File name:

Full_Setup_File_Here.zip

Full analysis: https://app.any.run/tasks/dfdb6aa5-10cc-47e6-bae9-e4fb5400fc4b
Verdict: Malicious activity
Threats:

Raccoon is an info stealer type malware available as a Malware as a Service. It can be obtained for a subscription and costs $200 per month. Raccoon malware has already infected over 100,000 devices and became one of the most mentioned viruses on the underground forums in 2019.

Analysis date: April 29, 2025, 16:12:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
raccoon
recordbreaker
arch-scr
arch-doc
arch-html
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

AA2F8BB06E8DF9513FDD6239575E1144

SHA1:

A804EC4B69DC1E70069BEA8E7F31E017F682609C

SHA256:

7188F0E5B7EA30CA871BD0FB9C0E1E55B6D1D55EECE9F716DA591D65A848CA21

SSDEEP:

98304:BmKndhku8q16aOD0LugfHNSt+oS99i98EH/kD468RL3IroSiMkmbduo62S9F9t68:1E7SMEesZltBIsiNMtTI1Jl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RACCOON has been detected (SURICATA)

      • jsc.exe (PID: 7664)
    • Connects to the CnC server

      • jsc.exe (PID: 7664)
  • SUSPICIOUS

    • Reads the BIOS version

      • Setup.exe (PID: 7468)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4812)
      • jsc.exe (PID: 7664)
    • Connects to the server without a host name

      • jsc.exe (PID: 7664)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 4812)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 4812)
    • The sample compiled with russian language support

      • WinRAR.exe (PID: 4812)
    • Checks proxy server information

      • jsc.exe (PID: 7664)
    • Checks supported languages

      • jsc.exe (PID: 7664)
      • Setup.exe (PID: 7468)
    • Reads the computer name

      • Setup.exe (PID: 7468)
      • jsc.exe (PID: 7664)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4812)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 7468)
      • jsc.exe (PID: 7664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (42.1)
.zip | ZIP compressed archive (21)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:03:16 02:00:12
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: en-US/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
15
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe setup.exe no specs regsvcs.exe no specs csc.exe no specs vbc.exe no specs msbuild.exe no specs aspnet_wp.exe no specs aspnet_regbrowsers.exe no specs aspnet_compiler.exe no specs ngentask.exe no specs datasvcutil.exe no specs ilasm.exe no specs aspnet_regsql.exe no specs #RACCOON jsc.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4812"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Full_Setup_File_Here.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
7468"C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Setup.exeWinRAR.exe
User:
admin
Company:
Schneider Electric Software, LLC.
Integrity Level:
MEDIUM
Description:
InTouch WindowMaker
Exit code:
0
Version:
2400.0852.0527.0052
7532"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
7544"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
7556"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
4294967295
Version:
14.8.9037.0
7568"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
7580"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_wp.exe
Exit code:
4294967295
Version:
4.8.9220.0 built by: NET481REL1LAST_C
7592"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regbrowsers.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
7604"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_compiler.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
7616"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Framework optimization service
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
152
Text files
234
Unknown types
0

Dropped files

PID
Process
Filename
Type
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\bn.txttext
MD5:D0E788F64268D15B4391F052B1F4B18A
SHA256:216CC780E371DC318C8B15B84DE8A5EC0E28F712B3109A991C8A09CDDAA2A81A
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\8514sys.fonbinary
MD5:BB8F1F693BEBF6C738E47B68C4DB7D06
SHA256:DC7E1C9BB168E22B7A8B1A10C5D9555D71EA8486DC0D628FA17D117698BAE61B
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\symbol.ttfbinary
MD5:3E443984997631A694DABF0FBA9C8693
SHA256:BBF1192965E5266FBF23370416337D2861FC1E8BD349DEF93F2994BA67382FC3
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\en-US\AutoWorkplaceN.dll.muiexecutable
MD5:A311C98E7CB3BC2C6F4AD9CA65E95810
SHA256:799CF32FC0515A4BCC0388D0D39618D9C67EE67A1C2000D7344C5A8120004E2E
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\bg.txttext
MD5:833AFB4F88FDB5F48245C9B65577DC19
SHA256:4DCABCC8AB8069DB79143E4C62B6B76D2CF42666A09389EACFC35074B61779E3
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\ar.txttext
MD5:1C45E6A6ECB3B71A7316C466B6A77C1C
SHA256:972261B53289DE2BD8A65E787A6E7CD6DEFC2B5F7E344128F2FE0492ED30CCF1
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\be.txttext
MD5:3C21135144AC7452E7DB66F0214F9D68
SHA256:D095879B8BBC67A1C9875C5E9896942BACF730BD76155C06105544408068C59E
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\smalle.fonbinary
MD5:ABC2DDA06AC9D95B210A3A805D724391
SHA256:DE416395301DA32C96BF34625483EA6ECDCDAAEB9FF72CDCA00B5AF4D7092DA9
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\ca.txttext
MD5:1657720023A267B5B625DE17BF292299
SHA256:ED8748DA8FA99DB775FF621D3E801E2830E6C04DA42C0B701095580191A700A6
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\verdanab.ttfbinary
MD5:215ACCAAD3DD60E8A5AB1B110F79D507
SHA256:F3245F5F38F61BD1CEEFB0F1338A5B88A21E6220832C2F43A38BBC7E1547C36F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
44
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7664
jsc.exe
POST
404
45.9.74.36:80
http://45.9.74.36/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7664
jsc.exe
45.9.74.36:80
Delta Ltd
SC
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
login.live.com
  • 20.190.160.3
  • 40.126.32.140
  • 40.126.32.68
  • 20.190.160.22
  • 20.190.160.66
  • 20.190.160.20
  • 40.126.32.76
  • 40.126.32.74
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
  • 2603:1030:7::106
whitelisted
198.187.3.20.in-addr.arpa
unknown
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.43
whitelisted

Threats

PID
Process
Class
Message
7664
jsc.exe
A Network Trojan was detected
ET MALWARE Win32/RecordBreaker CnC Checkin M1
No debug info