File name:

ZipThis.zip

Full analysis: https://app.any.run/tasks/b2feb49b-6e1a-4f45-8544-58f597adca5f
Verdict: Malicious activity
Analysis date: January 15, 2025, 15:39:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
generic
arch-exec
arch-scr
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

5C509A424F5BFB82CCDE11CB1180BC6A

SHA1:

92C793EE72459FA1F5E256B20FEEA6C15C27BFFC

SHA256:

429598094F0017C6C82D32045B7F199CC712F9C39C7B4816D77E16E7DBC9D323

SSDEEP:

49152:r/Dpds/s4OBW0OkOZdI9xy2fQHlhiNZQIcpQ2dfhScaNX8jgBpXG15fmO7TM10Wu:r/Dpds/s4H0OtZCLy2Y64j/aNXqgrX83

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • WinRAR.exe (PID: 5532)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5532)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 5532)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5532)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 5532)
    • Disables trace logs

      • Updater.exe (PID: 6828)
      • Updater.exe (PID: 3680)
    • Reads the computer name

      • Updater.exe (PID: 6828)
      • Updater.exe (PID: 3680)
      • Updater.exe (PID: 6732)
      • Updater.exe (PID: 6808)
    • Checks proxy server information

      • Updater.exe (PID: 6828)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 5532)
    • Reads the machine GUID from the registry

      • Updater.exe (PID: 6828)
      • Updater.exe (PID: 3680)
      • Updater.exe (PID: 6732)
      • Updater.exe (PID: 6808)
    • Reads Environment values

      • Updater.exe (PID: 6828)
      • Updater.exe (PID: 3680)
      • Updater.exe (PID: 6732)
    • Checks supported languages

      • Updater.exe (PID: 6828)
      • Updater.exe (PID: 3680)
      • Updater.exe (PID: 6732)
      • Updater.exe (PID: 6808)
    • Reads the software policy settings

      • Updater.exe (PID: 6828)
      • Updater.exe (PID: 3680)
      • Updater.exe (PID: 6732)
    • Manual execution by a user

      • Updater.exe (PID: 6732)
      • Updater.exe (PID: 6808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:12:30 16:18:10
ZipCRC: 0xdedb7177
ZipCompressedSize: 29428
ZipUncompressedSize: 118095
ZipFileName: zipthis\BaseV4.Belongings.favicon.ico
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GENERIC winrar.exe updater.exe updater.exe rundll32.exe no specs updater.exe updater.exe

Process information

PID
CMD
Path
Indicators
Parent process
1744C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3680"C:\Users\admin\AppData\Local\Temp\Rar$EXa5532.45179\zipthis\Updater.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa5532.45179\zipthis\Updater.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Updater
Exit code:
0
Version:
5.345.34.36
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa5532.45179\zipthis\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5532"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\ZipThis.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6732"C:\Users\admin\Desktop\Updater.exe" C:\Users\admin\Desktop\Updater.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Updater
Exit code:
0
Version:
5.345.34.36
Modules
Images
c:\users\admin\desktop\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6808"C:\Users\admin\Desktop\Updater.exe" C:\Users\admin\Desktop\Updater.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Updater
Exit code:
0
Version:
5.345.34.36
Modules
Images
c:\users\admin\desktop\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6828"C:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\Updater.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\Updater.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Updater
Exit code:
0
Version:
5.345.34.36
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa5532.41458\zipthis\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
6 342
Read events
6 278
Write events
39
Delete events
25

Modification events

(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\ZipThis.zip
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6828) Updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6828) Updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
36
Suspicious files
0
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\Updater.dllexecutable
MD5:C355B5CA9F7B07667F96C1E30B9A0894
SHA256:27A7BA032F7D6CF787454C2FD036C95D13BE9FB489B26FD9050659AA23498DD6
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\BaseV4.Belongings.favicon.icoimage
MD5:445F0C73332D5E55BD49681AD990527F
SHA256:AA354C95608D65898F835859327344D7B5342CC92AEEDC763D003C982F3AD286
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\vcamp140.dllexecutable
MD5:8441A618D2CEF67BDEDCA224FD61AFA2
SHA256:6CD300E597C477260809C5CA036993D923CD8BE304AE323C9C4D7776115FE62D
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\update_task_ad.ps1text
MD5:0D4C7C2411E1BA411E24DE176494CA90
SHA256:DC4685144E93384E88D1FC6E6DD66F6C4E703ED9173A98819F2C8BCB28D983FC
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\msvcp140_1.dllexecutable
MD5:7B0A25EEE764D8747F02CB3ED980F07A
SHA256:1274292F4CC655F295272B37E08A9683B8BB8C419B61EA2E1F43EB4D22F02F90
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\Libs.dllexecutable
MD5:8F22D1409CF9222DD8B05EB8E0456050
SHA256:D658EA24EE115D2071DEDFF84383657BB540DC1037E6D0FEE689D2751204D4D7
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\msvcp140_codecvt_ids.dllexecutable
MD5:165308EE66D0B8F11CA20F3BCD410EA9
SHA256:08DF3AB1B59D1F7D63F0811838E4FCCC107087FCBC469D94975C0E44477058E7
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\vcruntime140.dllexecutable
MD5:E9B690FBE5C4B96871214379659DD928
SHA256:A06C9EA4F815DAC75D2C99684D433FBFC782010FAE887837A03F085A29A217E8
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\concrt140.dllexecutable
MD5:9485D003573E0EAF7952AB23CC82EF7B
SHA256:5E0E8EAC57B86E2DE7CA7D6E8D34DDDEA602CE3660208FB53947A027635D59A1
5532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5532.41458\zipthis\vccorlib140.dllexecutable
MD5:E3E6AA23DF3C78B29B0EE90E2712FC7E
SHA256:233E79C5AB80A2902B79C8B41E741DC06CD4A9FF8BCA99A025FE8077A35BE125
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6092
svchost.exe
GET
200
2.16.164.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6092
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3032
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3032
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6308
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6092
svchost.exe
2.16.164.18:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6092
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.21.65.132:443
www.bing.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.18
  • 2.16.164.72
  • 2.16.164.34
  • 2.16.164.128
  • 2.16.164.99
  • 2.16.164.122
  • 2.16.164.49
  • 2.16.164.106
  • 2.16.164.114
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.bing.com
  • 2.21.65.132
  • 2.21.65.154
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.76
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.133
  • 40.126.32.72
  • 40.126.32.138
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
can.thisilient.com
  • 45.33.84.9
unknown
arc.msn.com
  • 20.105.99.58
whitelisted

Threats

No threats detected
No debug info