File name:

17052025_0102_download.zip

Full analysis: https://app.any.run/tasks/9afa0e29-0b05-49df-aba8-b3fbff0b2472
Verdict: Malicious activity
Threats:

DBatLoader is a loader malware used for distributing payloads of different types, including WarzoneRAT and Formbook. It is employed in multi-stage attacks that usually start with a phishing email carrying a malicious attachment.

Analysis date: May 17, 2025, 01:09:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
dbatloader
loader
rat
remcos
remote
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

A6E4C8792C8457A49F40BF93D9666DA6

SHA1:

2207310A5F0DBB940081F8CE49A7A5B2F8A75511

SHA256:

40D8D40E20EA380CE5B72D3AC8DA000DCFDA5B63173219CE20DA28271C3F3792

SSDEEP:

98304:WLDjVl/zLpKV1r/G7DZ1lLzZFkpJHuZZsgzLIVGdyrAwDzCES7sz1KTCnYa0wt3J:Gze

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 2088)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2092)
    • DBATLOADER has been detected (YARA)

      • chrome.PIF (PID: 6476)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6668)
    • REMCOS has been detected (SURICATA)

      • SndVol.exe (PID: 1532)
    • REMCOS has been detected (YARA)

      • SndVol.exe (PID: 1532)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 456)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 456)
    • Drops a file with a rarely used extension (PIF)

      • extrac32.exe (PID: 5064)
      • expha.pif (PID: 4812)
      • expha.pif (PID: 5576)
      • expha.pif (PID: 7084)
      • ghf.pif (PID: 6964)
      • esentutl.exe (PID: 5640)
      • chrome.PIF (PID: 6476)
    • Executable content was dropped or overwritten

      • extrac32.exe (PID: 5064)
      • expha.pif (PID: 4812)
      • expha.pif (PID: 5576)
      • expha.pif (PID: 7084)
      • ghf.pif (PID: 6964)
      • esentutl.exe (PID: 5640)
      • chrome.PIF (PID: 6476)
    • Process drops legitimate windows executable

      • extrac32.exe (PID: 5064)
      • expha.pif (PID: 4812)
      • expha.pif (PID: 5576)
    • Starts application with an unusual extension

      • cmd.exe (PID: 456)
      • alpha.pif (PID: 3884)
      • rdha.pif (PID: 6644)
      • alpha.pif (PID: 1660)
      • cmd.exe (PID: 5204)
      • rundll32.exe (PID: 1132)
      • rundll32.exe (PID: 6576)
    • Starts itself from another location

      • cmd.exe (PID: 456)
      • cmd.exe (PID: 5204)
    • Process drops legitimate windows executable (CertUtil.exe)

      • expha.pif (PID: 7084)
    • Reads security settings of Internet Explorer

      • rdha.pif (PID: 6644)
      • chrome.PIF (PID: 6476)
      • Kvmtzzhl.PIF (PID: 5084)
      • Kvmtzzhl.PIF (PID: 6808)
      • WinRAR.exe (PID: 2088)
    • Runs PING.EXE to delay simulation

      • alpha.pif (PID: 6240)
      • cmd.exe (PID: 5576)
    • Reads the date of Windows installation

      • rdha.pif (PID: 6644)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 456)
      • chrome.PIF (PID: 6476)
      • WinRAR.exe (PID: 2088)
    • There is functionality for taking screenshot (YARA)

      • chrome.PIF (PID: 6476)
      • Kvmtzzhl.PIF (PID: 5084)
      • SndVol.exe (PID: 1532)
      • Kvmtzzhl.PIF (PID: 6808)
    • Executing commands from ".cmd" file

      • chrome.PIF (PID: 6476)
    • Likely accesses (executes) a file from the Public directory

      • esentutl.exe (PID: 5640)
      • alpha.pif (PID: 4068)
      • alpha.pif (PID: 6512)
    • Application launched itself

      • cmd.exe (PID: 456)
    • Connects to unusual port

      • SndVol.exe (PID: 1532)
    • Created directory related to system

      • alpha.pif (PID: 6512)
    • Starts a Microsoft application from unusual location

      • alpha.pif (PID: 6512)
      • alpha.pif (PID: 4068)
    • The process executes via Task Scheduler

      • rundll32.exe (PID: 1132)
      • rundll32.exe (PID: 6576)
    • Contacting a server suspected of hosting an CnC

