File name: | Your_Full_Setup_Here.zip |
Full analysis: | https://app.any.run/tasks/82213edb-1b26-4be5-9cca-8b400fffc113 |
Verdict: | Malicious activity |
Threats: | Raccoon is an info stealer type malware available as a Malware as a Service. It can be obtained for a subscription and costs $200 per month. Raccoon malware has already infected over 100,000 devices and became one of the most mentioned viruses on the underground forums in 2019. |
Analysis date: | April 29, 2025, 15:20:15 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v1.0 to extract, compression method=store |
MD5: | 3C0015F9BDC6A78CC683CE22DAF90487 |
SHA1: | E351954C925A0F3BFAF944E9DBACD10D0918C388 |
SHA256: | 42E8AADCE8780643C1BC9CFA59D466ECD0ABB555467CD210C383FA62FB562B49 |
SSDEEP: | 98304:RzCic78jntzssZQbFUkeplthkrnX+/OOK5DY95ABFpBsPW4:LYW8y |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 10 |
---|---|
ZipBitFlag: | - |
ZipCompression: | None |
ZipModifyDate: | 2022:09:30 22:48:16 |
ZipCRC: | 0x00000000 |
ZipCompressedSize: | - |
ZipUncompressedSize: | - |
ZipFileName: | langs/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
732 | C:\WINDOWS\system32\OpenWith.exe -Embedding | C:\Windows\System32\OpenWith.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1272 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2420 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe | Setup.exe | ||||||||||||
User: admin Company: Microsoft Integrity Level: HIGH Description: Laptop Simulator Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
3300 | "C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\dummy\DESKTOP-JGLLJLD-20190323-1136.log | C:\Windows\System32\notepad.exe | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3332 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "DAA6951F-C41D-442B-A0EE-63338C859045" "154C0989-4F21-4AF4-9E41-0EC8175F0D19" "6564" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Exit code: 0 Version: 0.12.2.0 Modules
| |||||||||||||||
4120 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe | WinRAR.exe | ||||||||||||
User: admin Company: Microsoft Integrity Level: HIGH Description: Laptop Simulator Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
4200 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
4812 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Your_Full_Setup_Here.zip | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
6240 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Description: Laptop Simulator Exit code: 3221226540 Version: 1.0.0.0 Modules
| |||||||||||||||
6248 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "C738843B-2B00-4430-9F90-90D948D04CC1" "315087B5-AADB-440C-9682-F7FD014E1C10" "6960" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Exit code: 0 Version: 0.12.2.0 Modules
|
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Your_Full_Setup_Here.zip | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath |
Operation: | delete value | Name: | 15 |
Value: | |||
(PID) Process: | (4812) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath |
Operation: | delete value | Name: | 14 |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Hungarian.ini | text | |
MD5:7591DF7FAE4342CBC7A0706E1B28E87B | SHA256:FE9997629D296908247A2E82DA6C369E2EA7EB4C87B12FC7C8D3ECB3E6FC320D | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\English.ini | text | |
MD5:525CE1C02CA53F9C63CB697ED3AAE899 | SHA256:0F9D467F6BB6F682C0D1351B26038950C73720F2BFC0741EC1C7BFAB2046D75F | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Kazakh.ini | text | |
MD5:FE2B5687F2DE60CB55629FD7F0CA9A21 | SHA256:1FDE00989B3BAEB67E6B1F8654CD2FC7216A40A4C5A5A9A64D03D47EE95E76BE | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\Setup.exe | — | |
MD5:— | SHA256:— | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Your_Full_Setup_Here\Setup.exe | — | |
MD5:— | SHA256:— | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Danish.ini | text | |
MD5:5F50B22DE0EFB245CD3B8F2FB50A6D3D | SHA256:59DF77A75ACA7C0A8574F6D4B5BE5632908C4FEA8634F4748E36FF6FEE40E317 | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Indonesian.ini | text | |
MD5:D944D8A3551719A176DB4DA31733AB75 | SHA256:9E52E0B1F7EC39A36E2EDD0231DC98865DE8524A651FCF6B1B948A575E35FD0F | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Hebrew.ini | text | |
MD5:DBF6973AC46A0ADCAE8500A16CCE4E48 | SHA256:42BA655E5B635698995A588F4DD39147BE867A0C4B45FD49EDC65982B12B9531 | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Japanese.ini | text | |
MD5:36D47BFAE8D0D48D56B7B1FEB3B317E7 | SHA256:9077B41D743ED6AF51CD9B8AEDAEBB6D1E0E6217825635A1AA9451994EFAFF0F | |||
4812 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.34463\langs\Croatian.ini | text | |
MD5:8477123868F12632D652C6DA5DF683C2 | SHA256:5BF2B70EDB78073F3CE4FE6D809A3A25C982CB2840B8EBAF4367EBC42F16BD3E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2420 | Setup.exe | POST | 404 | 83.217.11.11:80 | http://83.217.11.11/ | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2112 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6564 | WINWORD.EXE | 52.109.32.97:443 | officeclient.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | GB | whitelisted |
6564 | WINWORD.EXE | 52.123.129.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6564 | WINWORD.EXE | 23.48.23.62:443 | omex.cdn.office.net | Akamai International B.V. | DE | whitelisted |
2420 | Setup.exe | 83.217.11.11:80 | — | Okay-Telecom Ltd. | RU | malicious |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
omex.cdn.office.net |
| whitelisted |
messaging.lifecycle.office.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
nleditor.osi.office.net |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | ET MALWARE Win32/RecordBreaker CnC Checkin M1 |
— | — | A Network Trojan was detected | ET MALWARE Win32/RecordBreaker - Observed UA M5 (23591) |