File name:

usbmmidd_v2.zip

Full analysis: https://app.any.run/tasks/bdc748f5-5bb1-48ab-b8ea-51f4cfe23042
Verdict: Malicious activity
Analysis date: March 16, 2024, 08:31:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

D282869544C02F34F09F0202E9C5DD9F

SHA1:

477FAD66342DC42C5B88681BA823F400F75FAC49

SHA256:

629B51E9944762BAE73948171C65D09A79595CF4C771A82EBC003FBBA5B24F51

SSDEEP:

3072:OsBLxHK2MtFNrhz130iP/r6sPP+FBDYfq53GLWRT6vytRSlZv:ZBLxUdrhZ3V/esH+nSwRTUycZv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3936)
      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 3572)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 1792)
      • drvinst.exe (PID: 3616)
    • Creates a writable file in the system directory

      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 3572)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 1792)
      • drvinst.exe (PID: 3616)
    • Steals credentials from Web Browsers

      • taskhost.exe (PID: 3960)
      • setup.exe (PID: 3076)
    • Changes the autorun value in the registry

      • unregmp2.exe (PID: 2688)
      • regsvr32.exe (PID: 1352)
    • Create files in the Startup directory

      • regsvr32.exe (PID: 1352)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2960)
      • WinRAR.exe (PID: 3936)
      • cmd.exe (PID: 3252)
      • cmd.exe (PID: 2160)
      • cmd.exe (PID: 3384)
      • cmd.exe (PID: 2600)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3936)
      • deviceinstaller.exe (PID: 752)
      • deviceinstaller.exe (PID: 2408)
      • deviceinstaller.exe (PID: 3004)
      • deviceinstaller.exe (PID: 2776)
    • Application launched itself

      • cmd.exe (PID: 2960)
      • cmd.exe (PID: 3252)
      • cmd.exe (PID: 2160)
      • cmd.exe (PID: 3384)
      • ie4uinit.exe (PID: 4048)
      • rundll32.exe (PID: 4052)
      • setup.exe (PID: 3076)
      • cmd.exe (PID: 2600)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 3936)
    • Reads the Internet Settings

      • cmd.exe (PID: 2956)
      • cmd.exe (PID: 3828)
      • cmd.exe (PID: 3764)
      • cmd.exe (PID: 3776)
      • taskhost.exe (PID: 3960)
      • sipnotify.exe (PID: 2644)
      • ie4uinit.exe (PID: 4048)
      • rundll32.exe (PID: 4052)
      • rundll32.exe (PID: 3068)
      • ie4uinit.exe (PID: 2860)
      • ie4uinit.exe (PID: 3884)
      • sipnotify.exe (PID: 636)
      • cmd.exe (PID: 2632)
    • Checks Windows Trust Settings

      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 3572)
      • deviceinstaller.exe (PID: 2408)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • deviceinstaller.exe (PID: 3004)
      • drvinst.exe (PID: 3616)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 1792)
      • deviceinstaller.exe (PID: 2776)
    • Reads settings of System Certificates

      • deviceinstaller.exe (PID: 752)
      • deviceinstaller.exe (PID: 2408)
      • deviceinstaller.exe (PID: 3004)
      • sipnotify.exe (PID: 636)
      • deviceinstaller.exe (PID: 2776)
    • Executable content was dropped or overwritten

      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3572)
      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • drvinst.exe (PID: 3616)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 1792)
    • Creates files in the driver directory

      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 3572)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 1792)
      • drvinst.exe (PID: 3616)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2868)
      • taskhost.exe (PID: 3960)
      • EOSNotify.exe (PID: 2736)
    • The process executes via Task Scheduler

      • sipnotify.exe (PID: 2644)
      • sipnotify.exe (PID: 636)
      • ctfmon.exe (PID: 1712)
    • Reads Internet Explorer settings

      • ie4uinit.exe (PID: 4048)
    • Reads Microsoft Outlook installation path

      • ie4uinit.exe (PID: 4048)
    • Uses RUNDLL32.EXE to load library

      • ie4uinit.exe (PID: 4048)
      • rundll32.exe (PID: 4052)
    • Changes internet zones settings

      • ie4uinit.exe (PID: 4048)
    • Write to the desktop.ini file (may be used to cloak folders)

      • ie4uinit.exe (PID: 4048)
      • unregmp2.exe (PID: 2688)
      • regsvr32.exe (PID: 1352)
    • Changes default file association

