File name:

probablymalware.zip

Full analysis: https://app.any.run/tasks/4b1378f2-d97d-4312-a9b4-b033cc76b724
Verdict: Malicious activity
Analysis date: October 25, 2023, 17:29:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

A7890CBD06163D3E7E65BEE9A4659BE2

SHA1:

A2A51DF81132598655F2DF9A59E416798A7A28DB

SHA256:

47E9E34DBD5EF11BD6B1382F2EA62BA65DA1EE2690241C437D69564054A35571

SSDEEP:

49152:g8Osks0VE9deTj9e0l4i8MJyw/V8fVry8IY9iSOsMQp288Q1QS8Wlt1y+a3yTL:FLuwUzHyqV8BRKSOv981Qqy+1L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DownloadHelperTray.exe (PID: 2328)
    • Actions looks like stealing of personal data

      • DownloadHelperTray.exe (PID: 2328)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2184)
    • Reads settings of System Certificates

      • DownloadHelperTray.exe (PID: 2328)
    • Reads the Internet Settings

      • DownloadHelperTray.exe (PID: 2328)
  • INFO

    • Checks supported languages

      • wmpnscfg.exe (PID: 3836)
      • DownloadHelperTray.exe (PID: 2328)
    • Manual execution by a user

      • notepad.exe (PID: 2068)
      • DownloadHelperTray.exe (PID: 2328)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2184)
    • Reads the computer name

      • DownloadHelperTray.exe (PID: 2328)
      • wmpnscfg.exe (PID: 3836)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 3836)
      • DownloadHelperTray.exe (PID: 2328)
    • Reads Environment values

      • DownloadHelperTray.exe (PID: 2328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: BouncyCastle.Crypto.dll
ZipUncompressedSize: 2609152
ZipCompressedSize: 895667
ZipCRC: 0x202b9cf6
ZipModifyDate: 2022:12:07 18:34:18
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs searchprotocolhost.exe no specs notepad.exe no specs downloadhelpertray.exe wisptis.exe no specs wisptis.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2068"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\probablymalware\Config.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
2132"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2184"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\probablymalware.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
2328"C:\Users\admin\Desktop\probablymalware\DownloadHelperTray.exe" C:\Users\admin\Desktop\probablymalware\DownloadHelperTray.exe
explorer.exe
User:
admin
Company:
DownloadHelperTray
Integrity Level:
HIGH
Description:
DownloadHelperTray
Exit code:
0
Version:
1.0.3.0
Modules
Images
c:\users\admin\desktop\probablymalware\downloadhelpertray.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2796"C:\Windows\SYSTEM32\WISPTIS.EXE" /ManualLaunch;C:\Windows\System32\wisptis.exeDownloadHelperTray.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Pen and Touch Input Component
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\wisptis.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\rpcrt4.dll
3808"C:\Windows\SYSTEM32\WISPTIS.EXE" /ManualLaunch;C:\Windows\System32\wisptis.exeDownloadHelperTray.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Pen and Touch Input Component
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wisptis.exe
c:\windows\system32\ntdll.dll
3836"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
Total events
5 186
Read events
5 139
Write events
44
Delete events
3

Modification events

(PID) Process:(3836) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{A37F4940-2A1F-463D-9DBB-E3F00ED61A27}\{C8387EAF-ADC5-4B7D-AF06-6A3A9FB51765}
Operation:delete keyName:(default)
Value:
(PID) Process:(3836) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{A37F4940-2A1F-463D-9DBB-E3F00ED61A27}
Operation:delete keyName:(default)
Value:
(PID) Process:(3836) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{A1A0C470-F910-4ADA-AF5A-BBAA93F6F31C}
Operation:delete keyName:(default)
Value:
(PID) Process:(2184) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
7
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\c.dbsqlite
MD5:67993A4DAFE5E21B16DB8705DDAB3BB6
SHA256:694304BF3A3C28A7492D8EA50B0B82A8E377528CE6F66CC2B7EB7EA43EC96843
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\System.Security.Cryptography.ProtectedData.dllexecutable
MD5:503A90BDEDA2E75F57A424A712669BA6
SHA256:4360154B86D0E3A6B3C82BBA3684A2A01F1B5D7864A97F7AC1A9FFCD63408C65
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\Config.txttext
MD5:E13C37C043A9B03772917CBFE9B5FFB4
SHA256:F179730073BC288AA220677DCF243FFF7AAEAF5EA3B580E0137A2A3C51192324
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\Newtonsoft.Json.dllexecutable
MD5:081D9558BBB7ADCE142DA153B2D5577A
SHA256:B624949DF8B0E3A6153FDFB730A7C6F4990B6592EE0D922E1788433D276610F3
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\BouncyCastle.Crypto.dllexecutable
MD5:F0B3E112CE4807A28E2B5D66A840ED7F
SHA256:333903C7D22A27098E45FC64B77A264AA220605CFBD3E329C200D7E4B42C881C
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\DownloadHelperTray.exeexecutable
MD5:BCBD3121C98C1A2708A7E0F0F1A52446
SHA256:11B04456EABE1CBF65017632E88B57B01E280E79BA50B38114571456711850DF
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\System.Data.SQLite.dllexecutable
MD5:55C797383DBBBFE93C0FE3215B99B8EC
SHA256:5FAC5A9E9B8BBDAD6CF661DBF3187E395914CD7139E34B725906EFBB60122C0D
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\x64\SQLite.Interop.dllexecutable
MD5:56A504A34D2CFBFC7EAA2B68E34AF8AD
SHA256:9309FB2A3F326D0F2CC3F2AB837CFD02E4F8CB6B923B3B2BE265591FD38F4961
2184WinRAR.exeC:\Users\admin\Desktop\probablymalware\x86\SQLite.Interop.dllexecutable
MD5:8BE215ABF1F36AA3D23555A671E7E3BE
SHA256:83F332EA9535814F18BE4EE768682ECC7720794AEDC30659EB165E46257A7CAE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2656
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2328
DownloadHelperTray.exe
18.196.39.211:443
saedion.com
AMAZON-02
DE
unknown

DNS requests

Domain
IP
Reputation
saedion.com
  • 18.196.39.211
  • 35.156.11.55
unknown

Threats

No threats detected
No debug info