      • SndVol.exe (PID: 1532)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 2088)
  • INFO

    • Manual execution by a user

      • cmd.exe (PID: 456)
    • Reads the computer name

      • extrac32.exe (PID: 5064)
      • rdha.pif (PID: 6644)
      • ghf.pif (PID: 5244)
      • ghf.pif (PID: 6964)
      • chrome.PIF (PID: 6476)
      • Kvmtzzhl.PIF (PID: 5084)
      • Kvmtzzhl.PIF (PID: 6808)
      • MpCmdRun.exe (PID: 4272)
    • Creates files in the program directory

      • extrac32.exe (PID: 5064)
      • expha.pif (PID: 4812)
      • expha.pif (PID: 7084)
      • ghf.pif (PID: 5244)
      • expha.pif (PID: 5576)
      • ghf.pif (PID: 6964)
      • chrome.PIF (PID: 6476)
    • The sample compiled with english language support

      • extrac32.exe (PID: 5064)
      • expha.pif (PID: 4812)
      • expha.pif (PID: 5576)
      • expha.pif (PID: 7084)
      • esentutl.exe (PID: 5640)
    • Checks supported languages

      • extrac32.exe (PID: 5064)
      • expha.pif (PID: 4812)
      • expha.pif (PID: 5576)
      • expha.pif (PID: 7084)
      • alpha.pif (PID: 3884)
      • alpha.pif (PID: 6240)
      • rdha.pif (PID: 6644)
      • chrome.PIF (PID: 6476)
      • ghf.pif (PID: 6964)
      • ghf.pif (PID: 5244)
      • alpha.pif (PID: 1660)
      • alpha.pif (PID: 6512)
      • alpha.pif (PID: 4068)
      • Kvmtzzhl.PIF (PID: 5084)
      • Kvmtzzhl.PIF (PID: 6808)
      • MpCmdRun.exe (PID: 4272)
    • Process checks computer location settings

      • rdha.pif (PID: 6644)
    • Checks proxy server information

      • chrome.PIF (PID: 6476)
      • Kvmtzzhl.PIF (PID: 5084)
      • slui.exe (PID: 5640)
      • Kvmtzzhl.PIF (PID: 6808)
    • Compiled with Borland Delphi (YARA)

      • chrome.PIF (PID: 6476)
      • Kvmtzzhl.PIF (PID: 5084)
      • Kvmtzzhl.PIF (PID: 6808)
    • Reads the machine GUID from the registry

      • chrome.PIF (PID: 6476)
      • Kvmtzzhl.PIF (PID: 5084)
      • Kvmtzzhl.PIF (PID: 6808)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 1132)
      • rundll32.exe (PID: 6576)
    • Local mutex for internet shortcut management

      • rundll32.exe (PID: 1132)
      • rundll32.exe (PID: 6576)
    • Reads the software policy settings

      • slui.exe (PID: 5640)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 4272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(1532) SndVol.exe
C2 (3)45.141.233.95:8801
leak-shop.cc:8109
minerasicvalue.com:7501
BotnetTUE07
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_name-49TKCI
Keylog_flag1
Keylog_path%TEMP%
Keylog_file90s.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path1
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirappstore
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:05:16 10:25:22
ZipCRC: 0x5cd79c5b
ZipCompressedSize: 1872093
ZipUncompressedSize: 4823373
ZipFileName: REF23245.cmd
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
40
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs extrac32.exe expha.pif expha.pif expha.pif alpha.pif no specs ghf.pif no specs alpha.pif no specs ghf.pif alpha.pif no specs ping.exe no specs rdha.pif no specs #DBATLOADER chrome.pif cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs esentutl.exe alpha.pif no specs alpha.pif no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs #REMCOS sndvol.exe svchost.exe rundll32.exe no specs kvmtzzhl.pif no specs slui.exe colorcpl.exe no specs rundll32.exe no specs kvmtzzhl.pif no specs sndvol.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
456C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\REF23245.cmd" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
924C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR2088.11359\Rar$Scan151209.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
1132C:\WINDOWS\system32\rundll32.exe "C:\WINDOWS\system32\ieframe.dll",OpenURL C:\\ProgramData\\Kvmtzzhl.urlC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1272PING -n 4 127.0.0.1 C:\Windows\System32\PING.EXEalpha.pif
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\nsi.dll
1276cmd /c exit /b 0 C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1532C:\Windows\System32\SndVol.exeC:\Windows\SysWOW64\SndVol.exe
chrome.PIF
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Volume Mixer
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sndvol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\gdi32.dll
c:\windows\syswow64\win32u.dll
Remcos
(PID) Process(1532) SndVol.exe
C2 (3)45.141.233.95:8801
leak-shop.cc:8109
minerasicvalue.com:7501
BotnetTUE07
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_name-49TKCI
Keylog_flag1
Keylog_path%TEMP%
Keylog_file90s.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path1
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirappstore
1660C:\\ProgramData\\alpha.pif /C C:\\ProgramData\\ghf.pif -decodehex -f "C:\\ProgramData\\donex.avi" "C:\\ProgramData\\chrome.PIF" 12 C:\ProgramData\alpha.pifcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\programdata\alpha.pif
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2088"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\17052025_0102_download.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2092PowerShell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
4294770688
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
14 108
Read events
14 093
Write events
15
Delete events
0

