File name:

ToxidPP.zip

Full analysis: https://app.any.run/tasks/45d88ae9-7584-4371-b04e-6bc5144158e2
Verdict: Malicious activity
Analysis date: October 20, 2023, 16:02:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

E4C9B38ACD1F5495364020B0B29249EC

SHA1:

0CEE5B2671795C71C54BE216635D8F62E16F517B

SHA256:

523C187C70D392ECB8B0129EF0303C0C5B7C163FFC55D2E3543A99406C806229

SSDEEP:

24576:8ILwY16wAcOpa1S+A21x2kVDOkFHk8bC1H76LGirtKWqmeYmCUg:8ILwY16wAcOpa18272kVDRFHk8bC1H7Q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ToxidPP.exe (PID: 3488)
      • ToxidPP.exe (PID: 1824)
      • ToxidPP.exe (PID: 1604)
      • ToxidPP.exe (PID: 432)
    • Loads dropped or rewritten executable

      • ToxidPP.exe (PID: 1824)
      • ToxidPP.exe (PID: 1604)
  • SUSPICIOUS

    • The process executes via Task Scheduler

      • sipnotify.exe (PID: 1720)
    • Reads the Internet Settings

      • sipnotify.exe (PID: 1720)
      • runonce.exe (PID: 1240)
    • Application launched itself

      • WerFault.exe (PID: 664)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 1720)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 2760)
      • ToxidPP.exe (PID: 3488)
      • ToxidPP.exe (PID: 1824)
      • runonce.exe (PID: 1240)
      • IMEKLMG.EXE (PID: 2652)
      • wmpnscfg.exe (PID: 4084)
      • wmpnscfg.exe (PID: 2804)
      • ToxidPP.exe (PID: 432)
      • IMEKLMG.EXE (PID: 2684)
      • ToxidPP.exe (PID: 1604)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2760)
      • ToxidPP.exe (PID: 1824)
      • IMEKLMG.EXE (PID: 2684)
      • IMEKLMG.EXE (PID: 2652)
      • wmpnscfg.exe (PID: 4084)
      • wmpnscfg.exe (PID: 2804)
      • ToxidPP.exe (PID: 1604)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2760)
      • ToxidPP.exe (PID: 1824)
      • wmpnscfg.exe (PID: 4084)
      • wmpnscfg.exe (PID: 2804)
      • ToxidPP.exe (PID: 1604)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2760)
      • ToxidPP.exe (PID: 1824)
      • IMEKLMG.EXE (PID: 2684)
      • IMEKLMG.EXE (PID: 2652)
      • wmpnscfg.exe (PID: 4084)
      • wmpnscfg.exe (PID: 2804)
      • ToxidPP.exe (PID: 1604)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2980)
    • Reads the time zone

      • runonce.exe (PID: 1240)
    • Create files in a temporary directory

      • WerFault.exe (PID: 2100)
    • Process checks are UAC notifies on

      • IMEKLMG.EXE (PID: 2684)
      • IMEKLMG.EXE (PID: 2652)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:04:22 00:57:26
ZipCRC: 0xbd216e97
ZipCompressedSize: 49259
ZipUncompressedSize: 701978
ZipFileName: Newtonsoft.Json.xml
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
100
Monitored processes
15
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs wmpnscfg.exe no specs searchprotocolhost.exe no specs toxidpp.exe no specs toxidpp.exe sipnotify.exe no specs runonce.exe werfault.exe no specs werfault.exe no specs imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs toxidpp.exe no specs toxidpp.exe

