File name:

Delta V3.61 b_95795957.zip

Full analysis: https://app.any.run/tasks/7fea0d8f-4636-4abe-bcc8-a5fa22e3bb2c
Verdict: Malicious activity
Analysis date: October 26, 2024, 15:59:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

C98302E831CABF9838ED08CD7609E603

SHA1:

2AB4D7C279CF09DC46CD22C21A34ECFCB4CE2F23

SHA256:

597EA52CE7BC05C98347D38F3419B25DF68DD14E9317666E7F71FAEFFF800129

SSDEEP:

98304:wHntobDS5TEQDNPszENnysk250FJTP5xfdeohobHnl80dVO8r88zF/KE4kRZ907M:wmLLbA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5832)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Checks Windows Trust Settings

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Start notepad (likely ransomware note)

      • Delta V3.61 b_95795957.exe (PID: 6960)
  • INFO

    • Manual execution by a user

      • Delta V3.61 b_95795957.exe (PID: 3964)
      • Delta V3.61 b_95795957.exe (PID: 6960)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 5832)
      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5832)
    • Checks supported languages

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Reads the computer name

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Checks proxy server information

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Reads the machine GUID from the registry

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Reads the software policy settings

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Creates files or folders in the user directory

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Sends debugging messages

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Process checks computer location settings

      • Delta V3.61 b_95795957.exe (PID: 6960)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 5532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0008
ZipCompression: Deflated
ZipModifyDate: 2024:10:26 17:52:46
ZipCRC: 0xc63bf43b
ZipCompressedSize: 2690706
ZipUncompressedSize: 6014368
ZipFileName: Delta V3.61 b_95795957.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe delta v3.61 b_95795957.exe no specs delta v3.61 b_95795957.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3964"C:\Users\admin\Desktop\Delta V3.61 b_95795957.exe" C:\Users\admin\Desktop\Delta V3.61 b_95795957.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Download Manager
Exit code:
3221226540
Version:
1
Modules
Images
c:\users\admin\desktop\delta v3.61 b_95795957.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5532"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\link.txtC:\Windows\SysWOW64\notepad.exeDelta V3.61 b_95795957.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
5832"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Delta V3.61 b_95795957.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6960"C:\Users\admin\Desktop\Delta V3.61 b_95795957.exe" C:\Users\admin\Desktop\Delta V3.61 b_95795957.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Download Manager
Exit code:
0
Version:
1
Modules
Images
c:\users\admin\desktop\delta v3.61 b_95795957.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 180
Read events
3 160
Write events
20
Delete events
0

Modification events

(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Delta V3.61 b_95795957.zip
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5832) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:psize
Value:
80
Executable files
1
Suspicious files
16
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5832WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5832.20989\Delta V3.61 b_95795957.exeexecutable
MD5:15D1C495FF66BF7CEA8A6D14BFDF0A20
SHA256:61C2C4A5D7C14F77EE88871DED4CC7F1E49DAE3E4EF209504C66FEDF4D22DE42
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:7D05D5B380EA8818A5F22391CD7160D1
SHA256:291D4BB51747762CD37BEA5D3A448582EDDBB328AB9CD7D7F93ACCA4D88A18DC
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:AC8BC48B6912B01E2E39B3D740ADF28A
SHA256:67265117A772A65266A363D31156889EE722AA85993778B2DBF35B64864D91D0
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\174A7705F9EB36DBEC7A426BB49E6993_6AE44E5AA6164155452A8CAFF25FFD1Ebinary
MD5:F6D98D14B1EF2D2DCD6003FA88A1AF39
SHA256:C969C2CD6299AC5476E7C492F86A1BD8159A2C235B024803FA90BA809890EA53
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\174A7705F9EB36DBEC7A426BB49E6993_6AE44E5AA6164155452A8CAFF25FFD1Ebinary
MD5:0AE2EC444B29486DF5E16CA62182AFC9
SHA256:E167C19C0CA8D4789FB6CF472118A1227979608EC5234AFD72B1EDCC9D41D38D
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:E935BC5762068CAF3E24A2683B1B8A88
SHA256:A8ACCFCFEB51BD73DF23B91F4D89FF1A9EB7438EF5B12E8AFDA1A6FF1769E89D
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656binary
MD5:72D95ADB26B95AD5E0CB66949AA1AF13
SHA256:4BC56D94312D1A33F2B8CEABE7A6B160D962E9BE47FC50B8A54E7BD725DFF931
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F53EB4E574DE32C870452087D92DBEBB_6D263F6DDB7D7C531B75FF66E0A31295binary
MD5:E8F87797DA31D7580F75B7B12A94C16F
SHA256:161B11C90FD02550264DD83195793B79EB27AA53B0E200E3D2D0B046C16C0309
6960Delta V3.61 b_95795957.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\service[1].htmtext
MD5:F9D4655BBB31D3745D1D1671E3A09F4A
SHA256:C09DC2BA6150D341E056631E8FBC1A91AFCD6D87759BDE08E75A1FC506641203
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
30
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4836
RUXIMICS.exe
GET
200
2.21.23.191:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.21.23.191:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
2.21.23.191:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.41.213.121:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4836
RUXIMICS.exe
GET
200
23.41.213.121:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.41.213.121:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6960
Delta V3.61 b_95795957.exe
GET
200
172.217.23.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6960
Delta V3.61 b_95795957.exe
GET
200
172.217.23.195:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6960
Delta V3.61 b_95795957.exe
GET
200
172.217.168.195:80
http://o.pki.goog/s/wr3/P5k/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCED%2BZ8T58jUdVEjMJ%2F%2B4wrmA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4836
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
95.100.95.191:443
www.bing.com
Akamai International B.V.
FR
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.21.23.191:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4836
RUXIMICS.exe
2.21.23.191:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
www.bing.com
  • 95.100.95.191
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 172.217.168.206
whitelisted
crl.microsoft.com
  • 2.21.23.191
whitelisted
www.microsoft.com
  • 23.41.213.121
whitelisted
www.dlsft.com
  • 35.190.60.70
unknown
ocsp.pki.goog
  • 172.217.23.195
whitelisted
c.pki.goog
  • 172.217.23.195
whitelisted
o.pki.goog
  • 172.217.168.195
whitelisted

Threats

No threats detected
Process
Message
Delta V3.61 b_95795957.exe
Error: (undefined) has no property - value
Delta V3.61 b_95795957.exe
Delta V3.61 b_95795957.exe
Delta V3.61 b_95795957.exe
at initializeDynamicVariables (this://app/main.html(351))
Delta V3.61 b_95795957.exe
at getFileInfo.@307@46 (this://app/main.html(329))
Delta V3.61 b_95795957.exe
scanning node question /questions/question
Delta V3.61 b_95795957.exe
scanning node questions /questions
Delta V3.61 b_95795957.exe
scanning node question /questions/question
Delta V3.61 b_95795957.exe
scanning node question /questions/question
Delta V3.61 b_95795957.exe
scanning node question /questions/question