File name:

scrcpy-win64-v3.1.zip

Full analysis: https://app.any.run/tasks/e8eefd38-9600-48dc-9c42-dd154fd5c750
Verdict: Malicious activity
Analysis date: January 16, 2025, 06:50:12
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

6CFA2B01081F0B0B8922A4A167B01FCB

SHA1:

5821C5E59D05BE601A610EBFEC885B5780BFF275

SHA256:

0C05EA395D95CFE36BEE974EEB435A3DB87EA5594FF738370D5DC3068A9538CA

SSDEEP:

98304:eihTxViznt7pYcfaJpOr4QJFLIr+Pbvem3HYMYqQrTGHEdcu1vpgvVC8k2N19I75:qiMwgfJ6p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 644)
  • SUSPICIOUS

    • Application launched itself

      • cmd.exe (PID: 6220)
      • adb.exe (PID: 6932)
      • cmd.exe (PID: 5748)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 6220)
      • wscript.exe (PID: 4840)
      • cmd.exe (PID: 5748)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 4840)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 644)
    • Create files in a temporary directory

      • adb.exe (PID: 7076)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 644)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 644)
    • Manual execution by a user

      • cmd.exe (PID: 6220)
      • scrcpy.exe (PID: 6864)
      • adb.exe (PID: 2088)
      • wscript.exe (PID: 4840)
      • scrcpy.exe (PID: 4128)
      • cmd.exe (PID: 6376)
      • cmd.exe (PID: 5748)
    • Reads the computer name

      • adb.exe (PID: 7076)
      • scrcpy.exe (PID: 4128)
    • Checks supported languages

      • adb.exe (PID: 5460)
      • scrcpy.exe (PID: 4128)
      • scrcpy.exe (PID: 2136)
      • adb.exe (PID: 5604)
      • scrcpy.exe (PID: 6344)
      • adb.exe (PID: 3700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:12:09 21:37:44
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: scrcpy-win64-v3.1/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
30
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs scrcpy.exe no specs conhost.exe no specs adb.exe no specs adb.exe adb.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs adb.exe no specs conhost.exe no specs scrcpy.exe no specs conhost.exe no specs adb.exe no specs adb.exe no specs wscript.exe no specs cmd.exe no specs conhost.exe no specs scrcpy.exe no specs adb.exe no specs adb.exe no specs cmd.exe no specs conhost.exe no specs scrcpy.exe no specs adb.exe no specs adb.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
644"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\scrcpy-win64-v3.1.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1328\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeadb.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2088"C:\Users\admin\Desktop\scrcpy-win64-v3.1\adb.exe" C:\Users\admin\Desktop\scrcpy-win64-v3.1\adb.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\scrcpy-win64-v3.1\adb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2136scrcpy.exeC:\Users\admin\Desktop\scrcpy-win64-v3.1\scrcpy.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\scrcpy-win64-v3.1\scrcpy.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\desktop\scrcpy-win64-v3.1\sdl2.dll
c:\windows\system32\user32.dll
2996cmdC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\wldp.dll
3288adb start-serverC:\Users\admin\Desktop\scrcpy-win64-v3.1\adb.exescrcpy.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\scrcpy-win64-v3.1\adb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
3688"C:\Windows\System32\cmd.exe" /c scrcpy.exeC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
3700adb devices -lC:\Users\admin\Desktop\scrcpy-win64-v3.1\adb.exescrcpy.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\scrcpy-win64-v3.1\adb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
4120\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exescrcpy.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4128"C:\Users\admin\Desktop\scrcpy-win64-v3.1\scrcpy.exe" C:\Users\admin\Desktop\scrcpy-win64-v3.1\scrcpy.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\scrcpy-win64-v3.1\scrcpy.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\scrcpy-win64-v3.1\sdl2.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\users\admin\desktop\scrcpy-win64-v3.1\avcodec-61.dll
Total events
5 359
Read events
5 341
Write events
18
Delete events
0

Modification events

(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\scrcpy-win64-v3.1.zip
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
10
Suspicious files
1
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\swresample-5.dllexecutable
MD5:864DE3BC8A59611059971D6A9AC0DC09
SHA256:33278F72119FF5BB51B053838B6E14F18D6349D4BF91FE74167919FF8E82DD90
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\scrcpy-servercompressed
MD5:B2D1245F74FC7D77C3370E847002CC95
SHA256:958F0944A62F23B1F33A16E9EB14844C1A04B882CA175A738C16D23CB22B86C0
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\icon.pngimage
MD5:9E1FFBD6D2630C3B89BE2B9C19C29E8F
SHA256:8E8CA237898FAA16014CDD118396AF53405B423F3DB0508C50CC3EDCE08EB313
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\avutil-59.dllexecutable
MD5:F1AF569CBB790F0154E83795B686C4C2
SHA256:577214B1CF9D62C3C62E47D041694036ECB607436631C9C2DBFBB29E1C3A4CA6
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\open_a_terminal_here.battext
MD5:98359F622A36689D7D76E00C28C5636F
SHA256:843758795A84D0D035A7D277AD29CC1FF1702048B4B61AE74B9E3439AE683423
7076adb.exeC:\Users\admin\.android\adbkeytext
MD5:8002CC774CD35E762B5DC213D52EB4B2
SHA256:55283EBBD3DA0563BAC4533EE573C8A3B4B1364080B009049CE6CAB637D0C09C
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\scrcpy-noconsole.vbstext
MD5:A6ADB14566ED94E5D80107AEB0FA5291
SHA256:3CCDA94C161F18CEF07C50D4D3C4913EB883D4B0FE3B939C35FAE52784FB1D2B
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\scrcpy.exeexecutable
MD5:B19A6030CF56CA7646940F9BD7DD0CCB
SHA256:831CB2317E7040C7A2693C5F495B963883B9CDC8A9C40C5719CACBCC5DE40AC3
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\AdbWinUsbApi.dllexecutable
MD5:93A6075B7AE7D0DF52EC55017A2F8214
SHA256:3BA13420D47C60D958E0D5B333440F9895704879BB7C983B55F195717F621A3E
644WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa644.5231\scrcpy-win64-v3.1\AdbWinApi.dllexecutable
MD5:D2C034449BE65653AEC2459D9AB83AE5
SHA256:DB92F418F6C384FAEEBCCADBC592FB339AF3D51ECFEC3EC04BD3572080247BAE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
31
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6960
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6508
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6960
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2.21.65.132:443
Akamai International B.V.
NL
unknown
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
4864
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.64
  • 20.190.159.23
  • 40.126.31.69
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.4
  • 20.190.159.71
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info