| File name: | Public.zip |
| Full analysis: | https://app.any.run/tasks/6cfe26b0-3647-499b-8e3d-0f64e38d769a |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | June 05, 2024, 20:09:52 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=store |
| MD5: | BE56464FF1C0B25A7614DBD7EAE2A0D6 |
| SHA1: | A7DE58A79B099BED8069DA81631AD7953526A92D |
| SHA256: | 63F0DB814407BA78D6357C41BA1AB72CC202E0C1FBE1E5FFDE04449454BBD37F |
| SSDEEP: | 98304:e4Vz5GyTL/KDvwcaTAgwWsiart3A2PeQCyQveE6QwmktpvMRJhhP7R3JAuHAV2Mu:XZOEM9xbYcuhp |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:06:06 05:08:06 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | Public/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1500 | GSW32.EXE newgame | C:\Users\admin\Desktop\Public\GSW32.EXE | cmd.exe | ||||||||||||
User: admin Company: Bits Per Second Ltd Integrity Level: MEDIUM Description: Graphics Server Version: 5.10.0000 Modules
| |||||||||||||||
| 2040 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\Public\1.bat" " | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3420 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5356 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Public.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
| Operation: | write | Name: | VerInfo |
Value: 005B050027BFCC5D84B7DA01 | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Public.zip | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (5356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5356 | WinRAR.exe | C:\USERS\ADMIN\APPDATA\ROAMING\WINRAR\VERSION.DAT | binary | |
MD5:2D56B1A454DA2B0C68A591B3EF7621EE | SHA256:AD46782BB27D3AA69953CF090E2A5C8942F4B9135CA4318F0C996171EC50F225 | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\__MACOSX\._Public | ad | |
MD5:4F532927C338FF83BFA90548F1E9F9C0 | SHA256:271125E8CD1BFB42AFD04A66740212048B81254F3788ADB6F8B2688580C50746 | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\__MACOSX\Public\GBPPKVJOT\._RBGUIFramework.dll | ad | |
MD5:5EFFCFC0B60D7A5A8AE49904587A84F5 | SHA256:94F966ADC0AF1F866E01E8C3790DED9690700E001CDDF2FFEE1F64B14998295C | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\Public\GBPPKVJOT\drivespan.dll | executable | |
MD5:4A44A85791C006E05DD13B9FEF62A288 | SHA256:5503F926631AEC5BC21E4E2B698A698B243521A2F62F5FF24DDA6B6F9C9F2D76 | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\__MACOSX\Public\GBPPKVJOT\._KTEPerUserOptions.exe | ad | |
MD5:5EFFCFC0B60D7A5A8AE49904587A84F5 | SHA256:94F966ADC0AF1F866E01E8C3790DED9690700E001CDDF2FFEE1F64B14998295C | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\__MACOSX\Public\._GSW32.EXE | ad | |
MD5:5EFFCFC0B60D7A5A8AE49904587A84F5 | SHA256:94F966ADC0AF1F866E01E8C3790DED9690700E001CDDF2FFEE1F64B14998295C | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\Public\GBPPKVJOT\Transfer.exe | executable | |
MD5:5C5B7B316BF8DE96E811E4C0443D9664 | SHA256:A10C24C6F02363CAFF783FE2ADCA9FE7D2826F25BF302AC343914CD971E904BD | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\__MACOSX\Public\GBPPKVJOT\._DAQDeviceControl.exe | ad | |
MD5:5EFFCFC0B60D7A5A8AE49904587A84F5 | SHA256:94F966ADC0AF1F866E01E8C3790DED9690700E001CDDF2FFEE1F64B14998295C | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\Public\GBPPKVJOT\KTEMain32.dll | executable | |
MD5:D9E43FDCB1848C89F06F4BD9EA389F27 | SHA256:995D22EDE53BA9243EA82AB6E166DF240880759CC9160ACC6A1EE9EFB8DB591C | |||
| 5356 | WinRAR.exe | C:\Users\admin\Desktop\__MACOSX\Public\._GBPPKVJOT | ad | |
MD5:4F532927C338FF83BFA90548F1E9F9C0 | SHA256:271125E8CD1BFB42AFD04A66740212048B81254F3788ADB6F8B2688580C50746 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2868 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | — | — | unknown |
2828 | svchost.exe | GET | 200 | 23.219.78.213:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?59087454e37d4481 | unknown | — | — | unknown |
2828 | svchost.exe | GET | 200 | 23.219.78.213:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?c5ad0c81702e938e | unknown | — | — | unknown |
2828 | svchost.exe | GET | 200 | 23.219.78.213:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?ba6f1cb668fab3fd | unknown | — | — | unknown |
1088 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4552 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
3112 | svchost.exe | 2.20.72.213:443 | fs.microsoft.com | AKAMAI-AS | AT | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2868 | OfficeClickToRun.exe | 20.42.65.90:443 | self.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
2868 | OfficeClickToRun.exe | 192.229.221.95:80 | — | EDGECAST | US | whitelisted |
1500 | GSW32.EXE | 103.159.132.80:443 | — | Gigabit Hosting Sdn Bhd | MY | unknown |
2828 | svchost.exe | 23.219.78.213:80 | ctldl.windowsupdate.com | CLARO S.A. | BR | unknown |
1500 | GSW32.EXE | 37.120.222.19:443 | — | M247 Ltd | DE | unknown |
1500 | GSW32.EXE | 172.66.43.185:443 | www.domains4bitcoins.com | CLOUDFLARENET | US | unknown |
2844 | svchost.exe | 20.189.173.8:443 | v20.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
Domain | IP | Reputation |
|---|---|---|
fs.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
www.domains4bitcoins.com |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
dns.msftncsi.com |
| shared |
v20.events.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Microsoft Connection Test |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] ToneShell FakeTLS Check-In (APT Mustang Panda / Earth Preta) |
1500 | GSW32.EXE | Generic Protocol Command Decode | SURICATA HTTP request header invalid |