File name:

123.rar

Full analysis: https://app.any.run/tasks/2d03e1cb-c4ba-4aa5-a574-2dac1be5f20b
Verdict: Malicious activity
Analysis date: December 08, 2025, 09:05:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

44E41FC36BA65877634C4A162E685CB8

SHA1:

69A2065D3C125F10BE7924479C6D31A84CC57A10

SHA256:

2BA8DE5F38B239404341DA0A615B50B6C57830A3F7E89FED309C920878FD6508

SSDEEP:

12288:ziCw0Jz2Vfl6daa7k7Vux6dZX4yahGM9c1xoZyqfLQ4Ue:ziCw2zGl6daa7k7Vux6vXpahGM9c1xoB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 123.com (PID: 7764)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 8084)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • WinRAR.exe (PID: 7516)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 8000)
    • Executable content was dropped or overwritten

      • 123.com (PID: 7764)
      • driver.exe (PID: 2856)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7516)
      • 123.com (PID: 7764)
      • WinRAR.exe (PID: 6544)
    • Executing commands from a ".bat" file

      • powershell.exe (PID: 8084)
      • 123.com (PID: 7764)
    • Uses ATTRIB.EXE to modify file attributes

      • 123.com (PID: 7764)
    • Starts CMD.EXE for commands execution

      • 123.com (PID: 7764)
      • powershell.exe (PID: 8084)
    • Starts process via Powershell

      • powershell.exe (PID: 8084)
    • Drops 7-zip archiver for unpacking

      • driver.exe (PID: 2856)
      • WinRAR.exe (PID: 6544)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 7312)
      • cmd.exe (PID: 5900)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7516)
      • WinRAR.exe (PID: 6544)
    • Reads the computer name

      • 123.com (PID: 7764)
      • curl.exe (PID: 7668)
      • TextInputHost.exe (PID: 7072)
      • curl.exe (PID: 7816)
    • Launching a file from a Registry key

      • 123.com (PID: 7764)
    • Checks supported languages

      • 123.com (PID: 7764)
      • curl.exe (PID: 7668)
      • TextInputHost.exe (PID: 7072)
      • curl.exe (PID: 7816)
      • driver.exe (PID: 2856)
      • driver.exe (PID: 4968)
      • blat.exe (PID: 5876)
    • Process checks computer location settings

      • 123.com (PID: 7764)
    • Create files in a temporary directory

      • 123.com (PID: 7764)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 7516)
      • driver.exe (PID: 2856)
      • WinRAR.exe (PID: 6544)
    • Execution of CURL command

      • cmd.exe (PID: 7312)
      • cmd.exe (PID: 5900)
    • Creates a software uninstall entry

      • 123.com (PID: 7764)
    • Reads Microsoft Office registry keys

      • 123.com (PID: 7764)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 8152)
    • Manual execution by a user

      • notepad.exe (PID: 8152)
      • WinRAR.exe (PID: 6544)
      • cmd.exe (PID: 5900)
    • The sample compiled with russian language support

      • WinRAR.exe (PID: 6544)
      • driver.exe (PID: 2856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 304899
UncompressedSize: 484491
OperatingSystem: Win32
ArchivedFileName: 123/123.com
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
173
Monitored processes
28
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe 123.com no specs 123.com attrib.exe no specs conhost.exe no specs winword.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs ai.exe no specs cmd.exe no specs conhost.exe no specs curl.exe ping.exe no specs notepad.exe no specs textinputhost.exe no specs cmd.exe no specs conhost.exe no specs curl.exe driver.exe ping.exe no specs ping.exe no specs winrar.exe blat.exe no specs conhost.exe no specs driver.exe no specs ping.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
224\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
412\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeblat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2856C:\driver\data\driver.exe x -r -ep2 -p"limpid29033" C:\driver\data\jgbfsofrtysdfd.rar C:\driver\data /yC:\driver\data\driver.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\driver\data\driver.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3168ping -n 63 127.0.0.1C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ws2_32.dll
4540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4828"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "1B202147-7800-4964-B97E-2A85461E80D5" "B87F709F-2B88-4B7E-B703-3877A60C9F22" "7984"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\sechost.dll
4968C:\driver\data\driver.exe x -r -ep2 -p"limpid29033" C:\driver\data\jgbfsofrtysdfd.rar C:\driver\data /yC:\driver\data\driver.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\driver\data\driver.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
5876"C:\Users\admin\AppData\Local\Temp\Rar$EXb6544.42674\blat.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb6544.42674\blat.exeWinRAR.exe
User:
admin
Company:
http://www.blat.net/
Integrity Level:
MEDIUM
Description:
A Win32 command line eMail tool
Exit code:
1
Version:
3.2.24
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb6544.42674\blat.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5900C:\WINDOWS\system32\cmd.exe /c ""C:\driver\data\nice_to_meet.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6240ping -n 17 127.0.0.1C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\nsi.dll
Total events
25 791
Read events
25 093
Write events
677
Delete events
21

