File name:

Endorphin.zip

Full analysis: https://app.any.run/tasks/c8794b17-8834-4353-9557-5ca12becf553
Verdict: Malicious activity
Analysis date: June 16, 2025, 22:02:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

3980372D95941C723A2620BA0375F844

SHA1:

D5F510E7191F4BC78AA7E1437E4F54231A754779

SHA256:

4CA7A0B6900931784C1CC59FBB7E433500E5C53FE14FBBDAC1CA861B66E347A1

SSDEEP:

786432:vftLxklXN9LElc/fHPSC+LTwWPlF2Uaze9rq3AbdJZiFWF6Ju:XtlkWlcD+IWPL/azaq3AbdJwWFIu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 6128)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 6128)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 6128)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6128)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6128)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6128)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6128)
    • Reads the computer name

      • MpCmdRun.exe (PID: 2216)
    • Checks supported languages

      • MpCmdRun.exe (PID: 2216)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 2216)
    • Checks proxy server information

      • slui.exe (PID: 3636)
    • Reads the software policy settings

      • slui.exe (PID: 3636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2022:08:01 13:59:58
ZipCRC: 0xc066da1f
ZipCompressedSize: 51103
ZipUncompressedSize: 100264
ZipFileName: Endorphin.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe slui.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2216"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
2220\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3636C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3836C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Rar$Scan58773.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6128"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Endorphin.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
5 093
Read events
5 084
Write events
9
Delete events
0

Modification events

(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Endorphin.zip
(PID) Process:(6128) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
Executable files
133
Suspicious files
10
Text files
274
Unknown types
0

Dropped files

PID
Process
Filename
Type
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\python310.dll
MD5:
SHA256:
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\api-ms-win-crt-locale-l1-1-0.dllexecutable
MD5:EBC168D7D3EA7C6192935359B6327627
SHA256:C048A3D7AB951DCE1D6D3F5F497B50353F640A1787C6C65677A13C55C8E99983
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\java-runtime-gamma\windows\.versiontext
MD5:BFA46FF83F06906E7A6A81D6F3BD032A
SHA256:9BC67D46D70EB9ADA2F234C46CCF178F9A0AEA338F85A0E85C9686F75BB7BFF2
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\Endorphin.exeexecutable
MD5:7AA94603BE1F83C51661DF24C0F88EC3
SHA256:CB893F43012C270C23043563282E012F2552F7C2996F8951CB5672B197511BAB
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\vcruntime140.dllexecutable
MD5:B5DC0B0D1A5C343147969AF4FBFA28C4
SHA256:0205071C36C17F1EFBD70178C852CB7D49985C484202752B8704B7AC6B184E60
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\java-runtime-gamma\dsengine.dllexecutable
MD5:EB8F0AE9D91BA8F6CF4B7001B071727E
SHA256:4F037A4378C5C507E3330C6A18874E4600E5EABA8FD2887B61FBEEB6CA4B64C7
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\api-ms-win-crt-runtime-l1-1-0.dllexecutable
MD5:27C4A3BCC0F1DBA2DE4C2242CD489F3B
SHA256:315DED39D9E157CEC05D83711C09858C23602857C9D8C88BEEF121C24C43BE84
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\java-runtime-gamma\windows\de.qmbinary
MD5:AFABAFB8D5375FD28D5BDEFE543541B8
SHA256:47D9566871C51C9D9DAA1FDED81A649376B30EAB2AF63D9C1687814D7DF4A8DD
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\java-runtime-gamma\windows\java-runtime-gamma\bin\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:720DB2235C4193151FF8987F8A729135
SHA256:092B72832C47F9C4EDCDE61F1A111C20EB73452984E0A6109482DE74EB03C34D
6128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6128.25868\Endorphin.zip\bin\java-runtime-gamma\windows\java-runtime-gamma\bin\api-ms-win-core-fibers-l1-1-0.dllexecutable
MD5:EB065ED1B5CABDBB90E2403B8564778F
SHA256:BB2D740333AFAEA2A73A163F95FA102D018CCD68DEF28B6815A2BE0696AB57DB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
22
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1508
RUXIMICS.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1508
RUXIMICS.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1508
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1508
RUXIMICS.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
104.85.1.163:80
www.microsoft.com
AKAMAI-AS
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.41.90
whitelisted
www.microsoft.com
  • 104.85.1.163
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 20.42.65.89
whitelisted

Threats

No threats detected
No debug info