File name: | EzExploit Latest.zip |
Full analysis: | https://app.any.run/tasks/3641f97c-1955-4b47-ba37-4a618647ea6d |
Verdict: | Malicious activity |
Analysis date: | July 05, 2025, 23:44:56 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract, compression method=store |
MD5: | 5996C2043B7521C8E597C835A9AF9185 |
SHA1: | C353EF679FDF9DCB51CD4D20F7EA7BB49A03B9F9 |
SHA256: | 5A5EC4036808E7CA225BA397729B98B5CA4D1E8073B05E650CF50E53A66B7E2E |
SSDEEP: | 12288:CludmdD3o5EDN8mDDt9Dl0HwcLDxbE0DTsvLEydq:2udID3o5EDNjDt9DlywcDxbE0DTdn |
.zip | | | ZIP compressed archive (100) |
---|
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | - |
ZipCompression: | None |
ZipModifyDate: | 2025:04:15 20:29:38 |
ZipCRC: | 0x00000000 |
ZipCompressedSize: | - |
ZipUncompressedSize: | - |
ZipFileName: | EzExploit Latest/EzExploit/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
856 | java -jar snapshot.jar | C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.exe | — | cmd.exe | |||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 1 Version: 8.0.2710.9 Modules
| |||||||||||||||
1036 | java -jar snapshot.jar | C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.exe | — | cmd.exe | |||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 1 Version: 8.0.2710.9 Modules
| |||||||||||||||
1132 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | icacls.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1216 | "C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\Desktop\EzExploit Latest\EzExploit\snapshot.jar" | C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe | — | OpenWith.exe | |||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 1 Version: 8.0.2710.9 Modules
| |||||||||||||||
1700 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2040 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2428 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit Latest\EzExploit\start.bat" " | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2648 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4552 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit Latest\EzExploit\start.bat" " | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4572 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit Latest\EzExploit\start.bat" " | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\EzExploit Latest.zip | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (7052) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\config.yml | text | |
MD5:6231121A75F5D415FDC54C9E50DA3B1F | SHA256:FB6EC7C1A4B05F4F0725580156EA053ECE1C4730FE525FA60B4A897A4A549565 | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_list.jar | java | |
MD5:E3F0B6C0FF5ECED03B00C2AEA5B19916 | SHA256:008F4D48845C1CC12243FBF0BB8023CD42F2627CA9850FFE237FAD51920A7973 | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\espr\VdsPro.jar | compressed | |
MD5:49322DFBB0BEAED49C9DC64C94924FB0 | SHA256:B1BA51E4D0A434601B25CEA274E01D35085FF7D3422B58DCABCF6B0606A5089F | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\espr\RconFix.jar | java | |
MD5:BB0199FAD177D12AC638D2DA61F9A4DF | SHA256:87E3C42B1CDBA0B17983EE04ED656D94EBC2101923F4BA4F6DD96DEA83705751 | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\reconnect_yaml.jar | java | |
MD5:0832D6ABFFA9AF5A2ABFDFE389626A93 | SHA256:0F21068F22BC3BA87F598E417E1FFB6EA8A6886B44A0E16350045F5476C87731 | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_alert.jar | java | |
MD5:3053817C36BD1DFA1CE52C303D1328E6 | SHA256:56E2A960F11637F31DC30D652532950E834161D2AB36A10C0C57C9E445F8DACE | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\java\net\md_5\bungee\module\cmd\server\CommandServer.java | text | |
MD5:6E40F8CCD6CE7BEAD2376C595B86DB87 | SHA256:EDC15FA70BC5604A75286885B91D481B098401A8A08CBDCED747FCCCEDD3D1C9 | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\java\net\md_5\bungee\module\cmd\server\PluginServer.java | text | |
MD5:51889CCEE78F54E288B1B123574263A6 | SHA256:9C62C485CDAA6E9CBFF1DC7E56097678BEB62B8CF394A94C1275002F3E29D8ED | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_server.jar | java | |
MD5:A958A700C64F3B6C07BB0E5183B37807 | SHA256:A25B5B1C4EB732C149BBB070B97C9C60E2ACBB66916BFBA41D24378745282B6F | |||
7052 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_send.jar | java | |
MD5:B06755DEDD8D7D81F80C17013C47B16E | SHA256:5002C806A46F7736B85FB6ED1ECB7E555A8A284C01752CB3C6F58EBF4F6E34F6 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 23.55.104.172:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7060 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2180 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2180 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5708 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 23.55.104.172:80 | crl.microsoft.com | Akamai International B.V. | US | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
7060 | svchost.exe | 40.126.31.69:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7060 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |