analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

GOLDINX.zip

Full analysis: https://app.any.run/tasks/e52acc3c-e252-42f9-a5e6-ac78f84e25b6
Verdict: Malicious activity
Analysis date: June 18, 2019, 17:11:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F2ABD9BD248170531A49C3AC1088A75D

SHA1:

ED4C45FE90B0C23C93213399F3C088AD31A2CDB5

SHA256:

3A93A760C971D742C1A3CE7E890B1885930F197ECCCF5B06C394B4625AADA683

SSDEEP:

49152:uH4SF4ZLAKQaK03goqQEqxOAjOUlqTl7PG+Bx3thB9bfrMXr68IqWIsZ9n:44SF4ZLAKr31qQJxZWl7PGMj9bf+6iip

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3572)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1076)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: BouncyCastle.Crypto.dll
ZipUncompressedSize: 2531328
ZipCompressedSize: 868593
ZipCRC: 0x158e8a71
ZipModifyDate: 2019:01:31 18:53:28
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1076"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\GOLDINX.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3572"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Total events
433
Read events
422
Write events
11
Delete events
0

Modification events

(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1076) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\GOLDINX.zip
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
Executable files
7
Suspicious files
1
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
1076WinRAR.exeC:\Users\admin\Desktop\Goldinx.exe.configxml
MD5:27FD75ABE99D7A22920078FA911F160D
SHA256:27AB128669881796F786C59B35E2DEAE8B3880B16F7BD9A4547CDA7E2EB3E42F
1076WinRAR.exeC:\Users\admin\Desktop\Memory.dllexecutable
MD5:E39E04ADC75037D5A62F5C90630C4056
SHA256:677415B9EB0A8DDF0BFE53348AD920DBA464AF79EEF5A186323A6DA187843057
1076WinRAR.exeC:\Users\admin\Desktop\Memory.xmlxml
MD5:CA23BCC6DEEA1AFEFF99935FCD8B03A1
SHA256:CCE01EBFFE5B74C686352D966C0D5CAB2FAFBAC9C4AF00E0DDCF342900D6F0EF
1076WinRAR.exeC:\Users\admin\Desktop\Google.Protobuf.xmlxml
MD5:BC04300855FC6566222E5FD3EE7D509B
SHA256:F44FABF35B49271AA398E2A9196E3DF11C8FD660DE6D31A2D0B2D51FC242E7A2
1076WinRAR.exeC:\Users\admin\Desktop\MySql.Data.xmlxml
MD5:6632BAE782A9487EE21A3E9BF75EFFA4
SHA256:FB409977CBD0B468F53769BCB5BE6451AAC09F412F17D7EBB8B1351BD1D4C50A
1076WinRAR.exeC:\Users\admin\Desktop\Google.Protobuf.dllexecutable
MD5:C2193E1EDD80F7C5A8E0A37EACA69072
SHA256:900E440C502D6C697FFAEAC24F237D19A7A50D41B3D677A9C314F1BE3E5C245D
1076WinRAR.exeC:\Users\admin\Desktop\Google.Protobuf.pdbbinary
MD5:A75B3B2C3058152DDF9B33F8A24B8485
SHA256:ED1DC3AB5682BD0A5E02BC4CC06E0F1C034A41168C28428E91D96100C6266A1E
1076WinRAR.exeC:\Users\admin\Desktop\Goldinx.exeexecutable
MD5:FA4459DCA9DDC64DF96ED3F45BB43E93
SHA256:3C20A1F8C91D175248807F1E826DCA54ED43AFD5EB4138A9E9585A3B73B58120
1076WinRAR.exeC:\Users\admin\Desktop\MySql.Data.dllexecutable
MD5:14954D9D7AEDD67A6D6460112B8A0263
SHA256:7A720ABC67D59A601E6EAAE610E1FA00E9AD1DC82A0A30956BC5B3829DE871EC
1076WinRAR.exeC:\Users\admin\Desktop\Bunifu_UI_v1.52.dllexecutable
MD5:3764580D568E4FC506048E04DB90562C
SHA256:27C8CEA7E793ACE737415881A5C16B4E2D98CE46609D272E82C6C905AD2D9F36
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info