File name:

Varenis_1.0.3-1.zip

Full analysis: https://app.any.run/tasks/988b9306-67dc-493b-a98c-c9bd478bef54
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 17, 2025, 15:42:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
stealer
crypto-regex
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

03B256E827F50BB34BE598A3D3ACD794

SHA1:

9B2B13BFA6E8A095A09606AC097E420F6037D9AB

SHA256:

40460A215B56E2B01F865DFD57ED1123A05BF0B3F59EF7BED8746FF904F4DDF1

SSDEEP:

786432:YvgSVPTklWr3d+CrZ5j7FHkjc8J88Zz9veX5i+1:Yvgo4lWL4Cr3FHkY8J88t9vk5j1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Steals credentials from Web Browsers

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
  • SUSPICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7700)
    • Reads the date of Windows installation

      • Varenis.exe (PID: 8160)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 7700)
    • The process checks if it is being run in the virtual environment

      • Varenis.exe (PID: 8160)
      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Reads security settings of Internet Explorer

      • Varenis.exe (PID: 8160)
    • Application launched itself

      • Varenis.exe (PID: 8160)
    • Found regular expressions for crypto-addresses (YARA)

      • Varenis.exe (PID: 8160)
    • Executes application which crashes

      • Varenis.exe (PID: 4436)
      • Varenis.exe (PID: 5544)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7700)
    • Reads the computer name

      • Varenis.exe (PID: 8160)
      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Checks supported languages

      • Varenis.exe (PID: 8160)
      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Process checks computer location settings

      • Varenis.exe (PID: 8160)
    • Manual execution by a user

      • Varenis.exe (PID: 8160)
      • Varenis.exe (PID: 4436)
    • Checks proxy server information

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4620)
      • WerFault.exe (PID: 720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:05:17 10:24:58
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Varenis_1.0.3/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs varenis.exe no specs conhost.exe no specs varenis.exe conhost.exe no specs varenis.exe conhost.exe no specs werfault.exe no specs slui.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720C:\WINDOWS\system32\WerFault.exe -u -p 4436 -s 592C:\Windows\System32\WerFault.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
3100\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4436"C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221226505
Modules
Images
c:\users\admin\desktop\varenis_1.0.3-1\varenis_1.0.3\varenis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
4620C:\WINDOWS\system32\WerFault.exe -u -p 5544 -s 612C:\Windows\System32\WerFault.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
5544"C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe
Varenis.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221226505
Modules
Images
c:\users\admin\desktop\varenis_1.0.3-1\varenis_1.0.3\varenis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
5868C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6972\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7700"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7940C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
8160"C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\varenis_1.0.3-1\varenis_1.0.3\varenis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
Total events
5 981
Read events
5 934
Write events
28
Delete events
19

Modification events

(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Varenis_1.0.3-1.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
117
Suspicious files
45
Text files
28
Unknown types
0

Dropped files

PID
Process
Filename
Type
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\EmbedRuntime\MonoPosixHelper.dllexecutable
MD5:4F482CE44693475FAD7B84AFBCC23453
SHA256:2B775A48E200ED2C7369FCD8BF2BA39F42A77FB702ED2D9FF0F3ACEE08FA4109
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\logs\log_02-25-2025.txttext
MD5:38C88333EB9555D8C96D1D3296F87C24
SHA256:B7D26DFF06BDEE05735D28FA33A981FA6794F5174AADA2B1E768E33B56F1D178
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\config.initext
MD5:C915D4CAE28E27764FBF0D636A284634
SHA256:AD2880D927D1153A6605C16DBA07688FDAD797185A7399FBDFE7BEC1C3D77A43
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\DefaultWsdlHelpGenerator.aspxhtml
MD5:F7BE9F1841FF92F9D4040AED832E0C79
SHA256:751861040B69EA63A3827507B7C8DA9C7F549DC181C1C8AF4B7CA78CC97D710A
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\settings.mapxml
MD5:22C818A23169E12BD3C8587B6394C731
SHA256:49C6160F9D54AF4270A3B4E997FC4A8301F79B9E2070118FA46DDBCBBC44F9A2
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\Browsers\Compat.browsertext
MD5:0D831C1264B5B32A39FA347DE368FE48
SHA256:8A1082057AC5681DCD4E9C227ED7FB8EB42AC1618963B5DE3B65739DD77E2741
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\machine.configxml
MD5:5B791B8493C4E9A55D8C5EE522CE1CEF
SHA256:E91782A27FA39FC6C1D6EE8B08529F5D35052310D0006034B878EB04B8F2AF30
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\web.configxml
MD5:DC6DD6D8D1FC74E76C84B0B38DC6B1E3
SHA256:CF2B54339E069B9E42F7D6795EECBF562C50C1011F4CA8F65F578FE52D97FF92
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe
MD5:
SHA256:
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\4.0\web.configxml
MD5:D081581E16B06480A5AAEF8CDFB305AB
SHA256:E38BB8CC68FE5B4EDECDFD288D094B9E8CED7629039B2A347682ABA0D8BD7492
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8056
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8056
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5608
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8056
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.35
  • 23.216.77.38
  • 23.216.77.22
  • 23.216.77.13
  • 23.216.77.6
  • 23.216.77.15
  • 23.216.77.31
  • 23.216.77.19
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info