry

      • RouterScan.exe (PID: 5124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:02:03 21:39:42
ZipCRC: 0x84b5b190
ZipCompressedSize: 1506
ZipUncompressedSize: 3638
ZipFileName: prerelease/auth_basic.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs routerscan.exe

Process information

PID
CMD
Path
Indicators
Parent process
780"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5124"C:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\RouterScan.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\RouterScan.exe
WinRAR.exe
User:
admin
Company:
Stas'M Corp.
Integrity Level:
MEDIUM
Description:
Router Scan by Stas'M
Version:
2.6.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6808.46631\prerelease\routerscan.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5408C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6808"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\prerelease.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
1 891
Read events
1 883
Write events
8
Delete events
0

Modification events

(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\prerelease.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
8
Suspicious files
0
Text files
105
Unknown types
0

Dropped files

PID
Process
Filename
Type
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\auth_basic.txttext
MD5:A0B944354DE912EB81C0F660D963A669
SHA256:1729FA47EDE6A8B5046FEF6C538431D4E8BB9020D9124E20C872E01495F91FB6
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\code.csstext
MD5:EB21D6145A7B341CA198228B2C9930A8
SHA256:FAB0FD6EEDFD3F618BC3C9522F259F51BF1FF09181A1D482FB965829F2387018
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\auth_form.txttext
MD5:51A1D6E6690D9E8DDF044D1CDFE104CB
SHA256:91AE5E6459A40C8084BE102693A8C09D5179A3E78B8A11860CCE6E69CA533623
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\manual\menu_table.pngimage
MD5:8764457F339A125AC67BB57D98961D4A
SHA256:79CBBB622DC431B03D00089BF5D74B290F7A97F8DF3BE504A42CF7C81FC0DC94
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\manual\menu_main.pngimage
MD5:6EA94AA073E42F7E79885831DA173462
SHA256:25FE2D89C8D99B9D8B6D3FFA9CA095A49283CA4A9E23FA9FAC34C755CAA66819
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\manual\window_exclusions.pngimage
MD5:445458767080CAFFE78E3485FBE073D0
SHA256:017130EE877058E66FE5488E624B46A96516DF248F8A34CE3BB5B437EC2C2F7D
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\manual\window_columns.pngimage
MD5:8E40085DA25C761B7E6D6C8665BFE167
SHA256:27EC3B2CF19A288129A4010D2381294271896049675E31E59A8790B508B6DA89
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\manual\window_filter.pngimage
MD5:82109105D2F4764A79A702497FD421B8
SHA256:B6EDAC032E00C84CA8B6B0F1BF8CA88FF220F35BAF44670B81448295A4B8AE8B
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\help\data\manual\window_import_append.pngimage
MD5:3A5E23B0E700630BC9AAD468666F1F51
SHA256:35ACE82FAEF5C2EDCCF1F99F2DDBEBA98E678A36F3E40D21B9274C85204CA899
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6808.46631\prerelease\auth_digest.txttext
MD5:92E17CF1451BBADE83DC873533853260
SHA256:86DB3629D98F47EA078EE41B54F2833BFBD5F632D0FCE3B342E099AAD368421D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
768
DNS requests
13
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1324
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1324
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5124
RouterScan.exe
GET
301
1.0.0.1:80
http://1.0.0.1/
unknown
whitelisted
5124
RouterScan.exe
GET
301
1.0.0.1:8080
http://1.0.0.1:8080/
unknown
whitelisted
5124
RouterScan.exe
GET
301
1.0.0.2:80
http://1.0.0.2/
unknown
whitelisted
5124
RouterScan.exe
GET
301
1.0.0.2:8080
http://1.0.0.2:8080/
unknown
whitelisted
5124
RouterScan.exe
GET
403
1.0.0.254:80
http://1.0.0.254/
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5124
RouterScan.exe
134.0.119.34:443
Domain names registrar REG.RU, Ltd
RU
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.68
  • 20.190.160.130
  • 40.126.32.136
  • 20.190.160.22
  • 20.190.160.128
  • 20.190.160.66
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to network scan inside a home network
Misc activity
ET INFO Cloudflare DNS Over HTTPS Certificate Inbound
Misc activity
ET INFO Cloudflare DNS Over HTTPS Certificate Inbound
No debug info