File name:

Install_0007.exe

Full analysis: https://app.any.run/tasks/0c9d7b22-46a1-461f-8602-dca34a31c400
Verdict: Malicious activity
Analysis date: June 06, 2024, 12:25:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

E1B07111D364B557F502613E3C0E9564

SHA1:

8F9A41BEA4377398780FE35E553866FBA7E77907

SHA256:

45E2D4E071B2B312606BBEE55C6F527674479C9007E0F43BFD28BF0D547372F9

SSDEEP:

98304:zLH3dLg+qaojKOgVHtLZ3kROoXtaTMkpjeHIYDCls5mtddENZfoK+IH5fdiQYmN/:zMd/VlR/L1wTM4RY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Install_0007.exe (PID: 6384)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • Install_0007.exe (PID: 6384)
    • Creates/Modifies COM task schedule object

      • Install_0007.exe (PID: 6384)
    • Executable content was dropped or overwritten

      • Install_0007.exe (PID: 6384)
  • INFO

    • Checks supported languages

      • Install_0007.exe (PID: 6384)
    • Creates files or folders in the user directory

      • Install_0007.exe (PID: 6384)
    • Reads the computer name

      • Install_0007.exe (PID: 6384)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:28 12:18:49+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 939520
InitializedDataSize: 6601728
UninitializedDataSize: -
EntryPoint: 0xcf6bc
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 21.7.0.0
ProductVersionNumber: 21.7.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 21.07
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2021 Igor Pavlov
OriginalFileName: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 21.07
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
112
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start install_0007.exe

Process information

PID
CMD
Path
Indicators
Parent process
6384"C:\Users\admin\Desktop\Install_0007.exe" C:\Users\admin\Desktop\Install_0007.exe
explorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7z Setup SFX
Exit code:
0
Version:
21.07
Modules
Images
c:\users\admin\desktop\install_0007.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
Total events
1 721
Read events
1 717
Write events
4
Delete events
0

Modification events

(PID) Process:(6384) Install_0007.exeKey:HKEY_CURRENT_USER\SOFTWARE\7-Zip
Operation:writeName:Path
Value:
C:\Users\admin\AppData\Roaming\7zip
(PID) Process:(6384) Install_0007.exeKey:HKEY_CURRENT_USER\SOFTWARE\7-Zip
Operation:writeName:Path32
Value:
C:\Users\admin\AppData\Roaming\7zip
(PID) Process:(6384) Install_0007.exeKey:HKEY_CLASSES_ROOT\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(6384) Install_0007.exeKey:HKEY_CLASSES_ROOT\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
Executable files
9
Suspicious files
3
Text files
97
Unknown types
0

Dropped files

PID
Process
Filename
Type
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\br.txttext
MD5:C2EB67D788756BE5ECAA0A8CFB3D1E0B
SHA256:0F6BF6749C42C844980DB32EE56CADC987CE245EF650BC7D626D56468A7CBE6A
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\af.txttext
MD5:FBBE51ACB879B525CC6B19D386697924
SHA256:3793FB69EE9FD958CF15A272B1ED54E4B3D75592836EBCD085DC0E7B1400D1CB
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\7-zip.chmbinary
MD5:E8B5CF54C6BF22492B373715B8B59DC0
SHA256:4F5C2170EFC2B6AF63873AADFED45E398BA73B414A87EE1E95C4A3AF3D5C7EC3
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\History.txttext
MD5:D68C7D03873EB191F46BCC0CB6A89664
SHA256:5355372CAD5A5142BC7A0991BD84DBB751BF65A4C272E9C7EDDF48CEE79DD24B
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\ast.txttext
MD5:1F86AE235BC747A279C9E9EC72675CE4
SHA256:8FCD1B8CE6FED05F406C4B81AEA821132800BC494D3FD6F42A4258A81F8998EC
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\az.txttext
MD5:81B732A8B4206FB747BFBFE524DDE192
SHA256:CAEC460E73BD0403C2BCDE7E773459BEA9112D1BFACBE413D4F21E51A5762BA6
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\ar.txttext
MD5:1C45E6A6ECB3B71A7316C466B6A77C1C
SHA256:972261B53289DE2BD8A65E787A6E7CD6DEFC2B5F7E344128F2FE0492ED30CCF1
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\ba.txttext
MD5:D83B65AC086DA0C94D6EB57BEE669C2B
SHA256:2901B54F7621C95429658CB4EDB28ABD0CB5B6E257C7D9A364FC468A8B86BAAE
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\an.txttext
MD5:BF8564B2DAD5D2506887F87AEE169A0A
SHA256:0E8DD119DFA6C6C1B3ACA993715092CDF1560947871092876D309DBC1940A14A
6384Install_0007.exeC:\Users\admin\AppData\Roaming\7zip\Lang\bg.txttext
MD5:833AFB4F88FDB5F48245C9B65577DC19
SHA256:4DCABCC8AB8069DB79143E4C62B6B76D2CF42666A09389EACFC35074B61779E3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
25
DNS requests
8
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5140
MoUsoCoreWorker.exe
GET
200
23.45.119.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5140
MoUsoCoreWorker.exe
GET
200
184.29.138.50:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
GET
200
172.67.75.22:443
https://apponlineboutique.com/E0B1691BCA236D52/47957980191/D24CE03ADB209B34/71767675643?F646640742051BDD1717676756
unknown
text
32 b
POST
204
23.221.24.56:443
https://www.bing.com/threshold/xls.aspx
unknown
GET
200
23.221.24.56:443
https://www.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=DyIrb3t-gQF4cnWyAbUBK6UBK7gB&or=w
unknown
s
21.3 Kb
GET
200
23.221.24.83:443
https://r.bing.com/rb/17/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=DygxdoIBhQGIAX95fLsBvgExrgExwQE&or=w
unknown
s
21.3 Kb
GET
200
23.221.24.56:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
3.36 Kb
POST
200
52.168.117.170:443
https://self.events.data.microsoft.com/OneCollector/1.0/
unknown
binary
9 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
2384
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
239.255.255.250:1900
unknown
5140
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5140
MoUsoCoreWorker.exe
23.45.119.176:80
crl.microsoft.com
Akamai International B.V.
US
unknown
5140
MoUsoCoreWorker.exe
184.29.138.50:80
www.microsoft.com
AKAMAI-AS
US
unknown
6384
Install_0007.exe
172.67.75.22:443
apponlineboutique.com
CLOUDFLARENET
US
unknown
5456
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.45.119.176
  • 23.45.119.187
whitelisted
www.microsoft.com
  • 184.29.138.50
whitelisted
apponlineboutique.com
  • 172.67.75.22
  • 104.26.9.143
  • 104.26.8.143
unknown
r.bing.com
  • 23.221.24.70
  • 23.221.24.83
  • 23.221.24.47
  • 23.221.24.56
  • 23.221.24.71
whitelisted
self.events.data.microsoft.com
  • 20.189.173.10
whitelisted

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA HTTP Request abnormal Content-Encoding header
Generic Protocol Command Decode
SURICATA HTTP Request abnormal Content-Encoding header
1 ETPRO signatures available at the full report
No debug info