File name:

clumsy.zip

Full analysis: https://app.any.run/tasks/ff1ee773-14cc-4916-9749-8141f5b51737
Verdict: Malicious activity
Analysis date: September 19, 2024, 06:52:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

4540076E0AAFAD3E9BE704E805FB05E0

SHA1:

BCBBD6A2DF76AE3093784A77EB00B79C781ABD4D

SHA256:

718D0C897FF489C2EA06346A5E38EBD3BAE844A32FB17E4E0179AE4106AA8D7E

SSDEEP:

98304:FdAuqKbEn8KnJX/PUIju2MT/jFO40e0tAlJXJGF4KGSRjNuAwJvX5qOUtMGSG4XT:seJJYyziaIo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 6500)
    • Application launched itself

      • AutoHotkey_2.0.2_setup.exe (PID: 5388)
      • binder.exe (PID: 2960)
      • AutoHotkeyUX.exe (PID: 7016)
      • AutoHotkeyUX.exe (PID: 6308)
    • Executable content was dropped or overwritten

      • AutoHotkey_2.0.2_setup.exe (PID: 6424)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:02:26 22:11:28
ZipCRC: 0x09dfb7f3
ZipCompressedSize: 2889093
ZipUncompressedSize: 2912256
ZipFileName: clumsy/AutoHotkey_2.0.2_setup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
160
Monitored processes
20
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs clumsy 0.2 v6.exe werfault.exe autohotkey_2.0.2_setup.exe no specs autohotkey_2.0.2_setup.exe autohotkeyux.exe no specs binder.exe no specs autohotkeyux.exe no specs binder.exe clumsy 0.2 v6.exe werfault.exe autohotkeyux.exe autohotkeyux.exe no specs autohotkeyux.exe sppextcomobj.exe no specs slui.exe clumsy 0.2 v6.exe werfault.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1680"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2660"C:\Users\admin\Desktop\clumsy\binder.exe" C:\Users\admin\Desktop\clumsy\binder.exe
binder.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.1.34.03
Modules
Images
c:\users\admin\desktop\clumsy\binder.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
2960"C:\Users\admin\Desktop\clumsy\binder.exe" C:\Users\admin\Desktop\clumsy\binder.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.1.34.03
Modules
Images
c:\users\admin\desktop\clumsy\binder.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\psapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\ws2_32.dll
3076"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" /force /script "C:\Program Files\AutoHotkey\UX\install-version.ahk" 1.1.37.02 /YC:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
AutoHotkeyUX.exe
User:
admin
Company:
AutoHotkey Foundation LLC
Integrity Level:
HIGH
Description:
AutoHotkey 64-bit
Exit code:
0
Version:
2.0.2
Modules
Images
c:\program files\autohotkey\ux\autohotkeyux.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\user32.dll
5160"C:\Users\admin\Desktop\clumsy\clumsy 0.2 v6.exe" C:\Users\admin\Desktop\clumsy\clumsy 0.2 v6.exe
explorer.exe
User:
admin
Company:
Nishant Sivakumar
Integrity Level:
HIGH
Description:
TypeDescriptionProviderDemo
Exit code:
3762504530
Version:
5.66.0.7716
Modules
Images
c:\users\admin\desktop\clumsy\clumsy 0.2 v6.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5388"C:\Users\admin\Desktop\clumsy\AutoHotkey_2.0.2_setup.exe" C:\Users\admin\Desktop\clumsy\AutoHotkey_2.0.2_setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AutoHotkey installer
Exit code:
0
Version:
2.0.2
Modules
Images
c:\users\admin\desktop\clumsy\autohotkey_2.0.2_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5768C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6188 -s 1004C:\Windows\SysWOW64\WerFault.exe
clumsy 0.2 v6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6188"C:\Users\admin\Desktop\clumsy\clumsy 0.2 v6.exe" C:\Users\admin\Desktop\clumsy\clumsy 0.2 v6.exe
explorer.exe
User:
admin
Company:
Nishant Sivakumar
Integrity Level:
MEDIUM
Description:
TypeDescriptionProviderDemo
Exit code:
3762504530
Version:
5.66.0.7716
Modules
Images
c:\users\admin\desktop\clumsy\clumsy 0.2 v6.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
6308"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\launcher.ahk" "C:\Users\admin\Desktop\clumsy\clumsy hotkey.ahk" C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
explorer.exe
User:
admin
Company:
AutoHotkey Foundation LLC
Integrity Level:
MEDIUM
Description:
AutoHotkey 64-bit
Exit code:
2
Version:
2.0.2
Modules
Images
c:\program files\autohotkey\ux\autohotkeyux.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\win32u.dll
6424"C:\Users\admin\Desktop\clumsy\AutoHotkey_2.0.2_setup.exe" /to "C:\Program Files\AutoHotkey"C:\Users\admin\Desktop\clumsy\AutoHotkey_2.0.2_setup.exe
AutoHotkey_2.0.2_setup.exe
User:
admin
Integrity Level:
HIGH
Description:
AutoHotkey installer
Exit code:
0
Version:
2.0.2
Modules
Images
c:\users\admin\desktop\clumsy\autohotkey_2.0.2_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
21 521
Read events
21 455
Write events
56
Delete events
10

