download:

/wp-content/uploads/2021/08/CDM212364_Setup.zip

Full analysis: https://app.any.run/tasks/e7af8fc4-286d-489a-9f99-dc63416a48e1
Verdict: Malicious activity
Analysis date: September 04, 2024, 15:24:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

09B8D1E4F64828A2012AE54A7746D6D5

SHA1:

1B1FA041EFF7B6FAB10E9FE73D3149C4DB750886

SHA256:

10C399AC784D2B68B1BB2BA598BAB7FE00CFDFD267B4CC14A3E3240FE9499FB1

SSDEEP:

49152:8GehdaQ/cr5lWZGiPsM3eg2FF56gtGRzDHaNTC4jt92Wh:padfioGiUMH2bLt6LaNTCGt92Wh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • CDM212364_Setup.exe (PID: 5468)
    • Drops a system driver (possible attempt to evade defenses)

      • dpinst-amd64.exe (PID: 4704)
      • CDM212364_Setup.exe (PID: 5468)
      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
    • Executable content was dropped or overwritten

      • dpinst-amd64.exe (PID: 4704)
      • CDM212364_Setup.exe (PID: 5468)
      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
    • Creates files in the driver directory

      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
    • Starts a Microsoft application from unusual location

      • dpinst-amd64.exe (PID: 4704)
    • Checks Windows Trust Settings

      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
  • INFO

    • Manual execution by a user

      • CDM212364_Setup.exe (PID: 5468)
      • CDM212364_Setup.exe (PID: 6660)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 3728)
    • Checks supported languages

      • dp-chooser.exe (PID: 6840)
      • dpinst-amd64.exe (PID: 4704)
      • drvinst.exe (PID: 6052)
      • CDM212364_Setup.exe (PID: 5468)
      • drvinst.exe (PID: 1840)
    • Reads the computer name

      • dpinst-amd64.exe (PID: 4704)
      • CDM212364_Setup.exe (PID: 5468)
      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3728)
    • Create files in a temporary directory

      • CDM212364_Setup.exe (PID: 5468)
      • dpinst-amd64.exe (PID: 4704)
    • Reads the software policy settings

      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 6052)
      • drvinst.exe (PID: 1840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2021:07:12 13:11:30
ZipCRC: 0x1986ce3c
ZipCompressedSize: 2209307
ZipUncompressedSize: 2264632
ZipFileName: CDM212364_Setup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
7
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe cdm212364_setup.exe no specs cdm212364_setup.exe dp-chooser.exe no specs dpinst-amd64.exe drvinst.exe drvinst.exe

Process information

PID
CMD
Path
Indicators
Parent process
1840DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{c2d9b399-96af-6444-b0c8-b9b167c63d96}\ftdiport.inf" "9" "461a5a59f" "00000000000001EC" "WinSta0\Default" "00000000000001E8" "208" "c:\users\admin\appdata\local\temp\ftdi-driver"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
3728"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\CDM212364_Setup.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4704C:\Users\admin\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /saC:\Users\admin\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
dp-chooser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Driver Package Installer
Exit code:
512
Version:
2.1
Modules
Images
c:\users\admin\appdata\local\temp\ftdi-driver\dpinst-amd64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5468"C:\Users\admin\Desktop\CDM212364_Setup.exe" C:\Users\admin\Desktop\CDM212364_Setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\cdm212364_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6052DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{087e8e6c-3c3b-b543-a2b4-3305ea07a0b6}\ftdibus.inf" "9" "4a9ba6403" "00000000000001CC" "WinSta0\Default" "00000000000001DC" "208" "c:\users\admin\appdata\local\temp\ftdi-driver"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
6660"C:\Users\admin\Desktop\CDM212364_Setup.exe" C:\Users\admin\Desktop\CDM212364_Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\cdm212364_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6840C:\Users\admin\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCDM212364_Setup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ftdi-driver\dp-chooser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
7 799
Read events
7 782
Write events
17
Delete events
0

Modification events

(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\CDM212364_Setup.zip
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4704) dpinst-amd64.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
Operation:writeName:setupapi.dev.log
Value:
4096
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000100002E000000C004000017020000
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(3728) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
51
Suspicious files
8
Text files
18
Unknown types
6

Dropped files

PID
Process
Filename
Type
3728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3728.29018\CDM212364_Setup.exeexecutable
MD5:0C97E7B5DE1B46FB723BED38F0DE28A2
SHA256:835DD64B199190D20DC37C0CADEB064B7EAAAEF271703781B2B259B7085437A4
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\amd64\ftbusui.dllexecutable
MD5:D79A5E34F684B547FA2F963DFCC15A21
SHA256:4BBC0B301A7C5A6B1B73878CE3AEEB191F5FCEAC05835372142206D79AC81559
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx.libobj
MD5:2C6C133941002E602D1AC6831CBB7368
SHA256:7C3A73D3A2441B460F03358BC8CC81E5F3FB43523BFA35E4EEF3BBE8BAD5788D
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\amd64\ftcserco.dllexecutable
MD5:AA69BF96E10F463082A0664B7A2E9FAE
SHA256:C0224B9EF14365F6DDA96134CC77D978E69FBD61EFDADE6FD1EB676418C41023
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sysexecutable
MD5:AB7418C8DFBBB97BEFB4F0ADED3D4663
SHA256:3BD5BB7E646E67469EC25A37CAA5131CF992759703B0FC170DF7AF265B9F8E74
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FED104.tmptext
MD5:50F2BBF24A14BE4E408F94BC3849C38D
SHA256:D99B9414E6B4C20127BD62BB105010BF980A5F1C2922B1D900629F498473095A
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\amd64\ftserui2.dllexecutable
MD5:3E5BCD980AF8B20313005D9A492CEC8A
SHA256:55A23A2AC263E10B77D7E95601439F771062F2C248A8D93039A968D66100C39C
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx64.dllexecutable
MD5:BEFBC1A8F6C2B8E143DDD97CCB6561B5
SHA256:774AF8B12C85D03562742ACDF222AF5E0432167BF107BA4B260757E4A5E36866
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\ftdiport.catcat
MD5:60238C00694F838EED4757D1CE167D8B
SHA256:113A35E6161F3AE8BB9D0E0F31913872C4B32FD6211ECE27DDDEB238F601EB59
5468CDM212364_Setup.exeC:\Users\admin\AppData\Local\Temp\FTDI-Driver\ftdibus.inftext
MD5:B404B591DCAE1E28603479A7963CB6F6
SHA256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6856
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1780
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5180
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5180
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEASGp3XRNgzfylEWBFW6KKc%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6856
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4316
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6856
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1780
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1780
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.75
  • 40.126.31.67
  • 20.190.159.23
  • 20.190.159.73
  • 40.126.31.69
  • 40.126.31.73
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
www.bing.com
  • 92.123.104.37
  • 92.123.104.41
  • 92.123.104.32
  • 92.123.104.62
  • 92.123.104.59
  • 92.123.104.39
  • 92.123.104.56
  • 92.123.104.49
  • 92.123.104.34
whitelisted

Threats

No threats detected
No debug info