File name:

CryptoKit.CUP.Setup.zip

Full analysis: https://app.any.run/tasks/354b68ad-6a0f-4f12-8e03-88276592822e
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 06, 2025, 04:07:53
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
stealer
arch-scr
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

C9AF9674461F994882472945820E6F34

SHA1:

97A88E3649BF9D25DE1BA1D8B332320660B8D99D

SHA256:

28C564B7526A45EE58C369C690BC591D41C07FB96B7AB68682D26FAA1B7A4EDA

SSDEEP:

98304:fi7FceFI8ceZSKlwR0IOhAnJMLw3daBaFGDyixZtvGZoe5tKPaTxCvVCybjJRxXJ:8ac

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5764)
    • Registers / Runs the DLL via REGSVR32.EXE

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Actions looks like stealing of personal data

      • CryptoKit.CUP.Setup.exe (PID: 3976)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • The process creates files with name similar to system file names

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2704)
      • regsvr32.exe (PID: 1040)
    • There is functionality for taking screenshot (YARA)

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Creates a software uninstall entry

      • CryptoKit.CUP.Setup.exe (PID: 3976)
  • INFO

    • Manual execution by a user

      • CryptoKit.CUP.Setup.exe (PID: 188)
      • CryptoKit.CUP.Setup.exe (PID: 3976)
      • wscript.exe (PID: 6212)
      • rundll32.exe (PID: 1192)
      • rundll32.exe (PID: 1216)
      • rundll32.exe (PID: 6104)
    • Checks supported languages

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Create files in a temporary directory

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Reads the computer name

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Reads security settings of Internet Explorer

      • regsvr32.exe (PID: 2704)
      • regsvr32.exe (PID: 1040)
    • Creates files in the program directory

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Checks proxy server information

      • slui.exe (PID: 6012)
    • JScript runtime error (SCRIPT)

      • wscript.exe (PID: 6212)
    • Reads the software policy settings

      • slui.exe (PID: 6012)
    • The sample compiled with chinese language support

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • The sample compiled with english language support

      • CryptoKit.CUP.Setup.exe (PID: 3976)
    • Creates files or folders in the user directory

      • CryptoKit.CUP.Setup.exe (PID: 3976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:08:04 14:12:30
ZipCRC: 0xc93c9481
ZipCompressedSize: 1807783
ZipUncompressedSize: 1839424
ZipFileName: CryptoKit.CUP.Setup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
11
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs slui.exe cryptokit.cup.setup.exe no specs cryptokit.cup.setup.exe regsvr32.exe no specs regsvr32.exe no specs wscript.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Users\admin\Desktop\CryptoKit.CUP.Setup.exe" C:\Users\admin\Desktop\CryptoKit.CUP.Setup.exeexplorer.exe
User:
admin
Company:
CFCA
Integrity Level:
MEDIUM
Description:
CFCA CryptoKit for Chrome
Exit code:
3221226540
Version:
3.4.0.5
Modules
Images
c:\users\admin\desktop\cryptokit.cup.setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1040"C:\WINDOWS\System32\regsvr32.exe" "C:\WINDOWS\System32\CryptoKit.CUP.x64.dll" /sC:\Windows\System32\regsvr32.exeCryptoKit.CUP.Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1192"C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\Desktop\icon-16.pngC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1216"C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\Desktop\icon-128.pngC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1800C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
2704"C:\WINDOWS\system32\regsvr32.exe" "C:\WINDOWS\system32\CryptoKit.CUP.x86.dll" /sC:\Windows\SysWOW64\regsvr32.exeCryptoKit.CUP.Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3976"C:\Users\admin\Desktop\CryptoKit.CUP.Setup.exe" C:\Users\admin\Desktop\CryptoKit.CUP.Setup.exe
explorer.exe
User:
admin
Company:
CFCA
Integrity Level:
HIGH
Description:
CFCA CryptoKit for Chrome
Version:
3.4.0.5
Modules
Images
c:\users\admin\desktop\cryptokit.cup.setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5764"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\CryptoKit.CUP.Setup.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6012C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6104"C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\Desktop\icon-48.pngC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
6 497
Read events
6 439
Write events
58
Delete events
0

Modification events

(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\CryptoKit.CUP.Setup.zip
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5764) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
8
Suspicious files
8
Text files
11
Unknown types
1