      • unregmp2.exe (PID: 2688)
  • INFO

    • Reads the computer name

      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 3572)
      • deviceinstaller.exe (PID: 2036)
      • deviceinstaller.exe (PID: 2408)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • deviceinstaller.exe (PID: 3676)
      • deviceinstaller.exe (PID: 3004)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 3616)
      • drvinst.exe (PID: 1792)
      • deviceinstaller.exe (PID: 2584)
      • setup.exe (PID: 1556)
      • setup.exe (PID: 3716)
      • IMEKLMG.EXE (PID: 2128)
      • IMEKLMG.EXE (PID: 2040)
      • wmpnscfg.exe (PID: 3376)
      • IMEKLMG.EXE (PID: 348)
      • wmpnscfg.exe (PID: 2400)
      • IMEKLMG.EXE (PID: 1444)
      • wmpnscfg.exe (PID: 3744)
      • deviceinstaller.exe (PID: 2776)
      • wmpnscfg.exe (PID: 2420)
    • Checks supported languages

      • deviceinstaller.exe (PID: 1496)
      • drvinst.exe (PID: 3484)
      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3572)
      • deviceinstaller.exe (PID: 2036)
      • deviceinstaller.exe (PID: 2408)
      • drvinst.exe (PID: 2756)
      • deviceinstaller.exe (PID: 3676)
      • deviceinstaller.exe (PID: 2432)
      • deviceinstaller.exe (PID: 3196)
      • drvinst.exe (PID: 1888)
      • deviceinstaller.exe (PID: 3004)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 3616)
      • drvinst.exe (PID: 1792)
      • deviceinstaller.exe (PID: 2584)
      • deviceinstaller.exe (PID: 1392)
      • deviceinstaller.exe (PID: 948)
      • setup.exe (PID: 3076)
      • setup.exe (PID: 1556)
      • setup.exe (PID: 3716)
      • IMEKLMG.EXE (PID: 2040)
      • IMKRMIG.EXE (PID: 2468)
      • wmpnscfg.exe (PID: 3376)
      • IMEKLMG.EXE (PID: 2128)
      • IMEKLMG.EXE (PID: 348)
      • wmpnscfg.exe (PID: 2400)
      • IMEKLMG.EXE (PID: 1444)
      • wmpnscfg.exe (PID: 3744)
      • wmpnscfg.exe (PID: 2420)
      • deviceinstaller.exe (PID: 2776)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2052)
      • WinRAR.exe (PID: 3936)
    • Manual execution by a user

      • cmd.exe (PID: 3252)
      • taskmgr.exe (PID: 2432)
      • WinRAR.exe (PID: 2052)
      • WinRAR.exe (PID: 3616)
      • explorer.exe (PID: 2244)
      • cmd.exe (PID: 2160)
      • deviceinstaller.exe (PID: 3636)
      • deviceinstaller.exe (PID: 2732)
      • deviceinstaller.exe (PID: 3196)
      • deviceinstaller.exe (PID: 2432)
      • cmd.exe (PID: 3384)
      • deviceinstaller.exe (PID: 948)
      • ie4uinit.exe (PID: 4048)
      • deviceinstaller.exe (PID: 1392)
      • deviceinstaller.exe (PID: 1124)
      • ie4uinit.exe (PID: 2860)
      • unregmp2.exe (PID: 2688)
      • ie4uinit.exe (PID: 3884)
      • regsvr32.exe (PID: 1352)
      • chrmstp.exe (PID: 1368)
      • IMEKLMG.EXE (PID: 2128)
      • IMEKLMG.EXE (PID: 2040)
      • setup.exe (PID: 3076)
      • wmpnscfg.exe (PID: 3376)
      • wmpnscfg.exe (PID: 3744)
      • IMEKLMG.EXE (PID: 1444)
      • wmpnscfg.exe (PID: 2420)
      • IMEKLMG.EXE (PID: 348)
      • wmpnscfg.exe (PID: 2400)
      • cmd.exe (PID: 2600)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2052)
    • Create files in a temporary directory

      • taskmgr.exe (PID: 2432)
      • deviceinstaller.exe (PID: 752)
      • rundll32.exe (PID: 3516)
      • rundll32.exe (PID: 480)
    • Reads the software policy settings

      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3572)
      • drvinst.exe (PID: 3484)
      • deviceinstaller.exe (PID: 2408)
      • drvinst.exe (PID: 2756)
      • drvinst.exe (PID: 1888)
      • deviceinstaller.exe (PID: 3004)
      • drvinst.exe (PID: 3616)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 1792)
      • sipnotify.exe (PID: 636)
      • deviceinstaller.exe (PID: 2776)
    • Reads the machine GUID from the registry

