File name:

EaseUS Data Recovery Wizard Activation.rar

Full analysis: https://app.any.run/tasks/406303d4-f43d-4e39-b831-6ab359a599f8
Verdict: Malicious activity
Analysis date: February 20, 2025, 09:36:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

0745E19FD9CC36E7ECCE2296021D1140

SHA1:

07EAEC0EF4C479C65FAA70E5B8970F1E01A68539

SHA256:

372AB09922971DCD5233844942DADD315CA2AA9BCA896C2412BE4D15CE49F318

SSDEEP:

98304:vTULODT+mhMoXs0VCDYHpYGMFxJuzFjAlpR3GR8LmLEqF3kIAOsRPM2yBPtD+d3m:l918MyhI6ofcbFX6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • ONENOTE.EXE (PID: 1852)
      • ONENOTE.EXE (PID: 6224)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6392)
      • WinRAR.exe (PID: 6928)
      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
    • Application launched itself

      • WinRAR.exe (PID: 6392)
    • Executable content was dropped or overwritten

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 1852)
    • Process drops legitimate windows executable

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 1852)
    • Generic archive extractor

      • WinRAR.exe (PID: 6392)
    • The process drops C-runtime libraries

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 1852)
    • Reads the date of Windows installation

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
    • Starts a Microsoft application from unusual location

      • ONENOTE.EXE (PID: 1852)
    • Starts itself from another location

      • ONENOTE.EXE (PID: 1852)
    • Starts CMD.EXE for commands execution

      • ONENOTE.EXE (PID: 6224)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6928)
    • Reads the computer name

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 1852)
      • ONENOTE.EXE (PID: 6224)
    • The sample compiled with english language support

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 1852)
    • Create files in a temporary directory

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 6224)
    • Checks supported languages

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
      • ONENOTE.EXE (PID: 1852)
      • ONENOTE.EXE (PID: 6224)
    • Process checks computer location settings

      • EaseUS Data Recovery Wizard Activation.exe (PID: 7136)
    • Creates files or folders in the user directory

      • ONENOTE.EXE (PID: 1852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 7705742
UncompressedSize: 7705742
OperatingSystem: Win32
ArchivedFileName: Activation/Activation.rar
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
8
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe easeus data recovery wizard activation.exe onenote.exe onenote.exe no specs cmd.exe no specs conhost.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1140C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeONENOTE.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1852"C:\Users\admin\AppData\Local\Temp\RarSFX0\ONENOTE.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\ONENOTE.EXE
EaseUS Data Recovery Wizard Activation.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneNote
Exit code:
0
Version:
14.0.4763.1000
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\onenote.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3552C:\WINDOWS\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\wjrk
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcp_win.dll
5732\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6224C:\Users\admin\AppData\Roaming\Rjn_auth\ONENOTE.EXEC:\Users\admin\AppData\Roaming\Rjn_auth\ONENOTE.EXEONENOTE.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneNote
Exit code:
1
Version:
14.0.4763.1000
Modules
Images
c:\users\admin\appdata\roaming\rjn_auth\onenote.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6392"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\EaseUS Data Recovery Wizard Activation.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6928"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa6392.5065\Activation.rarC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7136"C:\Users\admin\AppData\Local\Temp\Rar$EXb6928.5696\EaseUS Data Recovery Wizard Activation.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb6928.5696\EaseUS Data Recovery Wizard Activation.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb6928.5696\easeus data recovery wizard activation.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_91a79472cc852ba0\gdiplus.dll
Total events
4 973
Read events
4 956
Write events
17
Delete events
0

Modification events

(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\EaseUS Data Recovery Wizard Activation.rar
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6928) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6928) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
Executable files
9
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6392WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa6392.5065\Activation.rar
MD5:
SHA256:
1140cmd.exeC:\Users\admin\AppData\Local\Temp\wjrk
MD5:
SHA256:
6928WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6928.5696\EaseUS Data Recovery Wizard Activation.exeexecutable
MD5:972BFED4B7DB5C0700FFF79940783D78
SHA256:90FAD0DB97B725DDA5B0041923B5B44F3217251579648ED96BE7DB4E6664F500
7136EaseUS Data Recovery Wizard Activation.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\ONENOTE.EXEexecutable
MD5:474CA98328D98AC1F8B4A0AA88B5DCF8
SHA256:97597A20A5F03BC1DC0D4A4B75D0026DFAD79291E33EA72103ABF85D0E2C6F19
7136EaseUS Data Recovery Wizard Activation.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\antimacassar.docxbinary
MD5:F321318EA108CA7AB97D12E740F413DF
SHA256:0A55DAFA6CD3C99704BB79836FB1A6AA5070A5A6A4F8D90237180D14AFA36553
7136EaseUS Data Recovery Wizard Activation.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\msvcp90.dllexecutable
MD5:6D4E6FDB62660D81A6D7CD0144FA8FA4
SHA256:44BD1A3F75E63AC9BB3C8A5B9C0D38FA75E730295E1F9C5414C2C8A5975375B3
1852ONENOTE.EXEC:\Users\admin\AppData\Roaming\Rjn_auth\antimacassar.docxbinary
MD5:F321318EA108CA7AB97D12E740F413DF
SHA256:0A55DAFA6CD3C99704BB79836FB1A6AA5070A5A6A4F8D90237180D14AFA36553
1852ONENOTE.EXEC:\Users\admin\AppData\Roaming\Rjn_auth\msvcr90.dllexecutable
MD5:ECBBED2F44AFB22BA1F9EF8603C261B5
SHA256:75613E14C26C84A21763CD315BDB3129C997F1C28DFBC3932379970901A22820
1852ONENOTE.EXEC:\Users\admin\AppData\Roaming\Rjn_auth\ONENOTE.EXEexecutable
MD5:474CA98328D98AC1F8B4A0AA88B5DCF8
SHA256:97597A20A5F03BC1DC0D4A4B75D0026DFAD79291E33EA72103ABF85D0E2C6F19
1852ONENOTE.EXEC:\Users\admin\AppData\Roaming\Rjn_auth\msvcp90.dllexecutable
MD5:6D4E6FDB62660D81A6D7CD0144FA8FA4
SHA256:44BD1A3F75E63AC9BB3C8A5B9C0D38FA75E730295E1F9C5414C2C8A5975375B3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
33
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.134:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.134:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4444
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6976
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6976
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.134:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.134:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.12:443
www.bing.com
Akamai International B.V.
DE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1176
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.134
  • 23.48.23.193
  • 23.48.23.145
  • 23.48.23.192
  • 23.48.23.138
  • 23.48.23.150
  • 23.48.23.190
  • 23.48.23.146
  • 23.48.23.194
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.78
whitelisted
www.bing.com
  • 92.123.104.12
  • 92.123.104.14
  • 92.123.104.19
  • 92.123.104.18
  • 92.123.104.10
  • 92.123.104.9
  • 92.123.104.7
  • 92.123.104.13
  • 92.123.104.5
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.3
  • 40.126.32.72
  • 40.126.32.68
  • 20.190.160.128
  • 20.190.160.14
  • 20.190.160.65
  • 20.190.160.2
whitelisted
go.microsoft.com
  • 2.19.246.123
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info