File name:

CapCut PC Pro.zip

Full analysis: https://app.any.run/tasks/592212ff-6fdf-4904-b36e-297db13e72b0
Verdict: Malicious activity
Analysis date: August 30, 2024, 13:22:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

01292BA331765CEE436F037FE5843124

SHA1:

4AFCED06844B2AB6EAC9BAF5DB23E2285867E211

SHA256:

20CBA51B0CEA3E386186B46F848ED942DF8EC5AE64526457D3BFC06901018CE9

SSDEEP:

98304:LCK4TdpZC8KPWjdwJOYMTIOKGo0poAz0Ackhh061aavC64Hb1qU55cDSNzQXeZa9:M5j+rB/rE7l6iGg3B1LNsUNRPV5j

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1124)
    • Changes powershell execution policy (Bypass)

      • CapCut PC Pro.exe (PID: 6420)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 1124)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 6884)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6884)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6884)
      • CapCut PC Pro.exe (PID: 6420)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 6884)
    • Drops 7-zip archiver for unpacking

      • WinRAR.exe (PID: 6884)
    • Starts POWERSHELL.EXE for commands execution

      • CapCut PC Pro.exe (PID: 6420)
    • Executes application which crashes

      • CapCut PC Pro.exe (PID: 6420)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6884)
    • Creates files or folders in the user directory

      • CapCut PC Pro.exe (PID: 6420)
      • WerFault.exe (PID: 3908)
      • WerFault.exe (PID: 236)
    • Reads the computer name

      • CapCut PC Pro.exe (PID: 6420)
    • Checks supported languages

      • CapCut PC Pro.exe (PID: 6420)
      • yllibs.exe (PID: 4020)
    • Reads the machine GUID from the registry

      • CapCut PC Pro.exe (PID: 6420)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6884)
    • Checks proxy server information

      • WerFault.exe (PID: 3908)
      • WerFault.exe (PID: 236)
    • Reads the software policy settings

      • WerFault.exe (PID: 236)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2022:10:20 20:24:16
ZipCRC: 0xddb6b216
ZipCompressedSize: 243647
ZipUncompressedSize: 385256
ZipFileName: CapCut PC Pro.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe capcut pc pro.exe powershell.exe no specs conhost.exe no specs werfault.exe no specs werfault.exe yllibs.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236C:\WINDOWS\system32\WerFault.exe -u -p 6420 -s 2800C:\Windows\System32\WerFault.exe
CapCut PC Pro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
1124"powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -Command "(Get-CimInstance -ClassName Win32_VideoController).Caption;"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCapCut PC Pro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3908C:\WINDOWS\system32\WerFault.exe -u -p 6420 -s 2700C:\Windows\System32\WerFault.exeCapCut PC Pro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
4020"C:\Users\admin\AppData\Local\Temp\Rar$EXa6884.2003\yllibs.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6884.2003\yllibs.exeWinRAR.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
9.21 beta
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6884.2003\yllibs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeyllibs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6420"C:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\CapCut PC Pro.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\CapCut PC Pro.exe
WinRAR.exe
User:
admin
Company:
YL Computing
Integrity Level:
MEDIUM
Description:
imDesktop
Exit code:
3221226525
Version:
2.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6884.49667\capcut pc pro.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6884"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\CapCut PC Pro.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
21 102
Read events
21 060
Write events
41
Delete events
1

Modification events

(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\CapCut PC Pro.zip
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6884) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
18
Suspicious files
6
Text files
38
Unknown types
1

Dropped files

PID
Process
Filename
Type
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\MetroMahStatic
MD5:
SHA256:
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Microsoft.WindowsAPICodePack.Shell.dllexecutable
MD5:18A46202A1636B985208E2183D756617
SHA256:513D386FC084AD355D1A8668D8B4E43CC3B21F135AC3EABBC6B96ADEB3EE9E84
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\ControlzEx.dllexecutable
MD5:2D5035CB5A3678F2C2F5A889BD384813
SHA256:424CBE8F24A62C330149DBE0B80E214A984950C3B79B067058671608229FC2ED
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Hardcodet.Wpf.TaskbarNotification.dllexecutable
MD5:D5D708E9E7625AB2C4AC1C1FAA099350
SHA256:F6FADF0375D22512B2B3F075362433C0DE173ADFB290B4D8999CDCB7ACEDB0B2
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Languages\Polish.xmlxml
MD5:90C85DA1A793104E89789E7D20356463
SHA256:DBBEF50B4E01D4DD91A3D846A1882381F1226618D533DD966F3421A314A667DC
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Languages\Chinese(Simplified).xmlxml
MD5:2BA8908901C62E486DC7D4CE5822ACF3
SHA256:BC98DB44EBC96B4BA51AD23A7B716584F40B8A1D5A46AE6751AA948CE9FE9F86
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\yllibs.exeexecutable
MD5:7E46ABF85B6849F7F2833F8F62F399C9
SHA256:65B226C065D3EF0EA47208000D09F2954A49EA66D1525B60407E0294EB5EA724
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Languages\Dombe.txttext
MD5:5F946AE17824CF7673E431B0F4D354F2
SHA256:D0022EE6BAF18F8F1787820E157F87A4D59DE0936DBE4DCAF4E928DE2877467D
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Languages\Portuguese (Brazil).xmlxml
MD5:50873071801AA9149F2995E3BAAE2006
SHA256:24579D4503460A3E5111E39522EF48B6DA1C45CDB1C1604AA116D3E22E4B7D82
6884WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6884.49667\Languages\English.pngimage
MD5:00214D9E4E6155A04E3997D121641C98
SHA256:1037BB804C8DA171FB1869872BCD24AA1F0C96AD8CE783861DFF91D3174D12A7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
27
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1828
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4056
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4056
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:138
whitelisted
6232
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6020
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1828
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1828
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6232
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.138
  • 20.190.160.14
  • 40.126.32.136
  • 40.126.32.140
  • 40.126.32.72
  • 40.126.32.74
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
watson.events.data.microsoft.com
  • 52.182.143.212
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info