File name:

audit1file.zip

Full analysis: https://app.any.run/tasks/d06f712d-3f2c-43a2-9fdc-adc82cc2167a
Verdict: Malicious activity
Analysis date: May 15, 2025, 10:59:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

36CC48D819F8F2CFA7C45403C1ECACB0

SHA1:

D942ACEEB2F66A5244C4C44B94889A5DDA4A85AF

SHA256:

0A0CFC4506DBBE672503946DB6973920971FFF20243726DD5619F07841FEA5DC

SSDEEP:

98304:WjuWh4fS642TVUEinckKwDuQkVwPBVqAEhc4cqESdTv04A1HTLmvQ6uuJYpTjWJP:JLTo68nMhhDAkvKtrBn+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts another process probably with elevated privileges via RUNAS.EXE

      • runas.exe (PID: 4776)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2088)
    • Process drops legitimate windows executable

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
    • Process drops python dynamic module

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
    • Executable content was dropped or overwritten

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 2088)
      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 5640)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2088)
    • Checks supported languages

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
    • Create files in a temporary directory

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
    • Reads the computer name

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
    • The sample compiled with english language support

      • audit1file.exe (PID: 5936)
      • audit1file.exe (PID: 2516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:05:15 10:50:14
ZipCRC: 0xe64729cc
ZipCompressedSize: 10867852
ZipUncompressedSize: 11072965
ZipFileName: audit1file.ex_
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
8
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start runas.exe no specs sppextcomobj.exe no specs conhost.exe no specs slui.exe winrar.exe openwith.exe no specs audit1file.exe audit1file.exe

Process information

PID
CMD
Path
Indicators
Parent process
2088"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\audit1file.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2516"C:\Users\admin\Desktop\audit1file.exe" C:\Users\admin\Desktop\audit1file.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\audit1file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
4024C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4776"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\audit1file.zipC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerunas.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5640C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5936"C:\Users\admin\Desktop\audit1file.exe" C:\Users\admin\Desktop\audit1file.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\audit1file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6036"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 096
Read events
3 062
Write events
21
Delete events
13

Modification events

(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\audit1file.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
58
Suspicious files
2
Text files
1 376
Unknown types
0

Dropped files

PID
Process
Filename
Type
2088WinRAR.exeC:\Users\admin\Desktop\audit1file.ex_executable
MD5:B87282457D70A04A939D85BC0D010307
SHA256:82CB3541248E67AC23B05AA6451BE8C0A3AD2150741C680F1ED1A92AE4E062F2
2088WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2088.12708\audit1file.ex_executable
MD5:B87282457D70A04A939D85BC0D010307
SHA256:82CB3541248E67AC23B05AA6451BE8C0A3AD2150741C680F1ED1A92AE4E062F2
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\VCRUNTIME140.dllexecutable
MD5:AE96651CFBD18991D186A029CBECB30C
SHA256:1B372F064EACB455A0351863706E6326CA31B08E779A70DE5DE986B5BE8069A1
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\Pythonwin\win32ui.pydexecutable
MD5:7D87B6F032AF0AA468274CA33556AA5C
SHA256:5A68FE8E5CF84A2BD9EA9523643CC7A124E035EF8CEAAC4675F95B7A34294E2A
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\Pythonwin\mfc140u.dllexecutable
MD5:3F9AC13ECAE3EE6D409CEA2501E63892
SHA256:18E06B78A57952C5C3FFCCD8191B6047B5EA222DEE1E7728B72B280B54E0FB7E
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\_elementtree.pydexecutable
MD5:AF1CE090BCC447C42EEAB4651DD2F2E0
SHA256:1E57D69385E2889EE3532F692FA8F1D2393C0FB4EF2E1D05745BF0CA4241318D
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\_socket.pydexecutable
MD5:51A38A6BF4C7E3D71B21A88B7A1DD555
SHA256:B7829EC5C6DE17B30037E1B50F43E26B40FCD9ACDABCE0011D623F5C0CEBD70E
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\_tkinter.pydexecutable
MD5:CA14F8ECEC66E86D206656CCDB7E9E50
SHA256:2AD4C0A6E125862880C5359FEE1F64DEAAB706498F92107C0F8F03654D8EC54C
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\libcrypto-1_1.dllexecutable
MD5:25C9D6FA8BF1222E82A37EF982F418D2
SHA256:3F70A63AACC024C4CD599FF1E12BF5B685719CF2B92C4420FD20AB032C9C898C
5936audit1file.exeC:\Users\admin\AppData\Local\Temp\_MEI59362\_bz2.pydexecutable
MD5:055CFC5297933C338D8C04FD4E2462A2
SHA256:BEFC81440BBC001BD7647ACA42962EE0B45B08435EE9F7140BF570AF636B7DD5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
19
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1164
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1164
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.66:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.66
  • 20.190.160.2
  • 40.126.32.74
  • 20.190.160.4
  • 20.190.160.3
  • 40.126.32.136
  • 20.190.160.22
  • 20.190.160.132
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info