File name:

BakkesModSetup.zip

Full analysis: https://app.any.run/tasks/9b9044de-ae6e-4160-bd08-31a653df63be
Verdict: Malicious activity
Analysis date: May 19, 2025, 06:55:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
inno
installer
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

C6E0152420E778581A0C6365A2A9B3D6

SHA1:

C148956612DDD7EE5710E2CDD36CE0AA10AA9026

SHA256:

10C80FB4040AAA2FD66C1E46AC2A5D08E8992A60784DF68E5086EB9DEB585F17

SSDEEP:

98304:/tllry4KhrBNlQWwHo5wBBizXeqISj6m+giJxGPidk0Mh8DsmFNTjGdxvaHkDuQk:KthCeew7iagTfakx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7152)
    • Changes the autorun value in the registry

      • BakkesMod.exe (PID: 6488)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Reads security settings of Internet Explorer

      • BakkesModSetup.tmp (PID: 2088)
    • Reads the Windows owner or organization settings

      • BakkesModSetup.tmp (PID: 1188)
    • Uses TASKKILL.EXE to kill process

      • BakkesModSetup.tmp (PID: 1188)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2692)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7152)
    • Manual execution by a user

      • BakkesModSetup.exe (PID: 6800)
      • BakkesMod.exe (PID: 728)
      • BakkesMod.exe (PID: 5344)
    • Checks supported languages

      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Create files in a temporary directory

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Reads the computer name

      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesMod.exe (PID: 6488)
    • Process checks computer location settings

      • BakkesModSetup.tmp (PID: 2088)
    • Compiled with Borland Delphi (YARA)

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.exe (PID: 6272)
      • BakkesModSetup.tmp (PID: 1188)
    • Detects InnoSetup installer (YARA)

      • BakkesModSetup.exe (PID: 6800)
      • BakkesModSetup.tmp (PID: 2088)
      • BakkesModSetup.tmp (PID: 1188)
      • BakkesModSetup.exe (PID: 6272)
    • Creates files in the program directory

      • BakkesModSetup.tmp (PID: 1188)
    • Creates a software uninstall entry

      • BakkesModSetup.tmp (PID: 1188)
    • Creates files or folders in the user directory

      • BakkesMod.exe (PID: 6488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:01:23 23:49:32
ZipCRC: 0x3be94663
ZipCompressedSize: 8168671
ZipUncompressedSize: 8743183
ZipFileName: BakkesModSetup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
161
Monitored processes
14
Malicious processes
1
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe bakkesmodsetup.exe bakkesmodsetup.tmp no specs bakkesmodsetup.exe bakkesmodsetup.tmp taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs bakkesmod.exe slui.exe vssvc.exe no specs bakkesmod.exe bakkesmod.exe

Process information

PID
CMD
Path
Indicators
Parent process
728"C:\Program Files\BakkesMod\BakkesMod.exe" C:\Program Files\BakkesMod\BakkesMod.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\program files\bakkesmod\bakkesmod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1188"C:\Users\admin\AppData\Local\Temp\is-SUDQS.tmp\BakkesModSetup.tmp" /SL5="$702B4,7803864,941056,C:\Users\admin\Desktop\BakkesModSetup.exe" /SPAWNWND=$4025C /NOTIFYWND=$50272 C:\Users\admin\AppData\Local\Temp\is-SUDQS.tmp\BakkesModSetup.tmp
BakkesModSetup.exe
User:
admin
Company:
BakkesMod
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-sudqs.tmp\bakkesmodsetup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
1348\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2088"C:\Users\admin\AppData\Local\Temp\is-OO9I0.tmp\BakkesModSetup.tmp" /SL5="$50272,7803864,941056,C:\Users\admin\Desktop\BakkesModSetup.exe" C:\Users\admin\AppData\Local\Temp\is-OO9I0.tmp\BakkesModSetup.tmpBakkesModSetup.exe
User:
admin
Company:
BakkesMod
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-oo9i0.tmp\bakkesmodsetup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
2392"taskkill.exe" /f /im "BakkesMod.exe"C:\Windows\System32\taskkill.exeBakkesModSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2692C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3268"taskkill.exe" /f /im "RocketLeague.exe"C:\Windows\System32\taskkill.exeBakkesModSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5344"C:\Program Files\BakkesMod\BakkesMod.exe" C:\Program Files\BakkesMod\BakkesMod.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\program files\bakkesmod\bakkesmod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5984C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6272"C:\Users\admin\Desktop\BakkesModSetup.exe" /SPAWNWND=$4025C /NOTIFYWND=$50272 C:\Users\admin\Desktop\BakkesModSetup.exe
BakkesModSetup.tmp
User:
admin
Company:
BakkesMod
Integrity Level:
HIGH
Description:
BakkesMod Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\desktop\bakkesmodsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 942
Read events
3 882
Write events
47
Delete events
13

