File name:

audit1file.zip

Full analysis: https://app.any.run/tasks/40057a7f-8b9e-491e-a947-2e8976ba6b83
Verdict: Malicious activity
Analysis date: May 15, 2025, 11:01:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

36CC48D819F8F2CFA7C45403C1ECACB0

SHA1:

D942ACEEB2F66A5244C4C44B94889A5DDA4A85AF

SHA256:

0A0CFC4506DBBE672503946DB6973920971FFF20243726DD5619F07841FEA5DC

SSDEEP:

98304:WjuWh4fS642TVUEinckKwDuQkVwPBVqAEhc4cqESdTv04A1HTLmvQ6uuJYpTjWJP:JLTo68nMhhDAkvKtrBn+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
    • Executable content was dropped or overwritten

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
    • Process drops python dynamic module

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
    • Application launched itself

      • audit1file.exe (PID: 7712)
    • Loads Python modules

      • audit1file.exe (PID: 8044)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7208)
    • Manual execution by a user

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
    • Reads the computer name

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
      • audit1file.exe (PID: 8044)
    • Checks supported languages

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
      • audit1file.exe (PID: 8044)
    • Create files in a temporary directory

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
      • audit1file.exe (PID: 8044)
    • The sample compiled with english language support

      • audit1file.exe (PID: 7712)
      • audit1file.exe (PID: 8008)
    • Reads the machine GUID from the registry

      • audit1file.exe (PID: 8044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:05:15 10:50:14
ZipCRC: 0xe64729cc
ZipCompressedSize: 10867852
ZipUncompressedSize: 11072965
ZipFileName: audit1file.ex_
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start cmd.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe winrar.exe audit1file.exe audit1file.exe audit1file.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1676C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2136"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2568\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3132"C:\Windows\System32\cmd.exe" /k C:\Users\admin\Desktop\audit1file.zipC:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
7208"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\audit1file.zip"C:\Program Files\WinRAR\WinRAR.exe
cmd.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7712"C:\Users\admin\Desktop\audit1file.exe" C:\Users\admin\Desktop\audit1file.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\audit1file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
8008"C:\Users\admin\Desktop\audit1file.exe" C:\Users\admin\Desktop\audit1file.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\audit1file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
8044"C:\Users\admin\Desktop\audit1file.exe" C:\Users\admin\Desktop\audit1file.exeaudit1file.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\audit1file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 754
Read events
3 745
Write events
9
Delete events
0

Modification events

(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\audit1file.zip
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7208) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3132) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Operation:writeName:WinRAR.ZIP
Value:
Executable files
57
Suspicious files
10
Text files
1 778
Unknown types
0

Dropped files

PID
Process
Filename
Type
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\_bz2.pydexecutable
MD5:055CFC5297933C338D8C04FD4E2462A2
SHA256:BEFC81440BBC001BD7647ACA42962EE0B45B08435EE9F7140BF570AF636B7DD5
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\libcrypto-1_1.dllexecutable
MD5:25C9D6FA8BF1222E82A37EF982F418D2
SHA256:3F70A63AACC024C4CD599FF1E12BF5B685719CF2B92C4420FD20AB032C9C898C
7208WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7208.23243\audit1file.ex_executable
MD5:B87282457D70A04A939D85BC0D010307
SHA256:82CB3541248E67AC23B05AA6451BE8C0A3AD2150741C680F1ED1A92AE4E062F2
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\_hashlib.pydexecutable
MD5:1280A084744EF726A673B757B9364335
SHA256:C2B3DC92ABD96485032D1287941E405D56DF05FB5BA68199497D8594400163E5
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\pyexpat.pydexecutable
MD5:EA5E7E997193098C2259119A37C7E4C4
SHA256:40B17F3DFF41E29492C8519372D435CD973F0A67597663FB12AD6756EAAA9077
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\_decimal.pydexecutable
MD5:942849B267A15E74C43BC298CF8EFCA3
SHA256:749347C07F5DB9D5CD318313EBF120E541E12502710C27486047123E6E5D5AC4
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\_lzma.pydexecutable
MD5:D72665EA18965F103200CCC7AD072F85
SHA256:AB20E63D14259A7DECA85A068796476C0EFCC236A11D53B1816FC6F8956424A8
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\_elementtree.pydexecutable
MD5:AF1CE090BCC447C42EEAB4651DD2F2E0
SHA256:1E57D69385E2889EE3532F692FA8F1D2393C0FB4EF2E1D05745BF0CA4241318D
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\python37.dllexecutable
MD5:198DC945FA3A7215C2AA90BD296025B4
SHA256:20CD780CF1E90778799E749812B00B1865938EF8990CD9BF2C1630787C6181C9
7712audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI77122\_contextvars.pydexecutable
MD5:4A525F91513ECE5FE180A5D1123D8337
SHA256:6629835406814CD78D006A6080EFAF0E93E28B88B3FA2FEB00B7EF9C975E4A61
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
304
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7828
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7828
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.2
  • 20.190.159.23
  • 40.126.31.131
  • 40.126.31.0
  • 40.126.31.71
  • 20.190.159.73
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info