File name:

Desktop.rar

Full analysis: https://app.any.run/tasks/379de6e3-a867-4112-b6ae-890973070849
Verdict: Malicious activity
Analysis date: May 16, 2025, 16:13:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
desktopboom
endermanch
arch-exec
delphi
aspack
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

63164CC07D602BB8E8D77FBBED09F25D

SHA1:

EC577F5990E8D2EEE43AC6CAD2773CED043C2181

SHA256:

467CE8FBC13403703069B6D4EDDF940F12532E79E824C95C78CA33EE6820FBFD

SSDEEP:

98304:9LYdDw5fU6Vh7vEmhqAdAt6+26hFmTztG4E+1e9xuMWudny3MzMnbK40r/9nqjVz:x7fgURW8KGZsueu6dBa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DESKTOPBOOM has been detected

      • WinRAR.exe (PID: 6760)
    • Generic archive extractor

      • WinRAR.exe (PID: 6760)
    • GENERIC has been found (auto)

      • WinRAR.exe (PID: 6760)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6760)
    • Starts a Microsoft application from unusual location

      • Hydra.exe (PID: 904)
      • Windows-KB2670838.msu.exe (PID: 6512)
      • Windows-KB2670838.msu.exe (PID: 5260)
    • Executes application which crashes

      • YouAreAnIdiot.exe (PID: 1660)
    • There is functionality for taking screenshot (YARA)

      • Flasher.exe (PID: 3180)
      • Time.exe (PID: 6184)
      • ScreenScrew.exe (PID: 2236)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6760)
    • Manual execution by a user

      • Hydra.exe (PID: 904)
      • Time.exe (PID: 6184)
      • YouAreAnIdiot.exe (PID: 1660)
      • ScreenScrew.exe (PID: 2236)
      • DesktopBoom.exe (PID: 1088)
      • rickroll.exe (PID: 4152)
      • Curfun.exe (PID: 3020)
      • Windows-KB2670838.msu.exe (PID: 5260)
      • Flasher.exe (PID: 3180)
      • Windows-KB2670838.msu.exe (PID: 6512)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6760)
    • Checks supported languages

      • Hydra.exe (PID: 904)
      • Time.exe (PID: 6184)
      • YouAreAnIdiot.exe (PID: 1660)
      • ScreenScrew.exe (PID: 2236)
      • Flasher.exe (PID: 3180)
      • DesktopBoom.exe (PID: 1088)
      • rickroll.exe (PID: 4152)
      • Curfun.exe (PID: 3020)
      • Windows-KB2670838.msu.exe (PID: 5260)
    • Reads the computer name

      • Hydra.exe (PID: 904)
      • YouAreAnIdiot.exe (PID: 1660)
      • Curfun.exe (PID: 3020)
      • Windows-KB2670838.msu.exe (PID: 5260)
    • Reads the machine GUID from the registry

      • Hydra.exe (PID: 904)
      • YouAreAnIdiot.exe (PID: 1660)
      • Windows-KB2670838.msu.exe (PID: 5260)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 2432)
    • Compiled with Borland Delphi (YARA)

      • ScreenScrew.exe (PID: 2236)
      • Flasher.exe (PID: 3180)
      • Time.exe (PID: 6184)
    • Aspack has been detected

