File name:

KRXUltimate_2.7z

Full analysis: https://app.any.run/tasks/bc6a27b2-d6dc-4abc-89bd-814ad68b4bb4
Verdict: Malicious activity
Analysis date: January 04, 2025, 18:49:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-doc
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

A564F4F040CA2F4C882B7C257A9C9F82

SHA1:

94E3DF16530D8897A1F24DE2B5F2B1C16EDE85FE

SHA256:

3F9295785791D57B9BAD730D40B97598A4AAA3A89379F65BEF514D13F83F38FE

SSDEEP:

393216:4fywLp1WFrnjwmfMQQFYSPhww3hdLDo9zjpvgN5DYaOrf/kLy1Oyku3aLU/bp:49pow9YS8NlobI/kL8OHghl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5320)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5320)
      • WinRAR.exe (PID: 5684)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 5320)
      • WinRAR.exe (PID: 5684)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 5320)
      • WinRAR.exe (PID: 5684)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 5684)
  • INFO

    • Reads the computer name

      • MpCmdRun.exe (PID: 3732)
      • MpCmdRun.exe (PID: 4648)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 3732)
    • Manual execution by a user

      • WinRAR.exe (PID: 5684)
      • cmd.exe (PID: 6084)
      • notepad.exe (PID: 4188)
      • OpenWith.exe (PID: 2072)
      • notepad.exe (PID: 3296)
      • OpenWith.exe (PID: 3836)
      • OpenWith.exe (PID: 768)
      • rundll32.exe (PID: 1536)
      • OpenWith.exe (PID: 2280)
      • OpenWith.exe (PID: 2728)
      • OpenWith.exe (PID: 5392)
    • Checks supported languages

      • MpCmdRun.exe (PID: 3732)
      • MpCmdRun.exe (PID: 4648)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 5320)
      • WinRAR.exe (PID: 5684)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 3296)
      • notepad.exe (PID: 4188)
      • rundll32.exe (PID: 1536)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 5684)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5684)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 2072)
      • OpenWith.exe (PID: 3836)
      • OpenWith.exe (PID: 5392)
      • OpenWith.exe (PID: 768)
      • OpenWith.exe (PID: 2280)
      • OpenWith.exe (PID: 2728)
      • rundll32.exe (PID: 1536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2025:01:04 18:25:25+00:00
ArchivedFileName: KRX Ultimate.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
19
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs winrar.exe cmd.exe no specs conhost.exe no specs notepad.exe no specs notepad.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs rundll32.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
768"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\cammo.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1536"C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\Desktop\checker.pngC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1760C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR5320.41962\Rar$Scan10119.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
2072"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\warmouse.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2280"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\bluestripe.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2356\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2728"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\greensward.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2744\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3296"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\license.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
15 006
Read events
14 961
Write events
45
Delete events
0

Modification events

(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\KRXUltimate_2.7z
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5320) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
(PID) Process:(5684) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
Executable files
38
Suspicious files
240
Text files
653
Unknown types
8

Dropped files

PID
Process
Filename
Type
5320WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5320.41962\KRXUltimate_2.7z\KRX Ultimate.zip
MD5:
SHA256:
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\config_directory.battext
MD5:6191EC1743F8B924E43EBC2AB61ED4FC
SHA256:1FBAD52532E2685345CC3E5366E88D965F107E6C6013002E0BD6AD5DA0377AD7
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\config_store.exeexecutable
MD5:44B8F89981FE8CEE058B46E645BB07F9
SHA256:3E3E64438CCC8F4DBD185AE727946F8AAFEEF7261414C8F529599CD17E83F4E1
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\config_retrieve.exeexecutable
MD5:F7555D80FF6E60A59365F01414501479
SHA256:278AA12AFD5178F7FE61B41C0F639BB38449D7D76E20E87948A56C8BFB16273B
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\data\arrow.pngimage
MD5:EBEA3FB1B1DCAF9F8ADFE6B84C3A8716
SHA256:D279B393153A42CB3DF1E73CF610FF5E17B42CEB8088294C0075A50E604BE54B
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\data\assets\game\game_06.pngimage
MD5:7F3CA4925A885D58362197AB6F171CCB
SHA256:F5928FE3DF6424D970E633DBBE69F30CDE32CCFBA7E2B85F4675D576E3062DCA
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\avcodec-61.dllexecutable
MD5:AE6632DB7DE61EF9A0E1045B829502DC
SHA256:58C71BAA592DA746C9C5E30FDD41814A2736454B2B7168DA4AB88585758D4786
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\data\audio\foley_body_splat-01.wvbinary
MD5:1010487AF1A0EF34F6E1E89AEE349B38
SHA256:0EC24C5F822B4727FAADDC4B3DAF73DF5E8ED1EF1733CAC8CEC722AA0CDE2D8A
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\data\audio\foley_body_impact-01.wvbinary
MD5:BAF8FA37256FDAA79E88F42422425204
SHA256:32A14D72C8A8A4088F86D9DF3716D5C8796EFF6127AF78BEAF284ECFE5F62C90
5684WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR5684.43096\KRX Ultimate.zip\KRX-Client-18.8-win64-public-v1.30\data\audio\foley_body_impact-03.wvbinary
MD5:6768BDC47F27FA9699787A89B3CF7A86
SHA256:29EF2809ACCCC73B932A495466BF8D19A106215E5452B22E3F67B9D9549F5D32
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5564
svchost.exe
GET
200
2.16.164.129:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.129:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.164.129:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5564
svchost.exe
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
5564
svchost.exe
2.16.164.129:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.129:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.16.164.129:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5564
svchost.exe
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 2.16.164.129
  • 2.16.164.9
  • 2.16.164.96
  • 2.16.164.99
  • 2.16.164.98
  • 2.16.164.114
  • 2.16.164.122
  • 2.16.164.89
  • 2.16.164.58
whitelisted
www.microsoft.com
  • 184.30.230.103
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
self.events.data.microsoft.com
  • 52.182.143.209
whitelisted

Threats

No threats detected
No debug info