File name:

PatchCleaner.zip

Full analysis: https://app.any.run/tasks/b8f29c8d-d061-4bcf-88c6-3a22a2fd774e
Verdict: Malicious activity
Analysis date: June 01, 2024, 07:18:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

7FC853224EAFE62F87647074472DD021

SHA1:

80E50FEB7490B0B1AE49CD9EDC8101328282618F

SHA256:

4A9B727FF9837D13DBFB8332C4E7C2B3BE56E39FF2865BA91640A791EEC86C13

SSDEEP:

24576:Qp6+7eSjpT1LinUqcqml5VDYHBZsZPj1SCAg81wp9OgUs53Ut016Eb05EDNUIJob:Qp6+7eSjpT1LinUqcqmlzDYHBZsZPj1G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3972)
  • SUSPICIOUS

    • Writes binary data to a Stream object (SCRIPT)

      • cscript.exe (PID: 316)
      • cscript.exe (PID: 1796)
      • cscript.exe (PID: 1596)
    • Reads data from a binary Stream object (SCRIPT)

      • cscript.exe (PID: 316)
      • cscript.exe (PID: 1796)
      • cscript.exe (PID: 1596)
    • Reads settings of System Certificates

      • PatchCleaner.exe (PID: 372)
    • Reads the Internet Settings

      • PatchCleaner.exe (PID: 372)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 3972)
    • Adds/modifies Windows certificates

      • PatchCleaner.exe (PID: 372)
    • Checks whether a specific file exists (SCRIPT)

      • cscript.exe (PID: 1796)
      • cscript.exe (PID: 1596)
      • cscript.exe (PID: 316)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • cscript.exe (PID: 1796)
      • cscript.exe (PID: 1596)
      • cscript.exe (PID: 316)
    • Creates file in the systems drive root

      • PatchCleaner.exe (PID: 372)
    • Reads security settings of Internet Explorer

      • PatchCleaner.exe (PID: 372)
    • The process executes VB scripts

      • PatchCleaner.exe (PID: 372)
  • INFO

    • Manual execution by a user

      • PatchCleaner.exe (PID: 372)
      • PatchCleaner.exe (PID: 2072)
      • wmpnscfg.exe (PID: 1424)
    • Reads Environment values

      • PatchCleaner.exe (PID: 372)
    • Disables trace logs

      • PatchCleaner.exe (PID: 372)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3972)
    • Reads the machine GUID from the registry

      • PatchCleaner.exe (PID: 372)
    • Reads the computer name

      • PatchCleaner.exe (PID: 372)
      • wmpnscfg.exe (PID: 1424)
    • Checks supported languages

      • PatchCleaner.exe (PID: 372)
      • wmpnscfg.exe (PID: 1424)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 1796)
      • cscript.exe (PID: 1596)
      • cscript.exe (PID: 316)
    • Reads the software policy settings

      • PatchCleaner.exe (PID: 372)
    • Creates files or folders in the user directory

      • PatchCleaner.exe (PID: 372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2016:11:16 18:01:28
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: PatchCleaner/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe patchcleaner.exe no specs patchcleaner.exe cscript.exe no specs wmpnscfg.exe no specs cscript.exe no specs cscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
316"C:\Windows\System32\cscript.exe" //B //Nologo WMIProducts.vbsC:\Windows\System32\cscript.exePatchCleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
372"C:\Users\admin\Desktop\PatchCleaner\PatchCleaner.exe" C:\Users\admin\Desktop\PatchCleaner\PatchCleaner.exe
explorer.exe
User:
admin
Company:
HomeDev
Integrity Level:
HIGH
Description:
PatchCleaner
Version:
1.4.2.0
Modules
Images
c:\users\admin\desktop\patchcleaner\patchcleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1424"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1596"C:\Windows\System32\cscript.exe" //B //Nologo WMIProducts.vbsC:\Windows\System32\cscript.exePatchCleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1796"C:\Windows\System32\cscript.exe" //B //Nologo WMIProducts.vbsC:\Windows\System32\cscript.exePatchCleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2072"C:\Users\admin\Desktop\PatchCleaner\PatchCleaner.exe" C:\Users\admin\Desktop\PatchCleaner\PatchCleaner.exeexplorer.exe
User:
admin
Company:
HomeDev
Integrity Level:
MEDIUM
Description:
PatchCleaner
Exit code:
3221226540
Version:
1.4.2.0
Modules
Images
c:\users\admin\desktop\patchcleaner\patchcleaner.exe
c:\windows\system32\ntdll.dll
3972"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\PatchCleaner.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
18 807
Read events
18 676
Write events
124
Delete events
7

