File name:

磁碟机病毒.zip

Full analysis: https://app.any.run/tasks/cf2c104a-7cbd-4969-b180-88923181d40d
Verdict: Malicious activity
Analysis date: April 01, 2022, 16:07:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

7F328CDB5EF376BA23DE0CE1B2C36AAB

SHA1:

F0DCDA019692DDCF4F2DB3FBB4962F8500E94F10

SHA256:

1B56EAA265A344847970D91CB55AA2B779427828DA90CA96B0411F037C38E526

SSDEEP:

1536:83YPiUEXqdJ/cZSZEXB1A+th17JJe/0SOMY8TUAqSxo1v:GYaUzcKMGMj7JJOR53r1g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
      • smss.exe (PID: 2268)
      • smss.exe (PID: 3448)
      • smss.exe (PID: 1632)
    • Drops executable file immediately after starts

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
      • smss.exe (PID: 1632)
    • Registers / Runs the DLL via REGSVR32.EXE

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 124)
      • regsvr32.exe (PID: 3916)
      • lsass.exe (PID: 2044)
      • ctfmon.exe (PID: 1672)
      • Explorer.EXE (PID: 1376)
      • smss.exe (PID: 2268)
      • WerFault.exe (PID: 2868)
      • Dwm.exe (PID: 824)
      • Explorer.EXE (PID: 1680)
    • Changes AppInit_DLLs value (autorun option)

      • lsass.exe (PID: 2044)
    • Loads the Task Scheduler COM API

      • WerFault.exe (PID: 2868)
      • Explorer.EXE (PID: 1680)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2960)
      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
      • cmd.exe (PID: 3460)
      • cmd.exe (PID: 1856)
      • cmd.exe (PID: 1860)
      • cmd.exe (PID: 3968)
      • smss.exe (PID: 2268)
      • cmd.exe (PID: 3512)
      • cmd.exe (PID: 3592)
      • cmd.exe (PID: 3032)
      • smss.exe (PID: 1632)
      • cmd.exe (PID: 2360)
      • smss.exe (PID: 3448)
      • cmd.exe (PID: 916)
      • cmd.exe (PID: 2340)
    • Reads the computer name

      • WinRAR.exe (PID: 2960)
      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2960)
      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
      • smss.exe (PID: 1632)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2960)
      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
      • smss.exe (PID: 1632)
    • Creates files in the Windows directory

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
    • Starts itself from another location

      • ¦+¦·+·.exe (PID: 1396)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 3916)
      • regsvr32.exe (PID: 124)
    • Drops a file that was compiled in debug mode

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
    • Starts CMD.EXE for commands execution

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
    • Removes files from Windows directory

      • ¦+¦·+·.exe (PID: 1396)
      • lsass.exe (PID: 2044)
      • cmd.exe (PID: 2340)
    • Reads the date of Windows installation

      • Explorer.EXE (PID: 1680)
    • Creates executable files which already exist in Windows

      • WerFault.exe (PID: 2868)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1680)
  • INFO

    • Checks supported languages

      • cacls.exe (PID: 3040)
      • regsvr32.exe (PID: 3916)
      • cacls.exe (PID: 2496)
      • cacls.exe (PID: 4040)
      • cacls.exe (PID: 2980)
      • cacls.exe (PID: 2804)
      • cacls.exe (PID: 2624)
      • cacls.exe (PID: 2108)
      • cacls.exe (PID: 2848)
      • regsvr32.exe (PID: 124)
      • WerFault.exe (PID: 2868)
      • Explorer.EXE (PID: 1680)
    • Manual execution by user

      • ¦+¦·+·.exe (PID: 1396)
    • Reads the computer name

      • cacls.exe (PID: 3040)
      • regsvr32.exe (PID: 3916)
      • cacls.exe (PID: 4040)
      • cacls.exe (PID: 2108)
      • cacls.exe (PID: 2804)
      • cacls.exe (PID: 2848)
      • cacls.exe (PID: 2980)
      • cacls.exe (PID: 2496)
      • cacls.exe (PID: 2624)
      • regsvr32.exe (PID: 124)
      • Explorer.EXE (PID: 1680)
      • WerFault.exe (PID: 2868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: ?ŵ???.exe
ZipUncompressedSize: 89600
ZipCompressedSize: 85707
ZipCRC: 0x6e02fe39
ZipModifyDate: 2020:06:12 08:24:03
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
85
Monitored processes
31
Malicious processes
4
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start winrar.exe ¦+¦·+·.exe cacls.exe no specs cacls.exe no specs cmd.exe no specs regsvr32.exe no specs lsass.exe cacls.exe no specs cacls.exe no specs cacls.exe no specs cacls.exe no specs cacls.exe no specs cacls.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs regsvr32.exe no specs smss.exe no specs explorer.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs smss.exe cmd.exe no specs smss.exe no specs ctfmon.exe no specs dwm.exe no specs werfault.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
124"C:\Windows\System32\regsvr32.exe" C:\Windows\system32\com\netcfg.dll /sC:\Windows\System32\regsvr32.exelsass.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
824"C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\uxtheme.dll
916cmd.exe /c rd /s /q "C:\Windows\system32\dnsq.dll"C:\Windows\system32\cmd.exelsass.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
267
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1376C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
255
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1396"C:\Users\admin\Desktop\¦+¦·+·.exe" C:\Users\admin\Desktop\¦+¦·+·.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\¦+¦·+·.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mfc42.dll
c:\windows\system32\user32.dll
1632C:\Windows\system32\com\smss.exe C:\Windows\system32\com\lsass.exe|C:\pagefile.pifC:\Windows\system32\com\smss.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\windows\system32\com\smss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1672C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CTF Loader
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1680"C:\Windows\Explorer.EXE" C:\Windows\Explorer.EXEWerFault.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1856cmd.exe /c rd /s /q "C:\Windows\system32\com\lsass.exe"C:\Windows\system32\cmd.exelsass.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
267
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1860cmd.exe /c rd /s /q "C:\Windows\system32\com\netcfg.000"C:\Windows\system32\cmd.exelsass.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
267
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
6 307
Read events
6 056
Write events
189
Delete events
62

Modification events

(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\磁碟机病毒.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
10
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
2868WerFault.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_5c316724265a4216cf1d64b3e812e2393aea33_0b244e12\Report.wer
MD5:
SHA256:
2044lsass.exeC:\Windows\system32\dnsq.dllexecutable
MD5:
SHA256:
1396¦+¦·+·.exeC:\Windows\system32\com\netcfg.000executable
MD5:
SHA256:
2044lsass.exeC:\NetApi00.sysexecutable
MD5:
SHA256:
1396¦+¦·+·.exeC:\NetApi00.sysexecutable
MD5:
SHA256:
1396¦+¦·+·.exeC:\Windows\system32\com\netcfg.dllexecutable
MD5:
SHA256:
2044lsass.exeC:\AUTORUN.INFini
MD5:
SHA256:
1396¦+¦·+·.exeC:\Windows\system32\com\smss.exeexecutable
MD5:
SHA256:
1396¦+¦·+·.exeC:\Windows\system32\com\lsass.exeexecutable
MD5:4C36884F0644946344FA847756F4A04E
SHA256:E60E684986EC4F5C9D6C81109A5AC41A9254CDFDC08734FA4AE30596DC8FBF42
2044lsass.exeC:\037589.logexecutable
MD5:4C36884F0644946344FA847756F4A04E
SHA256:E60E684986EC4F5C9D6C81109A5AC41A9254CDFDC08734FA4AE30596DC8FBF42
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info