Modification events

(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\123.rar
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7516) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7764) 123.comKey:HKEY_CURRENT_USER\SOFTWARE\4t Niagara Software\4t Tray Minimizer
Operation:writeName:FirstRun
Value:
0
(PID) Process:(7764) 123.comKey:HKEY_CURRENT_USER\SOFTWARE\4t Niagara Software\4t Tray Minimizer
Operation:writeName:JustInstalled
Value:
0
Executable files
58
Suspicious files
170
Text files
33
Unknown types
0

Dropped files

PID
Process
Filename
Type
7764123.comC:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmpcompressed
MD5:43731B5E126B88766A64EA525A145184
SHA256:F3EE94448B434499615D02E128A6BA2698ABFD64AD36728AB95F2AFEB783359B
7516WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa7516.38579\123.comexecutable
MD5:B2768DBC89063869D139C1EBE759D860
SHA256:F1B03EDD175A78022FB9E41887EA0679CE77190D8EEBD0A5ABED1477193023EA
8084powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5elrbnn0.q1j.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8084powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bbsv4wj4.pvl.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7764123.comC:\Users\admin\AppData\Local\Temp\$inst\2.tmpcompressed
MD5:8708699D2C73BED30A0A08D80F96D6D7
SHA256:A32E0A83001D2C5D41649063217923DAC167809CAB50EC5784078E41C9EC0F0F
7984WINWORD.EXEC:\driver\data\~$_ÊÏ_ÂÍÈÈÀ_3.docxbinary
MD5:C597DC9EC7028C5AE01E601BC4A80E60
SHA256:EEAD81CE6DD3535CF84EF8CE99BD7A2F18B3B0BAA8A980369D1B1CC690D47D94
7984WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187binary
MD5:6EA4E843F89D0BD5A25C9D7C68B77757
SHA256:DF08D213700B4BDCB6A19FBDFAB2AED7B5E137A1D6554418D0F18C91C23F6A5B
7984WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:D9C4C605C4BDF5632C9DA72FFBD6DDFB
SHA256:AE14669112EDAC2CF292370D2B35215FD6E6F174A1217739E80077BE7FB70E14
7984WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187binary
MD5:F6A1458907993455B5BAF2CFA235A128
SHA256:5A383EBC79A7991802DCCBA29158C7AFA3CD3F0BFD713B83632D9DD659ED4F0A
7764123.comC:\driver\data\ÀÎ_ÊÏ_ÂÍÈÈÀ_3.docxbinary
MD5:3A82F59F8BB6B94B75D840BBA62094A3
SHA256:EE9D5B06256C35C68383C84552021C361A2BD3295E9D30A3B3E273FF91183518
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
83
DNS requests
24
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7984
WINWORD.EXE
GET
200
162.159.142.9:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
7784
SIHClient.exe
GET
200
184.24.152.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7984
WINWORD.EXE
GET
200
2.17.251.99:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
7984
WINWORD.EXE
GET
200
2.17.251.99:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6976
svchost.exe
GET
200
162.159.142.9:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7984
WINWORD.EXE
GET
200
2.17.251.99:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
7784
SIHClient.exe
GET
200
184.24.152.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
unknown
whitelisted
7984
WINWORD.EXE
GET
200
184.24.152.100:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
7784
SIHClient.exe
GET
200
184.24.152.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
unknown
whitelisted
7784
SIHClient.exe
GET
200
184.24.152.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
872
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2016
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
92.123.104.38:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
6976
svchost.exe
20.190.147.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6976
svchost.exe
162.159.142.9:80
ocsp.digicert.com
CLOUDFLARENET
US
whitelisted
872
svchost.exe
2.17.251.99:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
872
svchost.exe
184.24.152.100:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
www.bing.com
  • 92.123.104.38
  • 92.123.104.46
  • 92.123.104.36
  • 92.123.104.47
  • 92.123.104.37
  • 92.123.104.44
  • 92.123.104.43
  • 92.123.104.41
  • 92.123.104.45
whitelisted
google.com
  • 216.58.207.238
whitelisted
login.live.com
  • 20.190.147.0
whitelisted
ocsp.digicert.com
  • 162.159.142.9
whitelisted
crl.microsoft.com
  • 2.17.251.99
whitelisted
www.microsoft.com
  • 184.24.152.100
whitelisted
officeclient.microsoft.com
  • 52.109.89.18
whitelisted
roaming.svc.cloud.microsoft
  • 52.109.89.19
whitelisted
omex.cdn.office.net
  • 2.16.56.86
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.