Modification events

(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\clumsy.zip
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(6500) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
16
Suspicious files
10
Text files
72
Unknown types
3

Dropped files

PID
Process
Filename
Type
6928WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_clumsy 0.2 v6.ex_d0c622f89c48c7d52807d6830e2541dc492808_7c56091b_bbdb934b-2eca-4ece-9424-d65c5c782c7c\Report.wer
MD5:
SHA256:
6928WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\clumsy 0.2 v6.exe.7000.dmp
MD5:
SHA256:
6500WinRAR.exeC:\Users\admin\Desktop\clumsy\binder.exeexecutable
MD5:32B7FDB92F748D373A4578AF47E063DF
SHA256:82F9113B1CB88A9C9822C58F96A98332A8EB0F830A4CDBFCD79763F6165DF14B
6500WinRAR.exeC:\Users\admin\Desktop\clumsy\WinDivert.dllexecutable
MD5:1B1284100327D972E017F565DBECF80E
SHA256:9444A6E6B66F13F666F9C60D1935824F61C7256E35A8CF0440E29BAA7FBE42C7
6424AutoHotkey_2.0.2_setup.exeC:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.2_setup.exe\UX\install-ahk2exe.ahktext
MD5:C90BED0679B789B74E4865AE6F2709A3
SHA256:C242EBB51241ACAB13152D95CDB05BE5382FFB97F3DCA2DA3A4E5A084C2E3FF4
6928WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREAE7.tmp.WERInternalMetadata.xmlxml
MD5:CBD22707996C817CD50832FE225500E2
SHA256:8AE8A0F68BC94E579428BF0207B43AF67F1F8965B7964541A16696D50B268A04
6928WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE9DC.tmp.dmpdmp
MD5:6771D69015DED911228BFDCCF18692AB
SHA256:3D3C5F5DAA6EF252373662836C2FEC3E56BFD7B55F2BD8345ABBBB7CE752A3EF
6424AutoHotkey_2.0.2_setup.exeC:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.2_setup.exe\AutoHotkey.chmchm
MD5:D7EC8FE26D26746B74F244026DC70152
SHA256:3ADCDE4562651B37751E8AD1CFBAC13A09DCC1E923AC42C17D86BA395F0A1E0A
6424AutoHotkey_2.0.2_setup.exeC:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.2_setup.exe\AutoHotkey32.exeexecutable
MD5:756E244FDF729022C26F2DE05C4A7249
SHA256:528AC75827D90533FF0CE9DA73BA20A67161FF391C239D1F5EDA4C17DC5B6978
6928WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:FB64A9EBEDF48D3895381D5B7D80743D
SHA256:EA21D495930AD76F267A33A0F593DBF0C7EA75E457FCAE49A29DAAD8BD920F42
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
49
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
32
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6928
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6204
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6352
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6352
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6308
AutoHotkeyUX.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
32
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1776
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.79.141.152:443
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
104.126.37.147:443
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:138
whitelisted
32
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
watson.events.data.microsoft.com
  • 20.42.65.92
  • 13.89.179.12
  • 52.168.117.173
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.138
  • 20.190.160.22
  • 20.190.160.14
  • 20.190.160.20
  • 40.126.32.136
  • 40.126.32.140
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
browser.pipe.aria.microsoft.com
  • 20.189.173.26
whitelisted
www.autohotkey.com
  • 104.21.89.135
  • 172.67.159.204
whitelisted

Threats

No threats detected
No debug info