Modification events

(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\17052025_0102_download.zip
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2088) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6644) rdha.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(1532) SndVol.exeKey:HKEY_CURRENT_USER\SOFTWARE\-49TKCI
Operation:writeName:exepath
Value:
2F4015C4E7834B121A68CC677E3E4BEE575B64CB1DC723DA857635EA14163F7377FAEBAD1A4766EEE163DABD443D6161BFFE905BE26EC6A19CBDC9F2B06B
Executable files
7
Suspicious files
4
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
2088WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR2088.11359\17052025_0102_download.zip\REF23245.cmd
MD5:
SHA256:
5244ghf.pifC:\ProgramData\donex.avitext
MD5:48D213452D99B06FF3A0569C0E5F6EB1
SHA256:0E6E3FD7E659AA973E9E969532BC7E63440314B8AD076D64C54F4D66312E0798
6476chrome.PIFC:\ProgramData\698.cmdtext
MD5:C8DA1D4130B1B2685541F778A9DB60AF
SHA256:3D6FE202075A44EEFFCD0C827F84A742093E893EC6E1D08DE388BDCE9B311A76
2092powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_klmnqqx0.k11.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6964ghf.pifC:\ProgramData\chrome.PIFexecutable
MD5:A0CF1B9028E03C22A335FB67F8CBF1AA
SHA256:977C6363BFBADF16F06A2B30EE0F261944EEABEC40BD64616C81F289108FBF75
5576expha.pifC:\ProgramData\rdha.pifexecutable
MD5:100F56A73211E0B2BCD076A55E6393FD
SHA256:00BE065F405E93233CC2F0012DEFDCBB1D6817B58969D5FFD9FD72FC4783C6F4
4812expha.pifC:\ProgramData\alpha.pifexecutable
MD5:CB6CD09F6A25744A8FA6E4B3E4D260C5
SHA256:265B69033CEA7A9F8214A34CD9B17912909AF46C7A47395DD7BB893A24507E59
6476chrome.PIFC:\ProgramData\Kvmtzzhl.urlbinary
MD5:BF499BD4CA4C7C69F4642DFA14417094
SHA256:0A58CC3BB8173E5E6A83B80BD288375213CD0E8CA70947A95C66F004A804BE4E
2092powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:13BE23CD170E384C0394FE1264B2A2EC
SHA256:A65CB335970AC444A8BA324317D80866FFBE8E9E419F8BFE2E8D815DA02E5E60
7084expha.pifC:\ProgramData\ghf.pifexecutable
MD5:A7A5B67EC704EAC6D6E6AF0489353F42
SHA256:BF072F9A6A15B550B13AE86A4FBD3FA809D2A13236847AE9FA9A68F41386106E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
82
DNS requests
18
Threats
126

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1532
SndVol.exe
45.141.233.95:8801
leak-shop.cc
Euro Crypt EOOD
DE
malicious
1532
SndVol.exe
45.141.233.95:8109
leak-shop.cc
Euro Crypt EOOD
DE
malicious
496
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5640
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 216.58.206.78
whitelisted
leak-shop.cc
  • 45.141.233.95
malicious
minerasicvalue.com
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
1532
SndVol.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 5
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1532
SndVol.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
1532
SndVol.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
1532
SndVol.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
1532
SndVol.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
1532
SndVol.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
1532
SndVol.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
1532
SndVol.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
1532
SndVol.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
No debug info