download:

Diagnostic_v2.0.4.2_AllInOne_20190502_V3.zip

Full analysis: https://app.any.run/tasks/b17e1bf6-6f49-4226-a4b2-6b40f180cea3
Verdict: Malicious activity
Analysis date: October 06, 2019, 16:52:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

82BEC4DCEE57D76DFEFDF1F2DB124465

SHA1:

1656FCD0DEAF0AA0C524FA6B2955F122B3AC56CD

SHA256:

6AADF4A004FE39F9CD390519D74A944929E67B44E4BAE662FA599BF00DBA57C0

SSDEEP:

393216:kwMgD8He2Ga0dmkH2lwyorTrTDnZh5+msYmngf8Qx7jouSm2vLyDDnEM8aGO4EpS:tMgD8He2GndmkH2lwyYTrTDnZ/+msYm1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1844)
      • setup.exe (PID: 3268)
      • 8169DiagV2.exe (PID: 1376)
    • Application was dropped or rewritten from another process

      • setup.exe (PID: 912)
      • setup.exe (PID: 3268)
      • OEMINF.EXE (PID: 2908)
      • DEVCON.EXE (PID: 4040)
      • DEVCON.EXE (PID: 3100)
      • DEVCON.EXE (PID: 2096)
      • DEVCON.EXE (PID: 2844)
      • 8169DiagV2.exe (PID: 1376)
      • rtkbind.exe (PID: 2000)
      • rtkbind.exe (PID: 3776)
      • rtkbind.exe (PID: 2024)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3620)
      • setup.exe (PID: 3268)
      • DrvInst.exe (PID: 1536)
      • rtkbind.exe (PID: 2000)
      • DrvInst.exe (PID: 1420)
      • rtkbind.exe (PID: 2024)
      • rtkbind.exe (PID: 3776)
    • Executed as Windows Service

      • vssvc.exe (PID: 3340)
    • Searches for installed software

      • setup.exe (PID: 3268)
    • Executed via COM

      • DrvInst.exe (PID: 2940)
      • DrvInst.exe (PID: 1536)
      • DrvInst.exe (PID: 2952)
      • DrvInst.exe (PID: 1420)
      • DrvInst.exe (PID: 3232)
      • DrvInst.exe (PID: 2796)
    • Creates files in the program directory

      • OEMINF.EXE (PID: 2908)
      • 8169DiagV2.exe (PID: 1376)
      • setup.exe (PID: 3268)
    • Creates a software uninstall entry

      • setup.exe (PID: 3268)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 1536)
      • rtkbind.exe (PID: 2000)
      • DrvInst.exe (PID: 2952)
      • rtkbind.exe (PID: 3776)
      • DrvInst.exe (PID: 1420)
      • DrvInst.exe (PID: 2796)
      • DrvInst.exe (PID: 3232)
      • rtkbind.exe (PID: 2024)
    • Removes files from Windows directory

      • rtkbind.exe (PID: 2000)
      • DrvInst.exe (PID: 1536)
      • DrvInst.exe (PID: 2796)
      • DrvInst.exe (PID: 2952)
      • rtkbind.exe (PID: 3776)
      • DrvInst.exe (PID: 1420)
      • DrvInst.exe (PID: 3232)
      • rtkbind.exe (PID: 2024)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 1536)
      • rtkbind.exe (PID: 2000)
      • DrvInst.exe (PID: 2952)
      • rtkbind.exe (PID: 3776)
      • DrvInst.exe (PID: 1420)
      • DrvInst.exe (PID: 2796)
      • DrvInst.exe (PID: 3232)
      • rtkbind.exe (PID: 2024)
  • INFO

