File name:

unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.7z

Full analysis: https://app.any.run/tasks/b7e82692-a70d-4dea-acae-ea4e71a8f5b2
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 15, 2025, 19:07:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

520D46A6E6ADB225823AFA174B88854A

SHA1:

7FABB5EC7412E8927DAAF3A5E1B46E993FB337A9

SHA256:

5A50D78F4C1EBBFE7765280CC6DA45681E8BD264A23D685B0EB5B254D1CDA709

SSDEEP:

1536:0A3487xvFJDVQODA9O/XYwOXBVanDW3KCmjv8Bj:4+dJGOU0VO2nDoKvjkBj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 1760)
    • Changes the autorun value in the registry

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • Steals credentials from Web Browsers

      • opera.exe (PID: 2096)
      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • Reads security settings of Internet Explorer

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
      • opera.exe (PID: 2096)
    • Reads the Internet Settings

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
      • opera.exe (PID: 2096)
    • Starts CMD.EXE for commands execution

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • Executing commands from a ".bat" file

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • There is functionality for taking screenshot (YARA)

      • opera.exe (PID: 2096)
    • Starts itself from another location

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
  • INFO

    • Manual execution by a user

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1760)
    • Checks supported languages

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
      • opera.exe (PID: 2096)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1760)
      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • Creates files or folders in the user directory

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
    • Reads the computer name

      • unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe (PID: 1028)
      • opera.exe (PID: 2096)
    • Reads the machine GUID from the registry

      • opera.exe (PID: 2096)
    • Checks proxy server information

      • opera.exe (PID: 2096)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2009:08:03 05:17:37+00:00
ArchivedFileName: unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe cmd.exe no specs opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
1028"C:\Users\admin\Desktop\unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe" C:\Users\admin\Desktop\unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
1760"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2096"C:\Users\admin\AppData\Roaming\Opera\Opera\opera.exe" C:\Users\admin\AppData\Roaming\Opera\Opera\opera.exe
unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\opera\opera\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
2412C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\clean.bat" "C:\Windows\System32\cmd.exeunknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
4 101
Read events
4 043
Write events
52
Delete events
6

Modification events

(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1760) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.7z
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1760) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
2
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1760WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1760.38030\unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exeexecutable
MD5:53A08DC75E0F574795E313B310FFFF77
SHA256:7D91E77BA58ACBEA9EB65A773B8BDA9BA346930B10F37A189F5BAC1E323137EE
1028unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opera.exeexecutable
MD5:53A08DC75E0F574795E313B310FFFF77
SHA256:7D91E77BA58ACBEA9EB65A773B8BDA9BA346930B10F37A189F5BAC1E323137EE
1028unknown_44e232fbaf7bc0f10bc4edc34bf70ff7890ec991.exeC:\Users\admin\Desktop\clean.battext
MD5:DA0170FB6F9508BBFB5E6338340CA814
SHA256:665EDA87892020D00C999373EB63C7B7AD2C45A558FA31DA01034E3C6CC1CFA4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
13
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2096
opera.exe
POST
404
49.13.77.253:80
http://tuiywif.info/index.php
unknown
unknown
2096
opera.exe
POST
404
49.13.77.253:80
http://gbuoieu.info/index.php
unknown
unknown
2096
opera.exe
POST
404
49.13.77.253:80
http://igymgcv.info/index.php
unknown
unknown
2096
opera.exe
POST
404
49.13.77.253:80
http://bamnzov.info/index.php
unknown
unknown
2096
opera.exe
POST
404
49.13.77.253:80
http://hwfdfev.info/index.php
unknown
unknown
2096
opera.exe
POST
404
49.13.77.253:80
http://pawqcfk.info/index.php
unknown
unknown
2096
opera.exe
POST
404
49.13.77.253:80
http://hcdgydm.info/index.php
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
2096
opera.exe
49.13.77.253:80
tuiywif.info
Hetzner Online GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
tuiywif.info
  • 49.13.77.253
unknown
gbuoieu.info
  • 49.13.77.253
unknown
igymgcv.info
  • 49.13.77.253
unknown
bamnzov.info
  • 49.13.77.253
unknown
hwfdfev.info
  • 49.13.77.253
unknown
hcdgydm.info
  • 49.13.77.253
unknown
pawqcfk.info
  • 49.13.77.253
unknown

Threats

No threats detected
No debug info