File name:

BakkesModSetup.zip

Full analysis: https://app.any.run/tasks/9b9044de-ae6e-4160-bd08-31a653df63be
Verdict: Malicious activity
Analysis date: May 19, 2025, 06:55:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
inno
installer
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

C6E0152420E778581A0C6365A2A9B3D6

SHA1:

C148956612DDD7EE5710E2CDD36CE0AA10AA9026

SHA256:

10C80FB4040AAA2FD66C1E46AC2A5D08E8992A60784DF68E5086EB9DEB585F17

SSDEEP:

98304:/tllry4KhrBNlQWwHo5wBBizXeqISj6m+giJxGPidk0Mh8DsmFNTjGdxvaHkDuQk:KthCeew7iagTfakx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7152)
    • Changes the autorun value in the registry

      • BakkesMod.exe (PID: 6488)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Reads security settings of Internet Explorer

      • BakkesModSetup.tmp (PID: 2088)
    • Reads the Windows owner or organization settings

      • BakkesModSetup.tmp (PID: 1188)
    • Uses TASKKILL.EXE to kill process

      • BakkesModSetup.tmp (PID: 1188)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2692)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7152)
    • Manual execution by a user

      • BakkesModSetup.exe (PID: 6800)
      • BakkesMod.exe (PID: 5344)
      • BakkesMod.exe (PID: 728)
    • Checks supported languages

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Create files in a temporary directory

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Reads the computer name

      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Process checks computer location settings

      • BakkesModSetup.tmp (PID: 2088)
    • Compiled with Borland Delphi (YARA)

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
    • Detects InnoSetup installer (YARA)

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesModSetup.exe (PID: 6272)
    • Creates files in the program directory

      • BakkesModSetup.tmp (PID: 1188)
    • Creates a software uninstall entry

      • BakkesModSetup.tmp (PID: 1188)
    • Creates files or folders in the user directory

      • BakkesMod.exe (PID: 6488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:01:23 23:49:32
ZipCRC: 0x3be94663
ZipCompressedSize: 8168671
ZipUncompressedSize: 8743183
ZipFileName: BakkesModSetup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
161
Monitored processes
14
Malicious processes
1
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe bakkesmodsetup.exe bakkesmodsetup.tmp no specs bakkesmodsetup.exe bakkesmodsetup.tmp taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs bakkesmod.exe slui.exe vssvc.exe no specs bakkesmod.exe bakkesmod.exe

Process information

PID
CMD
Path
Indicators
Parent process
728"C:\Program Files\BakkesMod\BakkesMod.exe" C:\Program Files\BakkesMod\BakkesMod.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\program files\bakkesmod\bakkesmod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1188"C:\Users\admin\AppData\Local\Temp\is-SUDQS.tmp\BakkesModSetup.tmp" /SL5="$702B4,7803864,941056,C:\Users\admin\Desktop\BakkesModSetup.exe" /SPAWNWND=$4025C /NOTIFYWND=$50272 C:\Users\admin\AppData\Local\Temp\is-SUDQS.tmp\BakkesModSetup.tmp
BakkesModSetup.exe
User:
admin
Company:
BakkesMod
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-sudqs.tmp\bakkesmodsetup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
1348\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2088"C:\Users\admin\AppData\Local\Temp\is-OO9I0.tmp\BakkesModSetup.tmp" /SL5="$50272,7803864,941056,C:\Users\admin\Desktop\BakkesModSetup.exe" C:\Users\admin\AppData\Local\Temp\is-OO9I0.tmp\BakkesModSetup.tmpBakkesModSetup.exe
User:
admin
Company:
BakkesMod
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-oo9i0.tmp\bakkesmodsetup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
2392"taskkill.exe" /f /im "BakkesMod.exe"C:\Windows\System32\taskkill.exeBakkesModSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2692C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3268"taskkill.exe" /f /im "RocketLeague.exe"C:\Windows\System32\taskkill.exeBakkesModSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5344"C:\Program Files\BakkesMod\BakkesMod.exe" C:\Program Files\BakkesMod\BakkesMod.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\program files\bakkesmod\bakkesmod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5984C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6272"C:\Users\admin\Desktop\BakkesModSetup.exe" /SPAWNWND=$4025C /NOTIFYWND=$50272 C:\Users\admin\Desktop\BakkesModSetup.exe
BakkesModSetup.tmp
User:
admin
Company:
BakkesMod
Integrity Level:
HIGH
Description:
BakkesMod Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\desktop\bakkesmodsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 942
Read events
3 882
Write events
47
Delete events
13