    • Modifies the open verb of a shell class

      • rundll32.exe (PID: 1496)
    • Manual execution by user

      • setup.exe (PID: 912)
      • setup.exe (PID: 3268)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3340)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (44.4)
.kmz | Google Earth saved working session (33.3)
.zip | ZIP compressed archive (22.2)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2019:05:29 11:25:26
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
63
Monitored processes
21
Malicious processes
12
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start rundll32.exe no specs winrar.exe searchprotocolhost.exe no specs setup.exe no specs setup.exe vssvc.exe no specs drvinst.exe no specs oeminf.exe no specs devcon.exe no specs devcon.exe no specs devcon.exe no specs devcon.exe no specs 8169diagv2.exe no specs rtkbind.exe drvinst.exe rtkbind.exe drvinst.exe no specs drvinst.exe no specs rtkbind.exe drvinst.exe drvinst.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
912"C:\Users\admin\Desktop\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\setup.exe" C:\Users\admin\Desktop\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\setup.exeexplorer.exe
User:
admin
Company:
Realtek
Integrity Level:
MEDIUM
Description:
InstallScript Setup Launcher Unicode
Exit code:
3221226540
Version:
2.0.4.2
Modules
Images
c:\users\admin\desktop\diagnostic_v2.0.4.2_allinone_20190502_latest_v3_for_release\setup.exe
c:\systemroot\system32\ntdll.dll
1376"C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\8169DiagV2.exe" C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\8169DiagV2.exesetup.exe
User:
admin
Company:
Realtek Semiconductor Corporation.
Integrity Level:
HIGH
Description:
Realtek NIC Diagnostic Utility
Exit code:
0
Version:
2, 0, 4, 2
Modules
Images
c:\program files\realtek\realtek ethernet diagnostic utility\8169diagv2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\program files\realtek\realtek ethernet diagnostic utility\rtdiaglibv2.dll
1420DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{6dc51620-613d-5cc6-1eb8-7c25bd23ce33}\rtteampt.inf" "0" "646b10b97" "000004DC" "WinSta0\Default" "000004B0" "208" "C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\rtteampt\win7"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1496"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\Diagnostic_v2.0.4.2_AllInOne_20190502_V3.zip.xpiC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1536DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{32bcaead-1ba9-17c0-59a6-3a541c06230f}\rtndpt60.inf" "0" "654eb810f" "000004B0" "WinSta0\Default" "00000270" "208" "C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\protdrv\win7"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1844"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2000rtkbind.exe /i /f PROTDRV\WIN7\RtNdPt60.inf /p RTK_RtNdPt60C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\rtkbind.exe
8169DiagV2.exe
User:
admin
Company:
Realtek Semiconductor Corp.
Integrity Level:
HIGH
Description:
RtkBind Application
Exit code:
0
Version:
1, 0, 0, 9
Modules
Images
c:\program files\realtek\realtek ethernet diagnostic utility\rtkbind.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2024rtkbind.exe /i /f RtTeamPt\WIN7\RtTeamPt.inf /p RTK_TEAMPTC:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\rtkbind.exe
8169DiagV2.exe
User:
admin
Company:
Realtek Semiconductor Corp.
Integrity Level:
HIGH
Description:
RtkBind Application
Exit code:
0
Version:
1, 0, 0, 9
Modules
Images
c:\program files\realtek\realtek ethernet diagnostic utility\rtkbind.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2096"C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\DEVCON.EXE" remove RTK_VLANMPC:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\DEVCON.EXEOEMINF.EXE
User:
admin
Company:
Windows (R) Codename Longhorn DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
6.0.6000.16386 built by: WinDDK
Modules
Images
c:\program files\realtek\realtek ethernet diagnostic utility\devcon.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2796DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{4ebf730f-f0a8-4616-fc5f-255c542c7849}\rtvlanpt.inf" "0" "6abd3168b" "00000270" "WinSta0\Default" "000005BC" "208" "C:\Program Files\Realtek\Realtek Ethernet Diagnostic Utility\rtvlanpt\win7"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
2 754
Read events
2 036
Write events
684
Delete events
34

Modification events

(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\NOTEPAD.EXE
Value:
Notepad
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\PROGRA~1\MICROS~1\Office14\OIS.EXE
Value:
Microsoft Office 2010
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Value:
Microsoft Word
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
01000000070000000200000009000000080000000000000006000000030000000500000004000000FFFFFFFF
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0
Operation:writeName:MRUListEx
Value:
0100000000000000040000000200000003000000FFFFFFFF
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\35\Shell
Operation:writeName:SniffedFolderType
Value:
Generic
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1
Operation:writeName:5
Value:
50003100000000001C4D655F100057696E52415200003A0008000400EFBE1C4DBC5E1C4D655F2A0000000AC1000000000C000000000000000000000000000000570069006E00520041005200000016000000
(PID) Process:(1496) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1
Operation:writeName:MRUListEx
Value:
050000000400000003000000010000000000000002000000FFFFFFFF
Executable files
64
Suspicious files
101
Text files
259
Unknown types
47

Dropped files

PID
Process
Filename
Type
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0405.initext
MD5:9FB56981DD06830B30CD9CADF54270D6
SHA256:9302A3E694DE8CC84947B41350A7F8AE0880E5D2F3FDBD67CD56444BF0BC3A43
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0402.initext
MD5:6F82F2EFC4A5DA513E0222F47FB5FC2D
SHA256:BBE199DE9BB5156C543BC466DE606719389C93BCBFF2815D9FAE01659A415BD0
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0406.initext
MD5:7C6AD5705B8C076697C1CA0EB6229F6F
SHA256:FAD1187DF234B8B2B27C3F866B218036E377469871E0816FA6CC38C391D5AD93
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0407.initext
MD5:9A62DA6C523506355C1BF1B30DB73EDD
SHA256:8B5D7BC395D0D6980299702D0573C6019FEFEA92EB98701D1894A5623B2691A0
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x040b.initext
MD5:48DD00B7D72FB37F937DB5714BF8A725
SHA256:AA0097E47CAA4933793155E45FC91EEF6B035DAAF22F9EA32EB509CC4811DD5C
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x040a.initext
MD5:E872C54C58EEF055BC791D3EEAD093C3
SHA256:1739D42ED181F36AB4F524C01B57A4102C2F7510661D973A1077A4E88AC34B97
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0409.initext
MD5:BE345D0260AE12C5F2F337B17E07C217
SHA256:E994689A13B9448C074F9B471EDEEC9B524890A0D82925E98AB90B658016D8F3
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0408.initext
MD5:C7A740C71FB3779C8AE2626729A44389
SHA256:D9610BF29EE0E73843595F246A58699ABE499B340AD9982831D068067161C120
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0413.initext
MD5:DC1C05A9FCE06CF659C20AED317DD417
SHA256:98D6CEEF6A444B9E8450ABEFC5B72BD6B0DF1CD5D7C7CD2822EB1BD186FF8526
3620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3620.31221\Diagnostic_v2.0.4.2_AllInOne_20190502_latest_V3_for_release\0x0411.initext
MD5:6EBBB5D67423D8D85F1688B561BF5304
SHA256:E3B87E8B94AD50BBE21795B3408943F9A6D6F33813E96802962CB74B889EDFE7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info