Modification events

(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3972) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PatchCleaner.zip
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3972) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
9
Suspicious files
0
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\HomeDev.Software.dllexecutable
MD5:4F4D6D18ADD67CF09FF4F1B241B2AB85
SHA256:6AF0BD80E5CB1922E4E71CCB7A4AB59E7B0A42EE712AF8536F8A35154C3034E3
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\PatchCleaner.exeexecutable
MD5:70C39AC8C162955E3A2DBC4798FE6BD4
SHA256:9E6181874BB298A2222B5A7077EFB1365664060A494E2BFDC04C9BE8A894F7F1
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\AppData\WMIProducts.vbstext
MD5:73D4F340C8523C46915CE32E175C0EDA
SHA256:59D2B20E6FFEC82EA9FB9735DD8265E8FE37D51F74BE34EEC6DBE30DDA326925
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\Microsoft.WindowsAPICodePack.Shell.dllexecutable
MD5:54FE9A2748C4A0F282D4EC91E3CADC16
SHA256:E6FA9D9E34FF3BF63CE782654B14E4B54A3ABD1022C87BC099032C2948157672
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\log4net.dllexecutable
MD5:28A9FD15CA084DE7388689ED4A6B6071
SHA256:676387FC6DCDA7F28270ACFABD65F79805BB7F6227E7EB5CBE0A23460231D2B7
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\AppData\Readme.rtftext
MD5:D23A54692CD542A3D2D59B2E05F75646
SHA256:833D0C5788BC7E69598C3BC5465684CB7F203E58BD71C0831B7102736A1AAA81
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\HomeDev.Common.dllexecutable
MD5:273D14E023CCFACD29EC3A698B5B0B97
SHA256:957BEB8683E8D33024606A7300F7400F06B9F70A2541D221B33C53520B1CD215
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\System.Windows.Controls.Input.Toolkit.dllexecutable
MD5:9722713E648F42B57299E9D2CF3D5C1A
SHA256:BC3A78EB4DF2FD5B39244FA0586CC0A82FE3D0E185D151E6C340C53072A61872
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\PatchCleaner.exe.configxml
MD5:5CBEBE6CFAFBEE5251EC24E7D71DD2FC
SHA256:0184DB13C199C31012AC282F3D4DD1F74A9C414A78012D96D326E9B4C3D05877
3972WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3972.15447\PatchCleaner\WPFToolkit.dllexecutable
MD5:195ED09E0B4F3B09EA4A3B67A0D3F396
SHA256:AEF9FCBB874FC82E151E32279330061F8F22A77C05F583A0CB5E5696654AC456
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
372
PatchCleaner.exe
GET
301
45.76.119.238:80
http://www.homedev.com.au/Common/CurrentVersion/727da176-50bb-452c-8db5-96ee0a573ed4
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
372
PatchCleaner.exe
45.76.119.238:80
www.homedev.com.au
AS-CHOOPA
AU
unknown
372
PatchCleaner.exe
45.76.119.238:443
www.homedev.com.au
AS-CHOOPA
AU
unknown

DNS requests

Domain
IP
Reputation
www.homedev.com.au
  • 45.76.119.238
unknown

Threats

No threats detected
No debug info