analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

processhacker-2.39-bin.zip

Full analysis: https://app.any.run/tasks/2d75dfa3-3aa2-4e03-a616-29bd027e7ec6
Verdict: Malicious activity
Analysis date: April 25, 2019, 09:35:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B444CF14642CE9B8D75E079166A5DF0B

SHA1:

8E8F8423D163D922242B8B7D85427664F77EDC97

SHA256:

2AFB5303E191DDE688C5626C3EE545E32E52F09DA3B35B20F5E0D29A418432F5

SSDEEP:

98304:jDqt5TrOmlLB/7rTOqcXfOzJR1qioDLK2EbhQ:3sTrHlB73OqX4ioDfshQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs app for hidden code execution

      • explorer.exe (PID: 2036)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3900)
      • ProcessHacker.exe (PID: 1000)
    • Application was dropped or rewritten from another process

      • ProcessHacker.exe (PID: 1000)
      • peview.exe (PID: 1928)
    • Changes settings of System certificates

      • ProcessHacker.exe (PID: 1000)
    • Runs injected code in another process

      • rundll32.exe (PID: 1476)
    • Application was injected by another process

      • explorer.exe (PID: 2036)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 2036)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 2036)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2976)
    • Creates files in the user directory

      • explorer.exe (PID: 2036)
    • Adds / modifies Windows certificates

      • ProcessHacker.exe (PID: 1000)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 2388)
    • Creates executable files which already exist in Windows

      • explorer.exe (PID: 2036)
      • ProcessHacker.exe (PID: 1000)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2856)
  • INFO

    • Reads settings of System Certificates

      • ProcessHacker.exe (PID: 1000)
      • chrome.exe (PID: 2856)
    • Application launched itself

      • chrome.exe (PID: 2856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2016:03:29 12:18:04
ZipCRC: 0x34beb5ab
ZipCompressedSize: 7294
ZipUncompressedSize: 25995
ZipFileName: CHANGELOG.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
33
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start inject winrar.exe searchprotocolhost.exe no specs processhacker.exe cmd.exe no specs rundll32.exe no specs explorer.exe rundll32.exe no specs peview.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs winrar.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2976"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\processhacker-2.39-bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3900"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
1000"C:\Users\admin\Desktop\processhacker-2.39-bin\x86\ProcessHacker.exe" C:\Users\admin\Desktop\processhacker-2.39-bin\x86\ProcessHacker.exe
explorer.exe
User:
admin
Company:
wj32
Integrity Level:
HIGH
Description:
Process Hacker
Version:
2.39.0.124
2388"C:\Windows\system32\cmd.exe" C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1476rundll32.exe C:\Windows\System32\winanr.dll, _injectC:\Windows\system32\rundll32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2036C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2208rundll32.exe C:\Windows\System32\winanr.dll, _injectC:\Windows\system32\rundll32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1928C:\Users\admin\Desktop\processhacker-2.39-bin\x86\peview.exe "C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000002.db"C:\Users\admin\Desktop\processhacker-2.39-bin\x86\peview.exeProcessHacker.exe
User:
admin
Company:
wj32
Integrity Level:
HIGH
Description:
PE Viewer
Exit code:
0
Version:
2.39.0.123
2856"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
73.0.3683.75
2780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=73.0.3683.75 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6e040f18,0x6e040f28,0x6e040f34C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
73.0.3683.75
Total events
11 965
Read events
10 939
Write events
0
Delete events
0