Modification events

(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\BakkesModSetup.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
31
Suspicious files
20
Text files
241
Unknown types
0

Dropped files

PID
Process
Filename
Type
7152WinRAR.exeC:\Users\admin\Desktop\BakkesModSetup.exeexecutable
MD5:B2554EFC048201C086D7BE46F42D00BD
SHA256:D4581C971CA9DA0B40B609ED356A986B33E4E81289EDACD31DC7AB8348A14D20
1188BakkesModSetup.tmpC:\Users\admin\AppData\Local\Temp\is-30DOB.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6800BakkesModSetup.exeC:\Users\admin\AppData\Local\Temp\is-OO9I0.tmp\BakkesModSetup.tmpexecutable
MD5:8F4A51F9A89E8E04FC8A465436B5BBA9
SHA256:6C0C57A9DEA98D5A31DBF99D880DD828D094965397FE453F20FE186C55B33265
6488BakkesMod.exeC:\Users\admin\AppData\Local\Temp\bmupdate.zipcompressed
MD5:3552CBBADA508B5908D49EAB2A723A50
SHA256:2C6533D9BE7C0C1F1BDBF006F44DC9CD6AF775DDF2D888A61EAE673FC6167B37
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\bakkesmodsdk\bakkesmod-patch.exeexecutable
MD5:70808566413A9E0F96496381AF7B120E
SHA256:34706EF576F97BE93A917D80EC8952521020ADA1B481AAC23525C13C620BFE72
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\64bitbminjector.exeexecutable
MD5:BC58339C62B92FDA51DA1241B9365D8E
SHA256:DE20B80F7393A795FF48FD7FB42A9C7AEDF43FCAD42FED2066D03F55D879FE10
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\bakkesmodsdk\bakkes_patchplugin.pytext
MD5:C0716A3B133F0288F3AEF1A5F4F689D5
SHA256:9792F8FC591C0C413E7E78A91E4E4CF83600E1E3F0D06EE2104E7B7E2F2E150E
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\bakkesmodsdk\imgui_bm.zipcompressed
MD5:BD5BB5333548CB437AC02CA016BEDDDC
SHA256:CB7586565E46BC77F288614521197E8D836971C6CA26E04571B32A8789535D33
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\bakkesmodsdk\include\bakkesmod\core\custom_decals_structs.htext
MD5:2016384CF34445341CD93D80CE8807E6
SHA256:40566068463DDC085764B04D6FE5543F1AD56A652E1D7E90CFB926E004401811
6488BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\bakkesmodsdk\include\bakkesmod\core\compiler_toggles.htext
MD5:EFDB1B6C692AA8C03C18E486B623A1C6
SHA256:F45D3E6F3092AEE4572129A18D9DB18F3CD34E9EDFBBEBF3A74A74C563D28B88
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
49
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.20:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5436
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5436
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
756
lsass.exe
GET
200
184.24.77.81:80
http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgV6tTHLxWLC5SSg%2FbnXwdG%2B0A%3D%3D
unknown
whitelisted
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
whitelisted
756
lsass.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.20:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.20
  • 23.216.77.22
  • 23.216.77.28
  • 23.216.77.8
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.128
  • 20.190.159.129
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.131
  • 40.126.31.128
  • 40.126.31.130
  • 40.126.31.0
  • 40.126.31.1
  • 40.126.31.131
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
updater.bakkesmod.com
  • 149.210.150.107
whitelisted

Threats

No threats detected
No debug info