File name:

EN-US_Apinst-x32_64bit.zip

Full analysis: https://app.any.run/tasks/5f8f2418-91b4-4317-82ce-9b14640472ed
Verdict: Malicious activity
Analysis date: December 17, 2024, 19:08:42
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

24B3C01FDE22167ADA7503FE8439FB0F

SHA1:

48C4E0BC61DDB67E154FFD683F50CE8BB8534AFE

SHA256:

28B7F43BCE8BDD98C7ADF838667FA3F05241C430C19B97C283A53DBE1935F1AD

SSDEEP:

196608:jy89uPhV6ZALjISDnCQGv6N1NVy5U9jUu:jR9uPhKALjIynjGvY1y5URp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6440)
    • Loads Python modules

      • Setup.exe (PID: 6308)
      • Setup.exe (PID: 3812)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6440)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 6440)
    • Checks supported languages

      • Setup.exe (PID: 6308)
      • Setup.exe (PID: 3812)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6440)
    • Manual execution by a user

      • Setup.exe (PID: 6308)
      • Setup.exe (PID: 3812)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:12:17 19:29:34
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: EN-US_Apinst-x32_64bit/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs setup.exe no specs setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3812"C:\Users\admin\Desktop\EN-US_Apinst-x32_64bit\Setup.exe" C:\Users\admin\Desktop\EN-US_Apinst-x32_64bit\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\en-us_apinst-x32_64bit\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6308"C:\Users\admin\Desktop\EN-US_Apinst-x32_64bit\Setup.exe" C:\Users\admin\Desktop\EN-US_Apinst-x32_64bit\Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\en-us_apinst-x32_64bit\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6440"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\EN-US_Apinst-x32_64bit.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7124C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
1 683
Read events
1 675
Write events
8
Delete events
0

Modification events

(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\EN-US_Apinst-x32_64bit.zip
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6440) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
12
Suspicious files
3
Text files
60
Unknown types
1

Dropped files

PID
Process
Filename
Type
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\CYRILLIC.TXTtext
MD5:FFA329FCA82694B8CB2981F98E44683B
SHA256:FB589EF667BC8A441630B830D48E1E38B1282228CF676A9934A2548E17DEA241
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\DisplayLanguageNames.es_CR.txttext
MD5:120D132322FC5E66F7821085C35F3F0A
SHA256:3CC4E057C3405B5D228B0384A33265DE4E856255B5C7DEDD9BE6FB26C73FFE66
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\crash1.txthtml
MD5:61DECD7D28256AD2516CA0037BE7626F
SHA256:4279460ED2ADADAA640EB3BBB2B49CA2972CF78E600B14CC5F36BC054AD0EDB0
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\build_relative_tmpdir.txttext
MD5:36FE098201036E184BEF324D5505DDBF
SHA256:7B7454419B0936DC3EDE94AD04FC26BA6D16D2339C3C2849D5862A47DE272D47
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\cpfecl.arm.dllexecutable
MD5:648D9ABFCA26E5CD30876C778FC67CF2
SHA256:E4E1DC9EB30195F879471DC7138D07F77E224E3BA8AE57129A28F50F573A99EC
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\DisplayLanguageNames.be.txttext
MD5:A5DDB28D6F58D13D63005AA329092328
SHA256:720DFDD82ECBB10CEA5446AAF26ED0CB54C5938815683E86A47309D359DA2FAC
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\FIND_XXX_REGISTRY_VIEW.txttext
MD5:42E7D85A15B108C49BDF493562A0B57D
SHA256:918D49B3C7AB219CA3C2740EF25115CA5B7F78985AAE70487A2F675C870138E9
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\os_qnx.txttext
MD5:46CEBD3B85231B19AB551552BDCE51A7
SHA256:93399033DC7758F0A78D97D806184796E71FA41E01DE4E8B366BF1446C95BEBF
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\cpvvbinary
MD5:B02042FD497B3AF613C82659D5749533
SHA256:10542B1F65899270C3266519456F5392D125D9A73D5279365D7E8C3EB50D3659
6440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6440.35024\EN-US_Apinst-x32_64bit\Config\COMPILE_PDB_NOTE.txttext
MD5:459E482DB4EF2C93841C5A4A027AFFC2
SHA256:5BA94580B96A7E9BF4417AA8A667AC5582577D73EF3E3E47C0B224B53D7497D9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
33
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.30:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6620
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6620
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6148
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
104.126.37.137:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.30:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.137
  • 104.126.37.152
  • 104.126.37.131
  • 104.126.37.130
  • 104.126.37.163
  • 104.126.37.153
  • 104.126.37.154
  • 104.126.37.169
  • 104.126.37.161
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.30
  • 184.24.77.17
  • 184.24.77.11
  • 184.24.77.34
  • 184.24.77.42
  • 184.24.77.33
  • 184.24.77.10
  • 184.24.77.16
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 142.250.184.206
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.74
  • 40.126.32.133
  • 40.126.32.76
  • 20.190.160.22
  • 40.126.32.136
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info