File name:

Ukash (pass - infected).zip

Full analysis: https://app.any.run/tasks/af63c39e-a240-41f1-b3d2-3caa518f5361
Verdict: Malicious activity
Analysis date: May 11, 2025, 19:18:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

19DB4D9522A124777D276199869F09CD

SHA1:

153D4586F0057089122415CDA2B3672C9CA69F0E

SHA256:

2A411393A8CB3174E5701F2D89A86A89C1F47224B0E38E408B37B772DA6E1FF8

SSDEEP:

12288:RkuUp8yPEYSOvqFTq78O7QpziqDs4hIhkC8mMA:RkuUp8X/OvSTq78O7HqDAhkC8mMA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the login/logoff helper path in the registry

      • Ukash.exe (PID: 3140)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Ukash.exe (PID: 3140)
    • Reads security settings of Internet Explorer

      • Ukash.exe (PID: 3140)
    • Reads Microsoft Outlook installation path

      • Ukash.exe (PID: 3140)
    • Reads Internet Explorer settings

      • Ukash.exe (PID: 3140)
    • Checks for external IP

      • Ukash.exe (PID: 3140)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 2000)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2000)
    • Checks supported languages

      • Ukash.exe (PID: 3140)
    • Manual execution by a user

      • Ukash.exe (PID: 3140)
    • Reads the computer name

      • Ukash.exe (PID: 3140)
    • Checks proxy server information

      • Ukash.exe (PID: 3140)
    • Reads the machine GUID from the registry

      • Ukash.exe (PID: 3140)
    • Creates files or folders in the user directory

      • Ukash.exe (PID: 3140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2011:09:05 11:12:26
ZipCRC: 0x032054b8
ZipCompressedSize: 386975
ZipUncompressedSize: 402944
ZipFileName: Ukash
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe ukash.exe

Process information

PID
CMD
Path
Indicators
Parent process
2000"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Ukash (pass - infected).zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3140"C:\Users\admin\Desktop\Ukash.exe" C:\Users\admin\Desktop\Ukash.exe
explorer.exe
User:
admin
Company:
Vwx Census Ember Jive
Integrity Level:
HIGH
Description:
Blotch Just Slyly Lawn Shaky
Version:
9.5
Modules
Images
c:\users\admin\desktop\ukash.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
Total events
2 187
Read events
2 136
Write events
45
Delete events
6

Modification events

(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2000) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Ukash (pass - infected).zip
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2000) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2000WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2000.44361\Ukashexecutable
MD5:26982AD443461BD964B72BD21733B8C5
SHA256:9698B5550C5723D1121CACFA2E74D3307149F771E297D625762F12F66DA23A8F
3140Ukash.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ib2[1].htmhtml
MD5:4F8E702CC244EC5D4DE32740C0ECBD97
SHA256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
3
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3140
Ukash.exe
GET
301
149.248.7.185:80
http://tools.ip2location.com/ib2/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3140
Ukash.exe
66.90.94.99:80
COGENT-174
NL
unknown
3140
Ukash.exe
149.248.7.185:80
tools.ip2location.com
AS-CHOOPA
US
suspicious

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
dns.msftncsi.com
  • 131.107.255.255
whitelisted
tools.ip2location.com
  • 149.248.7.185
unknown

Threats

PID
Process
Class
Message
3140
Ukash.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - ip2location.com
No debug info