Modification events

(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\BakkesModSetup.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
31
Suspicious files
20
Text files
241
Unknown types
0

Dropped files

PID
Process
Filename
Type
6272BakkesModSetup.exeC:\Users\admin\AppData\Local\Temp\is-SUDQS.tmp\BakkesModSetup.tmpexecutable
MD5:8F4A51F9A89E8E04FC8A465436B5BBA9
SHA256:6C0C57A9DEA98D5A31DBF99D880DD828D094965397FE453F20FE186C55B33265
1188BakkesModSetup.tmpC:\Program Files\BakkesMod\unins000.datbinary
MD5:80328BAE796BC43BDC1F8C5E57C8E22D
SHA256:4522BC7C54A8CB27D46909ACEA8970FDF2B0A50BC99CA25B7E5347118F77E855
1188BakkesModSetup.tmpC:\Program Files\BakkesMod\BakkesMod.exeexecutable
MD5:11EFF18A407E2764C198D7B1E7DADB14
SHA256:7A6B97BF43453C47D905C6F49E3CC6EE8B70F0E289700AA6145F40577CA7B5D4
1188BakkesModSetup.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\BakkesMod.lnkbinary
MD5:494528C6015D4F08232F07E0F1B74EA9
SHA256:F3CEF153EDD2C37EE29B1BA2C40A2549EF3B501DD894BA429533E426AA89B0E2
1188BakkesModSetup.tmpC:\Program Files\BakkesMod\is-09GJ4.tmpexecutable
MD5:AEA069292728AE441A5EE55729DD46B6
SHA256:AB8FA587AA83FC0526B29DCA0F342268721460F9EC31CEC2938547F81D583FCA
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\64bitbminjector.exeexecutable
MD5:BC58339C62B92FDA51DA1241B9365D8E
SHA256:DE20B80F7393A795FF48FD7FB42A9C7AEDF43FCAD42FED2066D03F55D879FE10
1188BakkesModSetup.tmpC:\Users\admin\AppData\Local\Temp\is-30DOB.tmp\_isetup\_isdecmp.dllexecutable
MD5:C6AE924AD02500284F7E4EFA11FA7CFC
SHA256:31D04C1E4BFDFA34704C142FA98F80C0A3076E4B312D6ADA57C4BE9D9C7DCF26
1188BakkesModSetup.tmpC:\Users\Public\Desktop\BakkesMod.lnkbinary
MD5:C0002205E8BA383A9ADB4E476386536C
SHA256:E5314C9274412BA8FCF1D49AAC41898142A23FC82A3F7811E346AA64EA9E0F23
6800BakkesModSetup.exeC:\Users\admin\AppData\Local\Temp\is-OO9I0.tmp\BakkesModSetup.tmpexecutable
MD5:8F4A51F9A89E8E04FC8A465436B5BBA9
SHA256:6C0C57A9DEA98D5A31DBF99D880DD828D094965397FE453F20FE186C55B33265
1188BakkesModSetup.tmpC:\Program Files\BakkesMod\unins000.exeexecutable
MD5:AEA069292728AE441A5EE55729DD46B6
SHA256:AB8FA587AA83FC0526B29DCA0F342268721460F9EC31CEC2938547F81D583FCA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
49
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.20:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5436
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5436
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
756
lsass.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
756
lsass.exe
GET
200
184.24.77.81:80
http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgV6tTHLxWLC5SSg%2FbnXwdG%2B0A%3D%3D
unknown
whitelisted
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
whitelisted
756
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCEQDzZE5rbgBQI34JRr174fUd
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.20:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.20
  • 23.216.77.22
  • 23.216.77.28
  • 23.216.77.8
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.128
  • 20.190.159.129
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.131
  • 40.126.31.128
  • 40.126.31.130
  • 40.126.31.0
  • 40.126.31.1
  • 40.126.31.131
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
updater.bakkesmod.com
  • 149.210.150.107
whitelisted

Threats

No threats detected
No debug info