      • deviceinstaller.exe (PID: 752)
      • drvinst.exe (PID: 3484)
      • drvinst.exe (PID: 3572)
      • drvinst.exe (PID: 2756)
      • deviceinstaller.exe (PID: 2408)
      • drvinst.exe (PID: 1888)
      • deviceinstaller.exe (PID: 3004)
      • drvinst.exe (PID: 3008)
      • drvinst.exe (PID: 3616)
      • drvinst.exe (PID: 1792)
      • deviceinstaller.exe (PID: 2776)
    • Creates files or folders in the user directory

      • rundll32.exe (PID: 3516)
      • rundll32.exe (PID: 480)
    • Reads security settings of Internet Explorer

      • ie4uinit.exe (PID: 4048)
      • sipnotify.exe (PID: 636)
    • Creates files in the program directory

      • ie4uinit.exe (PID: 4048)
      • chrmstp.exe (PID: 1368)
      • setup.exe (PID: 3076)
      • setup.exe (PID: 1556)
      • setup.exe (PID: 3716)
      • chrmstp.exe (PID: 980)
    • Checks proxy server information

      • ie4uinit.exe (PID: 4048)
    • Application launched itself

      • msedge.exe (PID: 1236)
      • chrmstp.exe (PID: 1368)
      • chrmstp.exe (PID: 980)
    • Process checks whether UAC notifications are on

      • IMEKLMG.EXE (PID: 2040)
      • IMEKLMG.EXE (PID: 2128)
      • IMEKLMG.EXE (PID: 348)
      • IMEKLMG.EXE (PID: 1444)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:05:13 11:16:44
ZipCRC: 0xc1e97d1b
ZipCompressedSize: 54351
ZipUncompressedSize: 142336
ZipFileName: usbmmidd_v2/deviceinstaller.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
245
Monitored processes
93
Malicious processes
20
Suspicious processes
10

Behavior graph

Click at the process to see the details
start winrar.exe deviceinstaller.exe no specs deviceinstaller.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs taskmgr.exe no specs explorer.exe no specs winrar.exe no specs winrar.exe cmd.exe no specs deviceinstaller.exe no specs cmd.exe no specs deviceinstaller.exe no specs deviceinstaller.exe drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe deviceinstaller.exe no specs cmd.exe no specs deviceinstaller.exe no specs deviceinstaller.exe cmd.exe no specs cmd.exe no specs deviceinstaller.exe no specs deviceinstaller.exe no specs deviceinstaller.exe drvinst.exe rundll32.exe no specs drvinst.exe cmd.exe no specs deviceinstaller.exe no specs deviceinstaller.exe no specs deviceinstaller.exe deviceinstaller.exe no specs deviceinstaller.exe deviceinstaller.exe no specs deviceinstaller.exe cmd.exe cmd.exe no specs deviceinstaller.exe no specs drvinst.exe rundll32.exe no specs drvinst.exe drvinst.exe cmd.exe no specs deviceinstaller.exe no specs deviceinstaller.exe no specs deviceinstaller.exe deviceinstaller.exe taskhost.exe rundll32.exe no specs sipnotify.exe ie4uinit.exe no specs ie4uinit.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs ie4uinit.exe no specs unregmp2.exe ie4uinit.exe no specs regsvr32.exe chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs setup.exe setup.exe no specs setup.exe no specs msedge.exe no specs msedge.exe no specs imeklmg.exe no specs imeklmg.exe no specs imkrmig.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs eosnotify.exe no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs cmd.exe no specs cmd.exe no specs deviceinstaller.exe no specs deviceinstaller.exe no specs deviceinstaller.exe

