File name:

1st Page 2000.zip

Full analysis: https://app.any.run/tasks/97a948c6-b48a-40d3-a095-0a5e52937bae
Verdict: Malicious activity
Analysis date: August 06, 2024, 01:19:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

382A8160A90E45E37BF5E3E75849933F

SHA1:

F416A64C3CADF52A2E4EA8C5B3A552D48A885137

SHA256:

137BD412FEFE2B3C63C815F1B14729979C9E51253227BC3CCA6B9387C55F00EA

SSDEEP:

98304:Wzf0Kgh2dNSlnJitHHhuXg4IhsHg3ldidPXRGgmKpbiZRfikYHreiyoHBxU9R:WzcTWSzQBuXpggg3loIgmQbERfpYyidS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 7056)
      • setup.exe (PID: 6840)
      • setup.exe (PID: 1680)
      • _INS5176._MP (PID: 5500)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • _INS5176._MP (PID: 5500)
    • Creates file in the systems drive root

      • setup.exe (PID: 6840)
      • _isdel.exe (PID: 6968)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 6840)
      • setup.exe (PID: 1680)
      • _INS5176._MP (PID: 5500)
    • Starts application with an unusual extension

      • setup.exe (PID: 1680)
    • Reads the Windows owner or organization settings

      • _INS5176._MP (PID: 5500)
    • Creates a software uninstall entry

      • _INS5176._MP (PID: 5500)
  • INFO

    • Manual execution by a user

      • setup.exe (PID: 888)
      • setup.exe (PID: 6840)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7056)
    • Checks supported languages

      • setup.exe (PID: 6840)
      • setup.exe (PID: 1680)
      • _INS5176._MP (PID: 5500)
      • _isdel.exe (PID: 6968)
      • TextInputHost.exe (PID: 6484)
    • Reads the computer name

      • setup.exe (PID: 6840)
      • setup.exe (PID: 1680)
      • _INS5176._MP (PID: 5500)
      • TextInputHost.exe (PID: 6484)
    • Create files in a temporary directory

      • setup.exe (PID: 6840)
      • setup.exe (PID: 1680)
      • _INS5176._MP (PID: 5500)
    • Creates files in the program directory

      • _INS5176._MP (PID: 5500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0002
ZipCompression: Deflated
ZipModifyDate: 1999:09:23 23:21:16
ZipCRC: 0x08658db6
ZipCompressedSize: 1088
ZipUncompressedSize: 2189
ZipFileName: readme.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs Shell Security Editor no specs setup.exe no specs setup.exe setup.exe _ins5176._mp _isdel.exe no specs textinputhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
888"C:\Users\admin\AppData\Local\Temp\1st Page 2000\setup.exe" C:\Users\admin\AppData\Local\Temp\1st Page 2000\setup.exeexplorer.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
MEDIUM
Description:
PackageForTheWeb Stub
Exit code:
3221226540
Version:
2.02.001
Modules
Images
c:\users\admin\appdata\local\temp\1st page 2000\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1680"C:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\SETUP.EXE" -isw64"C:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\SETUP.EXE" /SMSC:\Windows\SysWOW64\InstallShield\setup.exe
setup.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
32-bit Setup Launcher
Exit code:
0
Version:
5, 54, 001, 0
Modules
Images
c:\windows\syswow64\installshield\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
1884C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3044C:\WINDOWS\system32\DllHost.exe /Processid:{4D111E08-CBF7-4F12-A926-2C7920AF52FC}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
5500C:\Users\admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MPC:\Users\admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MP
setup.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
InstallShield Engine
Exit code:
0
Version:
5.10.145.0
Modules
Images
c:\users\admin\appdata\local\temp\_istmp1.dir\_ins5176._mp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
6484"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
6840"C:\Users\admin\AppData\Local\Temp\1st Page 2000\setup.exe" C:\Users\admin\AppData\Local\Temp\1st Page 2000\setup.exe
explorer.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
PackageForTheWeb Stub
Exit code:
0
Version:
2.02.001
Modules
Images
c:\users\admin\appdata\local\temp\1st page 2000\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6968C:\Windows\SysWOW64\InstallShield\_ISDEL.EXEC:\Windows\SysWOW64\InstallShield\_isdel.exesetup.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
32-bit InstallShield Deleter.
Exit code:
0
Version:
5, 51, 138, 0
Modules
Images
c:\windows\syswow64\installshield\_isdel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
7056"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\1st Page 2000.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
9 593
Read events
9 580
Write events
13
Delete events
0

