File name:

附件.zip

Full analysis: https://app.any.run/tasks/ed8aa77f-8695-4159-8786-99e66c911eeb
Verdict: Malicious activity
Analysis date: May 15, 2025, 11:23:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
payload
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B12D2E01BD88630C9DA08F06DA7DC594

SHA1:

5B681E3C6F8E488164B0424908BDDB79CC22950C

SHA256:

40450B4212481492D2213D109A0CD0F42DE8E813DE42D53360DA7EFAC7249DF4

SSDEEP:

98304:pqK+N8nhCDTzC6aOnv2pzD4AliCciPYljRVKv4JctCaOjwtVeQA2o4uJJlAh73Q3:f0txsk9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 660)
    • Connects to unusual port

      • Uninstall.exe (PID: 7776)
      • 2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe (PID: 7672)
      • 报名链接.exe (PID: 7872)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 660)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 660)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 660)
    • Manual execution by a user

      • 2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe (PID: 7672)
      • 报名链接.exe (PID: 7872)
      • Uninstall.exe (PID: 7776)
    • Checks supported languages

      • 2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe (PID: 7672)
      • 报名链接.exe (PID: 7872)
      • Uninstall.exe (PID: 7776)
    • Reads the computer name

      • 2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe (PID: 7672)
      • Uninstall.exe (PID: 7776)
      • 报名链接.exe (PID: 7872)
    • Reads the software policy settings

      • slui.exe (PID: 3300)
      • slui.exe (PID: 7244)
    • Checks proxy server information

      • slui.exe (PID: 3300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:23 11:48:48
ZipCRC: 0x4758d39f
ZipCompressedSize: 10103
ZipUncompressedSize: 23552
ZipFileName: 2025????????ͨ???޹?˾?ڲ???ѵ?ƻ????????????뾡?챨??.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
10
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe 2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe conhost.exe no specs uninstall.exe conhost.exe no specs 报名链接.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\附件.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3300C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7212C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7244"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7672"C:\Users\admin\Desktop\2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe" C:\Users\admin\Desktop\2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\vcruntime140_1.dll
c:\users\admin\desktop\drstat.dll
7680\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7776"C:\Users\admin\Desktop\Uninstall.exe" C:\Users\admin\Desktop\Uninstall.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\uninstall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\desktop\drstat.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140_1.dll
7784\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7872"C:\Users\admin\Desktop\报名链接.exe" C:\Users\admin\Desktop\报名链接.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\报名链接.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\desktop\drstat.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140_1.dll
7880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe报名链接.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
3 250
Read events
3 242
Write events
8
Delete events
0

Modification events

(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\附件.zip
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
8
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\resources.pak
MD5:
SHA256:
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exeexecutable
MD5:3199796DC2AD51DA41DA51DE58D31012
SHA256:645F9F81EB83E52BBBD0726E5BF418F8235DD81BA01B6A945F8D6A31BF406992
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\ssleay32.dllexecutable
MD5:7456818A22DAD2C0965580D8BBF4CABD
SHA256:F3A288C5455B074FE9C9D5A160ADEB49E84BBE1832B5FCBE8F26093215192F65
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\minizip.dllexecutable
MD5:2823CD80172EF7D8C42FD2EB28B83A15
SHA256:788467A9C7D8F54AED0630C349EB84329EA2D228CFA110B35C6D86BEB87579BE
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\报名链接.exeexecutable
MD5:3199796DC2AD51DA41DA51DE58D31012
SHA256:645F9F81EB83E52BBBD0726E5BF418F8235DD81BA01B6A945F8D6A31BF406992
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\Microsoft.VC90.ATL.manifestxml
MD5:B41644A01C05740576B4E77662C7E86C
SHA256:A9A98FC7062262A47A1C0727339C760D18589B8549E4267762F7F4C88A103632
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\msvcp90.dllexecutable
MD5:6DE5C66E434A9C1729575763D891C6C2
SHA256:4F7ED27B532888CE72B96E52952073EAB2354160D1156924489054B7FA9B0B1A
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\msvcr90.dllexecutable
MD5:E7D91D008FE76423962B91C43C88E4EB
SHA256:ED0170D3DE86DA33E02BFA1605EEC8FF6010583481B1C530843867C1939D2185
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\drstat.dllexecutable
MD5:81F76F83D4C571FE95772F21AFF4D0B9
SHA256:AC6E0EE1328CFB1B6CA0541E4DFE7BA6398EA79A300C4019253BD908AB6A3DC0
660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa660.1832\stat.dattext
MD5:2B061ECB4671F3313014CD515084CCD0
SHA256:D0CC8E826FA78EEB750ED85B1C6989EF13BDB91FD61CAC72144F460F00CDD1D7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
35
DNS requests
18
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
2.16.164.113:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.113:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 216.58.212.14
whitelisted
crl.microsoft.com
  • 2.16.164.113
  • 2.16.164.98
  • 2.16.164.96
  • 2.16.164.17
  • 2.16.164.107
  • 2.16.164.112
  • 2.16.164.106
  • 2.16.164.9
  • 2.16.164.11
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.2
  • 40.126.31.131
  • 40.126.31.130
  • 40.126.31.67
  • 20.190.159.73
  • 40.126.31.71
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
7672
2025年中移铁通有限公司内部培训计划即将启动,请尽快报名.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
7776
Uninstall.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
7872
报名链接.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
No debug info