File name:

Varenis_1.0.3-1.zip

Full analysis: https://app.any.run/tasks/988b9306-67dc-493b-a98c-c9bd478bef54
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 17, 2025, 15:42:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
stealer
crypto-regex
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

03B256E827F50BB34BE598A3D3ACD794

SHA1:

9B2B13BFA6E8A095A09606AC097E420F6037D9AB

SHA256:

40460A215B56E2B01F865DFD57ED1123A05BF0B3F59EF7BED8746FF904F4DDF1

SSDEEP:

786432:YvgSVPTklWr3d+CrZ5j7FHkjc8J88Zz9veX5i+1:Yvgo4lWL4Cr3FHkY8J88t9vk5j1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Steals credentials from Web Browsers

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
  • SUSPICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7700)
    • The process checks if it is being run in the virtual environment

      • Varenis.exe (PID: 8160)
      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Reads security settings of Internet Explorer

      • Varenis.exe (PID: 8160)
    • Application launched itself

      • Varenis.exe (PID: 8160)
    • Reads the date of Windows installation

      • Varenis.exe (PID: 8160)
    • Found regular expressions for crypto-addresses (YARA)

      • Varenis.exe (PID: 8160)
    • Executes application which crashes

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 7700)
  • INFO

    • Checks supported languages

      • Varenis.exe (PID: 8160)
      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Process checks computer location settings

      • Varenis.exe (PID: 8160)
    • Checks proxy server information

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
    • Reads the computer name

      • Varenis.exe (PID: 5544)
      • Varenis.exe (PID: 4436)
      • Varenis.exe (PID: 8160)
    • Manual execution by a user

      • Varenis.exe (PID: 4436)
      • Varenis.exe (PID: 8160)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 720)
      • WerFault.exe (PID: 4620)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:05:17 10:24:58
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Varenis_1.0.3/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs varenis.exe no specs conhost.exe no specs varenis.exe conhost.exe no specs varenis.exe conhost.exe no specs werfault.exe no specs slui.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720C:\WINDOWS\system32\WerFault.exe -u -p 4436 -s 592C:\Windows\System32\WerFault.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
3100\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4436"C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221226505
Modules
Images
c:\users\admin\desktop\varenis_1.0.3-1\varenis_1.0.3\varenis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
4620C:\WINDOWS\system32\WerFault.exe -u -p 5544 -s 612C:\Windows\System32\WerFault.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
5544"C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe
Varenis.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221226505
Modules
Images
c:\users\admin\desktop\varenis_1.0.3-1\varenis_1.0.3\varenis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
5868C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6972\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVarenis.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7700"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7940C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
8160"C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe" C:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\varenis_1.0.3-1\varenis_1.0.3\varenis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
Total events
5 981
Read events
5 934
Write events
28
Delete events
19

Modification events

(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Varenis_1.0.3-1.zip
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7700) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
117
Suspicious files
45
Text files
28
Unknown types
0

Dropped files

PID
Process
Filename
Type
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\EmbedRuntime\mono-2.0-bdwgc.dllexecutable
MD5:8AA5D7F25BB4D0936BAE340E00578280
SHA256:2431BBD560EAE99E3E967A4805A8C4121C61A317769E11BC61F7017217DC5769
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\config.initext
MD5:C915D4CAE28E27764FBF0D636A284634
SHA256:AD2880D927D1153A6605C16DBA07688FDAD797185A7399FBDFE7BEC1C3D77A43
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\DefaultWsdlHelpGenerator.aspxhtml
MD5:F7BE9F1841FF92F9D4040AED832E0C79
SHA256:751861040B69EA63A3827507B7C8DA9C7F549DC181C1C8AF4B7CA78CC97D710A
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\logs\changelog.txttext
MD5:21FED6C6A6702412CD77E7DDF538E49E
SHA256:CDA3F8CF2A29E6453F7893E08128260EB7F448B3930F59C2B4C129EB6B490F91
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\license.txttext
MD5:4561FFEEB82828F81FA93DAD71C96FF0
SHA256:140C57B69D3D0524B2EBD66EE33D4B5A0486939B1E6D236CA340861A337DE868
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\logs\log_02-25-2025.txttext
MD5:38C88333EB9555D8C96D1D3296F87C24
SHA256:B7D26DFF06BDEE05735D28FA33A981FA6794F5174AADA2B1E768E33B56F1D178
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\2.0\Browsers\Compat.browsertext
MD5:0D831C1264B5B32A39FA347DE368FE48
SHA256:8A1082057AC5681DCD4E9C227ED7FB8EB42AC1618963B5DE3B65739DD77E2741
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\etc\mono\4.5\Browsers\Compat.browsertext
MD5:0D831C1264B5B32A39FA347DE368FE48
SHA256:8A1082057AC5681DCD4E9C227ED7FB8EB42AC1618963B5DE3B65739DD77E2741
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\Varenis.exe
MD5:
SHA256:
7700WinRAR.exeC:\Users\admin\Desktop\Varenis_1.0.3-1\Varenis_1.0.3\MonoBleedingEdge\EmbedRuntime\MonoPosixHelper.dllexecutable
MD5:4F482CE44693475FAD7B84AFBCC23453
SHA256:2B775A48E200ED2C7369FCD8BF2BA39F42A77FB702ED2D9FF0F3ACEE08FA4109
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8056
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8056
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5608
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8056
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.35
  • 23.216.77.38
  • 23.216.77.22
  • 23.216.77.13
  • 23.216.77.6
  • 23.216.77.15
  • 23.216.77.31
  • 23.216.77.19
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info