Process information

PID
CMD
Path
Indicators
Parent process
432"C:\Users\admin\Desktop\ToxidPP.exe" C:\Users\admin\Desktop\ToxidPP.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ToxidPP
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\toxidpp.exe
c:\windows\system32\ntdll.dll
664"C:\Windows\System32\WerFault.exe" -k -rqC:\Windows\System32\WerFault.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\werfault.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1240runonce.exe /ExplorerC:\Windows\System32\runonce.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run Once Wrapper
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runonce.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1604"C:\Users\admin\Desktop\ToxidPP.exe" C:\Users\admin\Desktop\ToxidPP.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
ToxidPP
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\toxidpp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1720C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
1824"C:\Users\admin\Desktop\ToxidPP.exe" C:\Users\admin\Desktop\ToxidPP.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
ToxidPP
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\toxidpp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2100C:\Windows\System32\WerFault.exe -k -qC:\Windows\System32\WerFault.exeWerFault.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2132"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2652"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
2684"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\userenv.dll
Total events
5 598
Read events
5 539
Write events
44
Delete events
15

Modification events

(PID) Process:(2980) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2760) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{85A8AA2E-2289-431B-915B-E20873E7BA20}\{7FCDC15D-7595-4D40-8625-11A4A734F080}
Operation:delete keyName:(default)
Value:
(PID) Process:(2760) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{85A8AA2E-2289-431B-915B-E20873E7BA20}
Operation:delete keyName:(default)
Value:
Executable files
3
Suspicious files
8
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
2100WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_08343ba1\Report.wer
MD5:
SHA256:
2980WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2980.26301\ToxidPP.exeexecutable
MD5:DFC559E2A5994DBCB4CCFE080FC28CAF
SHA256:9DBAB7AF2FC3FEB7CF356F055A67469212655ED65613FA854AF16BF4DAEDA244
1720sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\microsoft-logo.pngimage
MD5:B7C73A0CFBA68CC70C35EF9C63703CE4
SHA256:1D8B27A0266FF526CF95447F3701592A908848467D37C09A00A2516C1F29A013
2100WerFault.exeC:\Users\admin\AppData\Local\Temp\WER-8578-0.sysdata.xmlxml
MD5:B7E38B5A83FC38998EEA25968B42554E
SHA256:5CB3B571D015C8DF84D1842C2D5E5F872829FBEF998EE36BC67C4A38342B95DF
2980WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2980.26301\Newtonsoft.Json.dllexecutable
MD5:4DF6C8781E70C3A4912B5BE796E6D337
SHA256:3598CCCAD5B535FEA6F93662107A4183BFD6167BF1D0F80260436093EDC2E3AF
2980WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2980.26301\DiscordRPC.dllexecutable
MD5:AD463F573775C43A561ADE842C41B0E8
SHA256:6A18DFC8BDC6030787B5814C76B8663DBE5B8CA469BEB65A2CA9F5731FA1906F
2100WerFault.exeC:\Users\admin\AppData\Local\Temp\WER3B0A.tmp.cab.tmpbinary
MD5:8BA028678E2B812B0A124ADC1BAB3ECE
SHA256:9C43C0DF390C39D64F1E5E8E9E032029A634F0B5CE12B24DE2D20A38BF8A0CEC
2980WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2980.26301\DiscordRPC.xmlxml
MD5:07DCEB643B73DD3B700DCF82E1D6663A
SHA256:24FC42B9582988ED65E5F003AA8E44358691A58F5DB6A0E8821560C0FE9B2EE4
1240runonce.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etlbinary
MD5:74AC562566DC7AFC6D904057A86FA567
SHA256:18DC0E510A268FCF9ED92A56E6F1B4007D201A697FDD7A6EFDEFE6C24EC1636D
1720sipnotify.exeC:\Users\admin\AppData\Local\microsoft\windows\SipNotify\eoscontent\en-us.htmlhtml
MD5:9752942B57692148B9F614CF4C119A36
SHA256:E31B834DD53FA6815F396FC09C726636ABF98F3367F0CF1590EF5EB3801C75D1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
10
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
88.221.61.151:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133422950263900000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1088
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
224.0.0.252:5355
unknown
88.221.61.151:80
query.prod.cms.rt.microsoft.com
AKAMAI-AS
DE
unknown
239.255.255.250:1900
unknown

DNS requests

Domain
IP
Reputation
query.prod.cms.rt.microsoft.com
  • 88.221.61.151
whitelisted

Threats

No threats detected
No debug info