Modification events

No data
Executable files
30
Suspicious files
113
Text files
174
Unknown types
17

Dropped files

PID
Process
Filename
Type
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\CHANGELOG.txttext
MD5:B13DE4E8531AF294F87FFDDCCB08D7CE
SHA256:69E38F590A9A25F656E7507AF76229A3A6678A8C57B4E879FF8CE7E52FD704FF
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\LICENSE.txttext
MD5:EB59E0A5D01D0A5B02DA0C9E7786969F
SHA256:C38E811F6F83428921D0CECD998A44B717149B577B4C1A63B66064F03C34E4E7
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\plugins\HardwareDevices.dllexecutable
MD5:A46C8BB886E0B9290E5DBC6CA524D61F
SHA256:ACD49F2AA36D4EFB9C4949E2D3CC2BD7AEE384C2CED7AA9E66063DA4150FCB00
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\plugins\UserNotes.dllexecutable
MD5:E48C789C425F966F5E5EE3187934174F
SHA256:FC9D0D0482C63AB7F238BC157C3C0FED97951CCF2D2E45BE45C06C426C72CB52
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\plugins\DotNetTools.dllexecutable
MD5:B16CE8BA8E7F0EE83EC1D49F2D0AF0A7
SHA256:B4CC0280E2CAA0335361172CB7D673F745DEFC78299DED808426FFBC2458E4D9
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\plugins\ToolStatus.dllexecutable
MD5:3788EFFF135F8B17A179D02334D505E6
SHA256:5713D40DEC146DBC819230DAEFE1B886FA6D6F6DBD619301BB8899562195CBAB
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\plugins\OnlineChecks.dllexecutable
MD5:12C25FB356E51C3FD81D2D422A66BE89
SHA256:7336D66588BBCFEA63351A2EB7C8D83BBD49B5D959BA56A94B1FE2E905A5B5DE
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\plugins\NetworkTools.dllexecutable
MD5:D6BED1D6FDBED480E32FDD2DD4C13352
SHA256:476AA6AF14DD0B268786E32543B9A6917A298D4D90E1015DAC6FB2B522CF5D2E
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\kprocesshacker.sysexecutable
MD5:1B5C3C458E31BEDE55145D0644E88D75
SHA256:70211A3F90376BBC61F49C22A63075D1D4DDD53F0AEFA976216C46E6BA39A9F4
2976WinRAR.exeC:\Users\admin\Desktop\processhacker-2.39-bin\x64\ProcessHacker.exeexecutable
MD5:B365AF317AE730A67C936F21432B9C71
SHA256:BD2C2CF0631D881ED382817AFCCE2B093F4E412FFB170A719E2762F250ABFEA4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
53
DNS requests
44
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2856
chrome.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.6 Kb
whitelisted
2856
chrome.exe
GET
200
172.217.130.73:80
http://r4---sn-2gb7sn7r.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvMjJlQUFXRC12Ny1ldUFnMXF3SDlXZDlFZw/7319.128.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=185.76.9.72&mm=28&mn=sn-2gb7sn7r&ms=nvh&mt=1556184733&mv=u&pl=25&shardbypass=yes
US
crx
842 Kb
whitelisted
2856
chrome.exe
GET
302
172.217.22.78:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvMjJlQUFXRC12Ny1ldUFnMXF3SDlXZDlFZw/7319.128.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
502 b
whitelisted
2856
chrome.exe
GET
200
52.85.182.64:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
172.217.22.78:80
redirector.gvt1.com
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.18.3:443
www.gstatic.com
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.22.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2856
chrome.exe
216.58.208.35:443
www.google.com.ua
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.16.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.23.131:443
www.google.se
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.22.3:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.22.78:443
redirector.gvt1.com
Google Inc.
US
whitelisted
2856
chrome.exe
216.58.207.46:443
apis.google.com
Google Inc.
US
whitelisted
2856
chrome.exe
172.217.130.73:80
r4---sn-2gb7sn7r.gvt1.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
wj32.org
  • 162.243.25.33
whitelisted
clientservices.googleapis.com
  • 172.217.16.131
whitelisted
www.google.com.ua
  • 216.58.208.35
whitelisted
accounts.google.com
  • 172.217.23.173
shared
clients1.google.com
  • 172.217.22.14
whitelisted
ssl.gstatic.com
  • 172.217.22.3
whitelisted
www.gstatic.com
  • 172.217.18.3
whitelisted
apis.google.com
  • 216.58.207.46
whitelisted
clients2.google.com
  • 172.217.22.14
whitelisted
redirector.gvt1.com
  • 172.217.22.78
whitelisted

Threats

PID
Process
Class
Message
2856
chrome.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
2856
chrome.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
No debug info