Process information

PID
CMD
Path
Indicators
Parent process
348"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
480rundll32.exe C:\Windows\system32\newdev.dll,pDiDeviceInstallNotification \\.\pipe\PNP_Device_Install_Pipe_1.{d3d16b73-77b0-46ea-b86f-8c8d095d4edf} "(null)"C:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
636C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
752"C:\Users\admin\Desktop\usbmmidd_v2\deviceinstaller.exe" install usbmmidd.inf usbmmiddC:\Users\admin\Desktop\usbmmidd_v2\deviceinstaller.exe
cmd.exe
User:
admin
Company:
Amyuni Technologies
Integrity Level:
HIGH
Description:
USB Mobile Monitor Device Installer
Exit code:
1
Version:
1, 0, 2, 9
Modules
Images
c:\users\admin\desktop\usbmmidd_v2\deviceinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
948"C:\Users\admin\Desktop\usbmmidd_v2\deviceinstaller.exe" C:\Users\admin\Desktop\usbmmidd_v2\deviceinstaller.exe
explorer.exe
User:
admin
Company:
Amyuni Technologies
Integrity Level:
HIGH
Description:
USB Mobile Monitor Device Installer
Exit code:
3
Version:
1, 0, 2, 9
Modules
Images
c:\users\admin\desktop\usbmmidd_v2\deviceinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
980"C:\Program Files\Google\Chrome\Application\109.0.5414.120\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=0C:\Program Files\Google\Chrome\Application\109.0.5414.120\Installer\chrmstp.exechrmstp.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Exit code:
73
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\109.0.5414.120\installer\chrmstp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\shell32.dll
1112"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Administrator\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Administrator\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Administrator\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc4,0xc8,0xcc,0x98,0xd4,0x698df598,0x698df5a8,0x698df5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1124"C:\Users\admin\Desktop\usbmmidd_v2\deviceinstaller.exe" C:\Users\admin\Desktop\usbmmidd_v2\deviceinstaller.exeexplorer.exe
User:
admin
Company:
Amyuni Technologies
Integrity Level:
MEDIUM
Description:
USB Mobile Monitor Device Installer
Exit code:
3221226540
Version:
1, 0, 2, 9
Modules
Images
c:\users\admin\desktop\usbmmidd_v2\deviceinstaller.exe
c:\windows\system32\ntdll.dll
1124"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1656 --field-trial-handle=1308,i,17087470133814600537,3156935407693453985,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1236"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --continue-active-setupC:\Program Files\Microsoft\Edge\Application\msedge.exesetup.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
66 249
Read events
64 316
Write events
1 650
Delete events
283

Modification events

(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3936) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\usbmmidd_v2.zip
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3936) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
46
Suspicious files
51
Text files
100
Unknown types
44

Dropped files

PID
Process
Filename
Type
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38062\usbmmidd_v2\usbmmIdd.inftxt
MD5:0A09DAB1C9A7F2E685CD7F8B5BD43EC0
SHA256:A8750CA15A86742F3012886C9932BB974158CD2D9779CF891C730D976A47726A
2432taskmgr.exeC:\Users\admin\AppData\Local\Temp\explorer.DMP
MD5:
SHA256:
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38062\usbmmidd_v2\deviceinstaller.exeexecutable
MD5:9DC576103B6C58580612C060310D5897
SHA256:918BE90CCCF70CCD20D42F564710335F1B6A7322ECEF8E432737B6A4D2743A6C
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38515\usbmmidd_v2\idd_instructions.txttext
MD5:DE538906C7A885B97C3D42F9B8EC4630
SHA256:4928AD8ACA39EEC287D5CEAAF13F0E44A29F519821B495898692A62ECE97C4C3
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38515\usbmmidd_v2\deviceinstaller.exeexecutable
MD5:9DC576103B6C58580612C060310D5897
SHA256:918BE90CCCF70CCD20D42F564710335F1B6A7322ECEF8E432737B6A4D2743A6C
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38062\usbmmidd_v2\idd_instructions.txttext
MD5:DE538906C7A885B97C3D42F9B8EC4630
SHA256:4928AD8ACA39EEC287D5CEAAF13F0E44A29F519821B495898692A62ECE97C4C3
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38062\usbmmidd_v2\deviceinstaller64.exeexecutable
MD5:41283E1240ACFC163F0E697073F07413
SHA256:E9BAA02CDAE921ACF0AAE4D8E8C29A4CDF4057AB61F9C60862B7CC439E2753F7
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38062\usbmmidd_v2\x64\usbmmIdd.dllexecutable
MD5:EE848C427145609D998725A38E7AD9AF
SHA256:DC135D675127113915A7E5AA9FE57C84EDAD6BE41D0890B265EF124AB26EA9E3
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38515\usbmmidd_v2\deviceinstaller64.exeexecutable
MD5:41283E1240ACFC163F0E697073F07413
SHA256:E9BAA02CDAE921ACF0AAE4D8E8C29A4CDF4057AB61F9C60862B7CC439E2753F7
3936WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3936.38062\usbmmidd_v2\Win32\usbmmIdd.dllexecutable
MD5:35B4CD69A125D475A9456E0FE43B6514
SHA256:07CEEBAECF203FEF39117576D8B49D803C0FB1F6C7AA5175A6EBAB110D54FED2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
11
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
636
sipnotify.exe
HEAD
200
23.197.138.118:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133550517640000000
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2644
sipnotify.exe
23.197.138.118:80
query.prod.cms.rt.microsoft.com
Akamai International B.V.
US
unknown
1116
svchost.exe
224.0.0.252:5355
unknown
636
sipnotify.exe
23.197.138.118:80
query.prod.cms.rt.microsoft.com
Akamai International B.V.
US
unknown

DNS requests

Domain
IP
Reputation
query.prod.cms.rt.microsoft.com
  • 23.197.138.118
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info