Modification events

(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\1st Page 2000.zip
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7056) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\1st Page 2000
(PID) Process:(5500) _INS5176._MPKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\1st Page 2000 2.00 Free
Operation:writeName:UninstallString
Value:
C:\WINDOWS\IsUninst.exe -f"C:\Program Files (x86)\Evrsoft\1st Page 2000\Uninst.isu"
Executable files
24
Suspicious files
18
Text files
915
Unknown types
0

Dropped files

PID
Process
Filename
Type
6840setup.exeC:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\pftw1.pkg
MD5:
SHA256:
6840setup.exeC:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\data1.cab
MD5:
SHA256:
6840setup.exeC:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\os.dattext
MD5:AF1D8D9435CB10FE2F4B4215EAF6BEC4
SHA256:2F148CB3D32AB70A315B5A853761C2702B6DEEF6FFAFF6AA76D513B945CE7EF7
7056WinRAR.exeC:\Users\admin\AppData\Local\Temp\1st Page 2000\setup.exeexecutable
MD5:863CAD3C0766651B7AFC7D2D6C40AB3C
SHA256:88E976D46745585A02AD0823096E8CBEAD66E775FA70C0FF3372BC538F6302F9
1680setup.exeC:\Users\admin\AppData\Local\Temp\_ISTMP1.DIR\_WUTL951.DLLexecutable
MD5:847D78A673E9B8313C651D037180F3B4
SHA256:3AD102D309953433FAEF7357CAB408C8E64995F8111F57A59B9F6E5B7E8D4A92
1680setup.exeC:\Users\admin\AppData\Local\Temp\_ISTMP1.DIR\_INS5176._MPexecutable
MD5:BABA24276959A828084FFEBF81FD8E4C
SHA256:33F36A90AA8FC3F8D0D1A87BE96C5CE9023E3B53C2D1DC0610339CAA7F7B5B70
6840setup.exeC:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\_ISDEL.EXEexecutable
MD5:1F9BBFAAB8DEC9AC4416E5BE2D22E315
SHA256:DAD294B71F24B1EB140D3536AB7ABD0336977FE92A18BE38ABE4F1A5BE91939A
7056WinRAR.exeC:\Users\admin\AppData\Local\Temp\1st Page 2000\readme.txttext
MD5:6E39CD6A1F6F3F3B794D0B357ABC7470
SHA256:E5959028EB324D8931FB755AE9758F9EB60A8EB1DF35B60A09734D4AE9966DEC
6840setup.exeC:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\_SETUP.DLLexecutable
MD5:8C6DC2367841533E1FE0C2E402CABD03
SHA256:2178D6BBB5A3CDB803341C516CB7B06019A2183E3F3572177F186802252209E5
6840setup.exeC:\Users\admin\AppData\Local\Temp\pftC0F5~tmp\lang.dattext
MD5:90E64689804B4F4B0197C07290965A3C
SHA256:EB1E8EA9707BC2F6EB4B4CC4D022E6ACF0B79E0C66F8406478269EEAB05693B8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
54
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6420
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6140
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6384
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6140
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6444
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
5600
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5336
SearchApp.exe
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6140
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6384
backgroundTaskHost.exe
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.bing.com
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.133
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.140
  • 20.190.160.20
  • 40.126.32.74
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
th.bing.com
  • 2.23.209.130
  • 2.23.209.187
  • 2.23.209.182
  • 2.23.209.133
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

No threats detected
No debug info