      • Flasher.exe (PID: 3180)
      • ScreenScrew.exe (PID: 2236)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 247807
UncompressedSize: 253952
OperatingSystem: Win32
ArchivedFileName: Avoid.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
14
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #DESKTOPBOOM winrar.exe hydra.exe no specs time.exe no specs youareanidiot.exe screenscrew.exe no specs werfault.exe no specs flasher.exe no specs desktopboom.exe no specs rickroll.exe no specs conhost.exe no specs curfun.exe no specs windows-kb2670838.msu.exe no specs windows-kb2670838.msu.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904"C:\Users\admin\Desktop\Hydra.exe" C:\Users\admin\Desktop\Hydra.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Hydra
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\hydra.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1088"C:\Users\admin\Desktop\DesktopBoom.exe" C:\Users\admin\Desktop\DesktopBoom.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
DesktopBoom - by Nay1l
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\desktopboom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\msvcrt.dll
1660"C:\Users\admin\Desktop\YouAreAnIdiot.exe" C:\Users\admin\Desktop\YouAreAnIdiot.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Microsoft Word 2010
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\youareanidiot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2236"C:\Users\admin\Desktop\ScreenScrew.exe" C:\Users\admin\Desktop\ScreenScrew.exeexplorer.exe
User:
admin
Company:
RJL Software, Inc.
Integrity Level:
MEDIUM
Description:
Screws with your screen :)
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\screenscrew.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2432C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1660 -s 1200C:\Windows\SysWOW64\WerFault.exeYouAreAnIdiot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
3020"C:\Users\admin\Desktop\Curfun.exe" C:\Users\admin\Desktop\Curfun.exeexplorer.exe
User:
admin
Company:
RJL Software
Integrity Level:
MEDIUM
Description:
Randomly changes cursor
Version:
1.0.1.0
Modules
Images
c:\users\admin\desktop\curfun.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3180"C:\Users\admin\Desktop\Flasher.exe" C:\Users\admin\Desktop\Flasher.exeexplorer.exe
User:
admin
Company:
RJL Software, Inc.
Integrity Level:
MEDIUM
Description:
Flashes any image to the screen quickly.
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\flasher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4152"C:\Users\admin\Desktop\rickroll.exe" C:\Users\admin\Desktop\rickroll.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\rickroll.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5260"C:\Users\admin\Desktop\Windows-KB2670838.msu.exe" C:\Users\admin\Desktop\Windows-KB2670838.msu.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WindowsUpdate
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\windows-kb2670838.msu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6184"C:\Users\admin\Desktop\Time.exe" C:\Users\admin\Desktop\Time.exeexplorer.exe
User:
admin
Company:
RJL Software, Inc.
Integrity Level:
MEDIUM
Description:
Randomly changes the time
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\time.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 882
Read events
3 864
Write events
18
Delete events
0

Modification events

(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Desktop.rar
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6760) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
19
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\DesktopBoom.exeexecutable
MD5:F0A661D33AAC3A3CE0C38C89BEC52F89
SHA256:C20E78CE9028299D566684D35B1230D055E5EA0E9B94D0AFF58F650E0468778A
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\Curfun.exeexecutable
MD5:0B3B2DFF5503CB032ACD11D232A3AF55
SHA256:EF878461A149024F3065121FF4E165731ECABEF1B94B0B3ED2EDA010AD39202B
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\ChilledWindows.exeexecutable
MD5:6A4853CD0584DC90067E15AFB43C4962
SHA256:CCB9502BF8BA5BECF8B758CA04A5625C30B79E2D10D2677CC43AE4253E1288EC
2432WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_YouAreAnIdiot.ex_693db284b24f4d6e5531f56e6b669968df89bc_74378ff6_b65b5ef6-595a-4bc2-8b82-b18824d0e058\Report.wer
MD5:
SHA256:
2432WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\YouAreAnIdiot.exe.1660.dmp
MD5:
SHA256:
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\Avoid.exeexecutable
MD5:20D2C71D6D9DAF4499FFC4A5D164F1C3
SHA256:3AC8CC58DCBCEAEC3DAB046AEA050357E0E2248D30B0804C738C9A5B037C220D
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\CrazyNCS.exeexecutable
MD5:D043BA91E42E0D9A68C9866F002E8A21
SHA256:6820C71DF417E434C5AD26438C901C780FC5A80B28A466821B47D20B8424EF08
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\Flasher.exeexecutable
MD5:9254CA1DA9FF8AD492CA5FA06CA181C6
SHA256:30676AD5DC94C3FEC3D77D87439B2BF0A1AAA7F01900B68002A06F11CAEE9CE6
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\rickroll.exeexecutable
MD5:0EC108E32C12CA7648254CF9718AD8D5
SHA256:48B08EA78124CA010784D9F0FAAE751FC4A0C72C0E7149DED81FC03819F5D723
6760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6760.31773\Launcher.exeexecutable
MD5:7506EB94C661522AFF09A5C96D6F182B
SHA256:D5B962DFE37671B5134F0B741A662610B568C2B5374010EE92B5B7857D87872C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
26
DNS requests
4
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4976
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info