Dropped files

PID
Process
Filename
Type
3976CryptoKit.CUP.Setup.exeC:\Windows\SysWOW64\CryptoKit.CUP.x86.dllexecutable
MD5:D8BAF7ADE9E9B0BDDB90CDACE4057E01
SHA256:9934C527F8A42F50D4A5FFAEEF5CDBBF9673358E9D8E8FFCC24EDC8EB490106D
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Temp\nsoDFF7.tmp\Utility.dllexecutable
MD5:919E51F9624146563EF6EE90C21F14F3
SHA256:E5E100D598B38EC69D74310003648188500DCD82DD26FF3C5C29DD8D47148005
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Temp\Extensions\nonhfdckckngakchlbgpbjpimmmgjpkm\3.4.0.2_0\icon-16.pngimage
MD5:9A220F4366FB56D18D24933E43EF4F3A
SHA256:C905D2D994AE4A3CCFFC4292AF05C45EA4C8095576901F20B54A46D84A029448
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Temp\Extensions\nonhfdckckngakchlbgpbjpimmmgjpkm\3.4.0.2_0\_metadata\computed_hashes.jsonbinary
MD5:118C23B26AD31AD54F88ECE264B2C7FA
SHA256:DF47671CB44F3A0E2FA600E3810917DF87C42422FB917D31EDE469D415A9C4D4
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Temp\nsoDFF7.tmp\CrxInstaller.dllexecutable
MD5:B9086DFA9511196D59814B0FB377B09A
SHA256:A804304DBBEECB815A9B8B90F071FE50CCEC50502EB367F86BFC575DB1102E85
3976CryptoKit.CUP.Setup.exeC:\Program Files (x86)\CFCA\CryptoKit.CUP\com.cfca.CryptoKitHost.CUP-firefox.jsonbinary
MD5:7F15A455581659D9AD4EE0183B8A03C6
SHA256:CC268A64A90F665140D3A5870886514DBC107B2E28969460F5093569A18FB832
3976CryptoKit.CUP.Setup.exeC:\Program Files (x86)\CFCA\CryptoKit.CUP\nonhfdckckngakchlbgpbjpimmmgjpkm.zipcompressed
MD5:25892B57ACF83DCFD556FEC2D85DDE6F
SHA256:5941369BCBE8CE4F970DE3E26B45AF84463C4DCD1129D3E504D5E8444E33DAA1
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\nonhfdckckngakchlbgpbjpimmmgjpkm\3.4.0.2_0\icon-128.pngimage
MD5:1752662865A3C3E3E4671CBB521B4553
SHA256:BEA6391B6DDFC0CA53A11D6B762D67E055413A0CC7A2369B86C7B5906800DC7C
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Temp\nsoDFF7.tmp\System.dllexecutable
MD5:959EA64598B9A3E494C00E8FA793BE7E
SHA256:03CD57AB00236C753E7DDEEE8EE1C10839ACE7C426769982365531042E1F6F8B
3976CryptoKit.CUP.Setup.exeC:\Users\admin\AppData\Local\Temp\Extensions\nonhfdckckngakchlbgpbjpimmmgjpkm\3.4.0.2_0\icon-128.pngimage
MD5:1752662865A3C3E3E4671CBB521B4553
SHA256:BEA6391B6DDFC0CA53A11D6B762D67E055413A0CC7A2369B86C7B5906800DC7C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
22
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.44.141.177:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2940
svchost.exe
GET
200
23.44.141.25:80
http://x1.c.lencr.org/
unknown
whitelisted
4400
SIHClient.exe
GET
200
72.246.169.155:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5708
svchost.exe
GET
200
2.16.70.4:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4400
SIHClient.exe
GET
200
72.246.169.155:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4544
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.44.141.177:80
www.microsoft.com
AKAMAI-AS
IT
whitelisted
5708
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5708
svchost.exe
2.16.70.4:80
ocsp.digicert.com
TELECOM ITALIA SPARKLE S.p.A.
IT
whitelisted
4400
SIHClient.exe
20.165.94.63:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 23.44.141.177
  • 72.246.169.155
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.22
  • 20.190.160.65
  • 20.190.160.20
  • 40.126.32.134
  • 40.126.32.74
  • 20.190.160.64
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.16.70.4
whitelisted
slscr.update.microsoft.com
  • 20.165.94.63
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
self.events.data.microsoft.com
  • 51.105.71.137
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info