analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

windows-defender-remover-main.zip

Full analysis: https://app.any.run/tasks/0cf89b8e-fdb6-4c1b-b861-471f9db560ce
Verdict: Malicious activity
Analysis date: August 12, 2022, 22:11:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

30C49C1BBA1EF2A863CF09C4CB7191FA

SHA1:

04F4E72C213C5600F8CB08269CCD882F9AE3FE65

SHA256:

521C72BBE40AC284D236B5CD8D8B68663797E8CC1421E8039440C28EFAE3A1A1

SSDEEP:

24576:972TDMMAr37TyY/Wb6aQBGWdddgAt6mRAABX0PRRrvJLckK7YYzrJPsimEn9J7fA:Z2TDde3qQaQeA0aTBX0pxNckK7x2BE9e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 3052)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3836)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 3052)
    • Reads the computer name

      • WinRAR.exe (PID: 3052)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 3052)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3052)
    • Reads default file associations for system extensions

      • SearchProtocolHost.exe (PID: 3836)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: windows-defender-remover-main/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2022:08:12 10:23:04
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3052"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\windows-defender-remover-main.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
3836"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Total events
1 723
Read events
1 697
Write events
26
Delete events
0

Modification events

(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3052) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\windows-defender-remover-main.zip
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
5
Suspicious files
0
Text files
124
Unknown types
0

Dropped files

PID
Process
Filename
Type
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\Asm\x86\7zCrcOpt.asmtext
MD5:412CCDDDF83FD5761AB1F68C2A82A3B4
SHA256:9055ED868C506DE27D6E5D9B888C21E6596F37E230D9E4B5CD70B392B19EF870
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\Remover.asmtext
MD5:6B30368B06F59A89AEE757271066F6FC
SHA256:017107A28DAE03771458214314CD25ACF1A45CD1A5119EED0ACF66225BEDA3F7
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\C\AesOpt.ctext
MD5:34265AA8E1D49C29278EDDEC079DF5D8
SHA256:EC81F7DB69A64DD1BF934F7218021CA99C55CF90E5C99F17497DE27C15FB3513
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\Asm\x86\LzmaDecOpt.asmtext
MD5:DB366773C50D4E49F581A5B8DF09711C
SHA256:F3FE0B516029D73907054AA5EAFBD6FE91E14A0D3AE8E3D47B07837D5DCCB8E5
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\Asm\x86\7zAsm.asmtext
MD5:EB790FEAE92A085613F20BD9790FA2B6
SHA256:6C0DE6979E141E2B246F06AD2C9E12F781295D096871077E5C56C587F22EA7D9
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\C\7zStream.ctext
MD5:00E37DBE185BDD042FADBB72A291F1B3
SHA256:69E68EE180DAB14DA73EF3DC140AFE1D1E0317D5464AE64C3942A0ECA688488C
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\IObitUnlocker.dllexecutable
MD5:5DD95FE265D754DA1DA874BB738B3E02
SHA256:B3E02EEB8A6D9BA420DD4258929BFB5FB9DD25E0C80D913E3D082FCE64C65D5C
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\Asm\x86\LzFindOpt.asmtext
MD5:F080CF9AB4E32F6840E5B50C4CFC793D
SHA256:D745D1B1DBCF960937085D15CB744EE611509D6766C7F03C64DF21636A757BA5
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\Asm\x86\AesOpt.asmtext
MD5:9DCCC8403DEFC8916F39D1C82F584288
SHA256:6FEB2FA1AA1A4239A45147C9F5C0DF3D6935E0AE5597CB53208A0EFEA0D4F674
3052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3052.43315\windows-defender-remover-main\SFX_Content\C\7zVersion.htext
MD5:3BA7C20684FE4CF35CA70613C39224E5
SHA256:D128566AE1CB761C8166F594AC2F63F8052BE5AFE24CDEAAE982B4C567CDFD48
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info