File name:

UWT5.zip

Full analysis: https://app.any.run/tasks/f5b69c27-8ef0-4734-ae35-aa40f0360cfb
Verdict: Malicious activity
Analysis date: April 03, 2022, 11:34:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

9737BB6660A9678E60133703140A7516

SHA1:

8FDAE8480CC3131E0A9E207F5E50128C79FE9FDA

SHA256:

52EBF0CF3D0F843829E5067A6FE623EF0A873280BE6539E8543B7771F9CA3222

SSDEEP:

6144:Mx4R9YWnpiDs9gHlQ0SPEKcHnrsTac3dtQ:Mx07pas6Q0SPLcHrc/3dtQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Ultimate Windows Tweaker 5.0.exe (PID: 1956)
      • Ultimate Windows Tweaker 5.0.exe (PID: 2496)
    • Loads dropped or rewritten executable

      • Ultimate Windows Tweaker 5.0.exe (PID: 2496)
      • SearchProtocolHost.exe (PID: 2380)
      • Explorer.EXE (PID: 1172)
  • SUSPICIOUS

    • Reads the computer name

      • Ultimate Windows Tweaker 5.0.exe (PID: 2496)
      • WinRAR.exe (PID: 556)
    • Checks supported languages

      • WinRAR.exe (PID: 556)
      • Ultimate Windows Tweaker 5.0.exe (PID: 2496)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 556)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 556)
  • INFO

    • Manual execution by user

      • Ultimate Windows Tweaker 5.0.exe (PID: 2496)
      • Ultimate Windows Tweaker 5.0.exe (PID: 1956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Ultimate Windows Tweaker v 5/ButtonExtended.dll
ZipUncompressedSize: 27136
ZipCompressedSize: 8102
ZipCRC: 0x1dd2eeee
ZipModifyDate: 2021:11:22 21:59:12
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs ultimate windows tweaker 5.0.exe no specs ultimate windows tweaker 5.0.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
556"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\UWT5.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2380"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1956"C:\Users\admin\Desktop\Ultimate Windows Tweaker v 5\Ultimate Windows Tweaker 5.0.exe" C:\Users\admin\Desktop\Ultimate Windows Tweaker v 5\Ultimate Windows Tweaker 5.0.exeExplorer.EXE
User:
admin
Company:
The Windows Club
Integrity Level:
MEDIUM
Description:
Ultimate Windows Tweaker 5.0
Exit code:
3221226540
Version:
5.0.0.0
Modules
Images
c:\users\admin\desktop\ultimate windows tweaker v 5\ultimate windows tweaker 5.0.exe
c:\windows\system32\ntdll.dll
2496"C:\Users\admin\Desktop\Ultimate Windows Tweaker v 5\Ultimate Windows Tweaker 5.0.exe" C:\Users\admin\Desktop\Ultimate Windows Tweaker v 5\Ultimate Windows Tweaker 5.0.exe
Explorer.EXE
User:
admin
Company:
The Windows Club
Integrity Level:
HIGH
Description:
Ultimate Windows Tweaker 5.0
Exit code:
0
Version:
5.0.0.0
Modules
Images
c:\users\admin\desktop\ultimate windows tweaker v 5\ultimate windows tweaker 5.0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1172C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
4 678
Read events
4 598
Write events
80
Delete events
0

Modification events

(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(556) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\UWT5.zip
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(556) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
2
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa556.34976\Ultimate Windows Tweaker v 5\Ultimate Windows Tweaker 5.0.exeexecutable
MD5:7EDAB19E27B582CD108BA100CF7E528B
SHA256:473E9EC53498DF18DDB84806EB317FBD5E47C00AA8962171D7FA5E5F011486C5
556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa556.34976\Ultimate Windows Tweaker v 5\Read This.txttext
MD5:98BB7F2BA514F117A0B2E26BEE6398A0
SHA256:240108F6DF10338070E63A20C7E06D5714C8F000E9BBE483E38F4F86BD3438EA
556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa556.34976\Ultimate Windows Tweaker v 5\Ultimate Windows Tweaker Home Page.urltext
MD5:0EA40DBAA0B8EB86782024A2F1B69349
SHA256:ED7043015D19340F4DF71802E81E54B7E38F5CF72BCCA4E20BD2C2CD5856DF42
556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa556.34976\Ultimate Windows Tweaker v 5\ButtonExtended.dllexecutable
MD5:D45CAB94CFB2D3DD1B7BBAD86090E896
SHA256:11692A5C5001628E294AE9E1146ABD4B4470E81F21883F80A7AF7FE6D197D44B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info