File name:

Full_Setup_File_Here.zip

Full analysis: https://app.any.run/tasks/dfdb6aa5-10cc-47e6-bae9-e4fb5400fc4b
Verdict: Malicious activity
Threats:

Raccoon is an info stealer type malware available as a Malware as a Service. It can be obtained for a subscription and costs $200 per month. Raccoon malware has already infected over 100,000 devices and became one of the most mentioned viruses on the underground forums in 2019.

Analysis date: April 29, 2025, 16:12:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
raccoon
recordbreaker
arch-scr
arch-doc
arch-html
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

AA2F8BB06E8DF9513FDD6239575E1144

SHA1:

A804EC4B69DC1E70069BEA8E7F31E017F682609C

SHA256:

7188F0E5B7EA30CA871BD0FB9C0E1E55B6D1D55EECE9F716DA591D65A848CA21

SSDEEP:

98304:BmKndhku8q16aOD0LugfHNSt+oS99i98EH/kD468RL3IroSiMkmbduo62S9F9t68:1E7SMEesZltBIsiNMtTI1Jl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RACCOON has been detected (SURICATA)

      • jsc.exe (PID: 7664)
    • Connects to the CnC server

      • jsc.exe (PID: 7664)
  • SUSPICIOUS

    • Reads the BIOS version

      • Setup.exe (PID: 7468)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 4812)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4812)
      • jsc.exe (PID: 7664)
    • Connects to the server without a host name

      • jsc.exe (PID: 7664)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4812)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 4812)
    • The sample compiled with russian language support

      • WinRAR.exe (PID: 4812)
    • Checks supported languages

      • Setup.exe (PID: 7468)
      • jsc.exe (PID: 7664)
    • Reads the computer name

      • Setup.exe (PID: 7468)
      • jsc.exe (PID: 7664)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 7468)
      • jsc.exe (PID: 7664)
    • Checks proxy server information

      • jsc.exe (PID: 7664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (42.1)
.zip | ZIP compressed archive (21)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:03:16 02:00:12
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: en-US/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
15
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe setup.exe no specs regsvcs.exe no specs csc.exe no specs vbc.exe no specs msbuild.exe no specs aspnet_wp.exe no specs aspnet_regbrowsers.exe no specs aspnet_compiler.exe no specs ngentask.exe no specs datasvcutil.exe no specs ilasm.exe no specs aspnet_regsql.exe no specs #RACCOON jsc.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4812"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Full_Setup_File_Here.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7468"C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Setup.exeWinRAR.exe
User:
admin
Company:
Schneider Electric Software, LLC.
Integrity Level:
MEDIUM
Description:
InTouch WindowMaker
Exit code:
0
Version:
2400.0852.0527.0052
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4812.426\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7532"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
7544"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
7556"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
4294967295
Version:
14.8.9037.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\vbc.exe
c:\windows\system32\ntdll.dll
7568"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
7580"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_wp.exe
Exit code:
4294967295
Version:
4.8.9220.0 built by: NET481REL1LAST_C
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_wp.exe
c:\windows\system32\ntdll.dll
7592"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regbrowsers.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_regbrowsers.exe
c:\windows\system32\ntdll.dll
7604"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_compiler.exe
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_compiler.exe
c:\windows\system32\ntdll.dll
7616"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Framework optimization service
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\ngentask.exe
c:\windows\system32\ntdll.dll
Total events
2 517
Read events
2 506
Write events
11
Delete events
0

Modification events

(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Full_Setup_File_Here.zip
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4812) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7664) jsc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7664) jsc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
3
Suspicious files
152
Text files
234
Unknown types
0

Dropped files

PID
Process
Filename
Type
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\smalle.fonbinary
MD5:ABC2DDA06AC9D95B210A3A805D724391
SHA256:DE416395301DA32C96BF34625483EA6ECDCDAAEB9FF72CDCA00B5AF4D7092DA9
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\8514sys.fonbinary
MD5:BB8F1F693BEBF6C738E47B68C4DB7D06
SHA256:DC7E1C9BB168E22B7A8B1A10C5D9555D71EA8486DC0D628FA17D117698BAE61B
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\en-US\avicap32.dll.muiexecutable
MD5:A5696B2D379FB322C7EE1E18C01CA920
SHA256:CB852E13A323C8E226B9BCCC7786DF3C55E4BE16D9D63F4911EA0565AC879A9C
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\en-US\AutoWorkplaceN.dll.muiexecutable
MD5:A311C98E7CB3BC2C6F4AD9CA65E95810
SHA256:799CF32FC0515A4BCC0388D0D39618D9C67EE67A1C2000D7344C5A8120004E2E
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\symbol.ttfbinary
MD5:3E443984997631A694DABF0FBA9C8693
SHA256:BBF1192965E5266FBF23370416337D2861FC1E8BD349DEF93F2994BA67382FC3
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\trebucbi.ttfbinary
MD5:7B0201D14BB2A17514480EAFD86DA51F
SHA256:87942234AB0CC4400088648BEF8D1F7AFC4C44E676C7ED6B32CA31462C18307D
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\dosapp.fonbinary
MD5:8A5853EBFC046F428DD31C5F3AE217EF
SHA256:0DA0D4ED89FD1E8810C7F2CDB5372ABFB02CB3D031ACACC1A5BBC853F879C2BD
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\fonts\trebucbd.ttfbinary
MD5:AF116CC142B0786D0C7898103A0BCD12
SHA256:DFCC306777A594D2815368547DD897E2AC82AFF8073E55D9E682569939E49B81
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\bg.txttext
MD5:833AFB4F88FDB5F48245C9B65577DC19
SHA256:4DCABCC8AB8069DB79143E4C62B6B76D2CF42666A09389EACFC35074B61779E3
4812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4812.426\Language\ba.txttext
MD5:D83B65AC086DA0C94D6EB57BEE669C2B
SHA256:2901B54F7621C95429658CB4EDB28ABD0CB5B6E257C7D9A364FC468A8B86BAAE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
44
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7664
jsc.exe
POST
404
45.9.74.36:80
http://45.9.74.36/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7664
jsc.exe
45.9.74.36:80
Delta Ltd
SC
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
login.live.com
  • 20.190.160.3
  • 40.126.32.140
  • 40.126.32.68
  • 20.190.160.22
  • 20.190.160.66
  • 20.190.160.20
  • 40.126.32.76
  • 40.126.32.74
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
  • 2603:1030:7::106
whitelisted
198.187.3.20.in-addr.arpa
unknown
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.43
whitelisted

Threats

PID
Process
Class
Message
7664
jsc.exe
A Network Trojan was detected
ET MALWARE Win32/RecordBreaker CnC Checkin M1
No debug info