File name:

Windows 7 Loader.exe.zip

Full analysis: https://app.any.run/tasks/ed47f6fc-2bb6-4ef4-9522-5f2a49c65dc5
Verdict: Malicious activity
Analysis date: November 09, 2023, 12:31:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract
MD5:

F19216D9F7655A44C78FFC60B3780851

SHA1:

107DCC936F82104F92C8A448C3F49F34714ED01B

SHA256:

083656F91A37E3627BFD51ADC2F82DAC9302E4438A852149A723A86BB110A331

SSDEEP:

49152:EZ22qt1AMLnRAlm6MeRPbq474kEBa8uRi7F1waCExDtUeocpssst5vG+bSboxpyE:Y2TtjLSRMeRPOlkKuA1ZftzeTV28xpyE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Opens a text file (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Drops the executable file immediately after the start

      • Windows 7 Loader.exe (PID: 3408)
  • SUSPICIOUS

    • The process executes VB scripts

      • cmd.exe (PID: 3424)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 3548)
    • Gets full path of the running script (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Checks whether a specific file exists (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Reads the BIOS version

      • Windows 7 Loader.exe (PID: 3408)
    • Reads data from a binary Stream object (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Executes WMI query (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Starts CMD.EXE for commands execution

      • Windows 7 Loader.exe (PID: 3408)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
    • Process drops legitimate windows executable

      • Windows 7 Loader.exe (PID: 3408)
    • Changes charset (SCRIPT)

      • cscript.exe (PID: 4076)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • cscript.exe (PID: 4076)
    • Reads data from a file (SCRIPT)

      • cscript.exe (PID: 4076)
    • The system shut down or reboot

      • cmd.exe (PID: 1208)
    • The process executes via Task Scheduler

      • sipnotify.exe (PID: 1616)
    • Reads the Internet Settings

      • sipnotify.exe (PID: 1616)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1616)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3460)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 3580)
      • cscript.exe (PID: 4076)
      • cscript.exe (PID: 3592)
      • sipnotify.exe (PID: 1616)
    • Reads the computer name

      • Windows 7 Loader.exe (PID: 3408)
    • Reads Environment values

      • Windows 7 Loader.exe (PID: 3408)
    • Reads product name

      • Windows 7 Loader.exe (PID: 3408)
    • Checks supported languages

      • bootsect.exe (PID: 3728)
      • Windows 7 Loader.exe (PID: 1376)
      • Windows 7 Loader.exe (PID: 3408)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 2023:11:09 13:31:20
ZipCRC: 0x31022c4e
ZipCompressedSize: 4294967295
ZipUncompressedSize: 4294967295
ZipFileName: Windows 7 Loader.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
106
Monitored processes
18
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs windows 7 loader.exe no specs windows 7 loader.exe cmd.exe no specs cscript.exe no specs cmd.exe no specs bcdedit.exe no specs cmd.exe no specs bootsect.exe no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs windows 7 loader.exe no specs windows 7 loader.exe cmd.exe no specs shutdown.exe no specs sipnotify.exe

Process information

PID
CMD
Path
Indicators
Parent process
1208cmd.exe /A /C "shutdown -r -t 0" C:\Windows\System32\cmd.exeWindows 7 Loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1376"C:\Users\admin\AppData\Local\Temp\Rar$EXb3460.13716\Windows 7 Loader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3460.13716\Windows 7 Loader.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3460.13716\windows 7 loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
1616C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1860shutdown -r -t 0 C:\Windows\System32\shutdown.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Shutdown and Annotation Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\shutdown.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\secur32.dll
2928"C:\Users\admin\AppData\Local\Temp\Rar$EXb3460.10938\Windows 7 Loader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3460.10938\Windows 7 Loader.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3460.10938\windows 7 loader.exe
c:\windows\system32\ntdll.dll
3408"C:\Users\admin\AppData\Local\Temp\Rar$EXb3460.10938\Windows 7 Loader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3460.10938\Windows 7 Loader.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3460.10938\windows 7 loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
3424cmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -dli" C:\Windows\System32\cmd.exeWindows 7 Loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3460"C:\Program Files\WinRAR\WinRAR.exe" "C:\Windows 7 Loader.exe.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
1073807364
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3548cmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk 32KD2-K9CTF-M3DJT-4J3WC-733WD" C:\Windows\System32\cmd.exeWindows 7 Loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3580C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -dli C:\Windows\System32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
5 086
Read events
5 055
Write events
31
Delete events
0

Modification events

(PID) Process:(3460) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
3
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
3728bootsect.exe\Device\HarddiskVolume1
MD5:
SHA256:
3408Windows 7 Loader.exeZ:\Dell.XRM-MSxml
MD5:18B1E45BF56F40C3C4BBE65831178216
SHA256:D072A059D3ED3E75C98B85B41E4319E8D5CFAE0E0C239B62436A3AD34003AB4A
3408Windows 7 Loader.exe\\?\Volume{e1a82db3-a9f0-11e7-b142-806e6f6e6963}\bootsect.exeexecutable
MD5:1729F6A34224848204FAF39F12298AAC
SHA256:EB49662B5DD1C70FF7D27B296BCA63CD6A7AA33FD9DA4394FCDB049C75A29FA7
1616sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\metadata.jsonbinary
MD5:E8A970BA6CE386EED9A5E724F26212A6
SHA256:7E06107D585D8FC7870998F3856DCC3E35800AA97E4406AAB83BC8444B6CBDE3
1616sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\main.jpgimage
MD5:B342ACE63F77961249A084C61EABC884
SHA256:E5067BBA2095B5DA7C3171EC116E9A92337E24E471339B0860A160076EFE49B9
3408Windows 7 Loader.exeZ:\winx.ldtext
MD5:5E35B2A20F571262CB7D11E6BD8FAF35
SHA256:CB041A39781BF856D74C69F34AC37B805AA0FE52770269023B13D4A108717311
3460WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3460.10938\Windows 7 Loader.exeexecutable
MD5:BF1CF345674BDF35830FD74CF153FD8A
SHA256:4201898F22665570F993BB688DCB8BD8F605D4CB2776ED6887263CFD8E5663AF
1616sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\styles.csstext
MD5:3383EEF350240253D7C2C2564381B3CB
SHA256:85443493D86D6D7FB0E07BC9705DFC9C858086FBA1B0E508092AB328D5F145E8
3460WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3460.13716\Windows 7 Loader.exeexecutable
MD5:BF1CF345674BDF35830FD74CF153FD8A
SHA256:4201898F22665570F993BB688DCB8BD8F605D4CB2776ED6887263CFD8E5663AF
1616sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\en-us.htmlhtml
MD5:9752942B57692148B9F614CF4C119A36
SHA256:E31B834DD53FA6815F396FC09C726636ABF98F3367F0CF1590EF5EB3801C75D1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info