analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

240506.zip

Full analysis: https://app.any.run/tasks/b2c5be30-fa77-4231-aea9-59c8b4868126
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: May 07, 2024, 00:18:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
lockbit
vidar
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

973956538F251F5C3B5918B62568BE50

SHA1:

6EEE67E2DF80437CB802B1941F0EFB83A054BBDC

SHA256:

73CB3B9CAD2DF48EFD839C2048A734B9B3D3F24604D024FE3AC2364687D9B6DD

SSDEEP:

12288:ReM22BD1bpCWW6tus6PISp6dZ/Ws/SkVS77qDNsWG6:ReEB59CWW6tusCFp6dZ/JSkVGqDRG6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Bandizip.exe (PID: 3696)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • Known privilege escalation attack

      • dllhost.exe (PID: 2928)
    • Renames files like ransomware

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • [YARA] LockBit is detected

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • VIDAR has been detected (YARA)

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • WinRAR.exe (PID: 3980)
    • Reads the Internet Settings

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Bandizip.exe (PID: 2700)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 3696)
      • Bandizip.exe (PID: 2892)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads security settings of Internet Explorer

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 2700)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads settings of System Certificates

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Executable content was dropped or overwritten

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Bandizip.exe (PID: 3696)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • Adds/modifies Windows certificates

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
    • Checks Windows Trust Settings

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 4088)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Changes Internet Explorer settings (feature browser emulation)

      • RegDll.x86.exe (PID: 3508)
      • RegDll.x86.exe (PID: 3136)
      • RegDll.x86.exe (PID: 2104)
    • Creates/Modifies COM task schedule object

      • RegDll.x86.exe (PID: 4080)
    • Creates a software uninstall entry

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
    • Reads Microsoft Outlook installation path

      • Updater.exe (PID: 2712)
    • Application launched itself

      • Bandizip.exe (PID: 2700)
    • Reads Internet Explorer settings

      • Updater.exe (PID: 2712)
    • Write to the desktop.ini file (may be used to cloak folders)

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2008)
    • Changes the desktop background image

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • Creates files like ransomware instruction

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
    • Connects to unusual port

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Starts application with an unusual extension

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
  • INFO

    • Manual execution by a user

      • msedge.exe (PID: 1116)
      • wmpnscfg.exe (PID: 664)
      • rundll32.exe (PID: 1200)
      • RegDll.x86.exe (PID: 3216)
      • Bandizip.exe (PID: 2700)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 2892)
      • Bandizip.exe (PID: 3696)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 3804)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
      • notepad.exe (PID: 3056)
    • Application launched itself

      • msedge.exe (PID: 1116)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 1116)
      • msedge.exe (PID: 1488)
    • Checks supported languages

      • wmpnscfg.exe (PID: 664)
      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • RegDll.x86.exe (PID: 3508)
      • RegDll.x86.exe (PID: 3136)
      • RegDll.x86.exe (PID: 4080)
      • Bandizip.exe (PID: 3852)
      • RegDll.x86.exe (PID: 2104)
      • RegDll.x86.exe (PID: 2844)
      • RegDll.x86.exe (PID: 2072)
      • Bandizip.exe (PID: 3160)
      • Bandizip.exe (PID: 2700)
      • RegDll.x86.exe (PID: 3216)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 2892)
      • Bandizip.exe (PID: 3696)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 3804)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
      • B3F6.tmp (PID: 2972)
    • Drops the executable file immediately after the start

      • msedge.exe (PID: 1116)
      • msedge.exe (PID: 1488)
    • Reads the computer name

      • wmpnscfg.exe (PID: 664)
      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • RegDll.x86.exe (PID: 3216)
      • Bandizip.exe (PID: 2700)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 3696)
      • Bandizip.exe (PID: 2892)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 3804)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • The process uses the downloaded file

      • msedge.exe (PID: 1116)
      • msedge.exe (PID: 2432)
    • Checks proxy server information

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Bandizip.exe (PID: 2700)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 2892)
      • Bandizip.exe (PID: 3696)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads the machine GUID from the registry

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • Bandizip.exe (PID: 2892)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 3804)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Creates files or folders in the user directory

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Updater.exe (PID: 2712)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Creates files in the program directory

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads the software policy settings

      • BANDIZIP-SETUP-STD-ALL.EXE (PID: 3780)
      • Updater.exe (PID: 2712)
      • Bandizip.exe (PID: 4088)
      • Bandizip.exe (PID: 2812)
      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 2928)
    • Checks transactions between databases Windows and Oracle

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 3804)
    • Create files in a temporary directory

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads Environment values

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Reads product name

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe (PID: 2280)
    • Dropped object may contain TOR URL's

      • └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe (PID: 2168)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: ???۱ǰ??? ????????.alz
ZipUncompressedSize: 424976
ZipCompressedSize: 425106
ZipCRC: 0x4b20aa2e
ZipModifyDate: 2024:05:06 15:56:46
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
113
Monitored processes
63
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs rundll32.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs bandizip-setup-std-all.exe no specs bandizip-setup-std-all.exe bandizip.exe no specs regdll.x86.exe no specs regdll.x86.exe no specs regdll.x86.exe no specs regdll.x86.exe no specs regdll.x86.exe no specs regdll.x86.exe no specs regdll.x86.exe no specs bandizip.exe no specs bandizip.exe no specs updater.exe bandizip.exe bandizip.exe bandizip.exe no specs bandizip.exe └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe no specs CMSTPLUA no specs #LOCKBIT └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘.exe vssvc.exe no specs #VIDAR └·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe b3f6.tmp no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3980"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\240506.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
4036"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Rar$DIa3980.45212\+·+¦¦¦¦n++ ¦++d-ñ+«.alzC:\Windows\System32\rundll32.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1200"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\+·+¦¦¦¦n++ ¦++d-ñ+«.alzC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1116"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --profile-directory=DefaultC:\Program Files\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
112"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd8,0x6e6af598,0x6e6af5a8,0x6e6af5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1060"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1324,i,6138670470745489543,3374187927732427830,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1488"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1344 --field-trial-handle=1324,i,6138670470745489543,3374187927732427830,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1856"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1624 --field-trial-handle=1324,i,6138670470745489543,3374187927732427830,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1844"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --first-renderer-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1324,i,6138670470745489543,3374187927732427830,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1932"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1324,i,6138670470745489543,3374187927732427830,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
51 199
Read events
47 232
Write events
3 895
Delete events
72

Modification events

(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3980) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\240506.zip
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3980) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
47
Suspicious files
775
Text files
215
Unknown types
43

Dropped files

PID
Process
Filename
Type
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\161b7fa1-e29c-4831-a911-ee066037a447.tmp
MD5:
SHA256:
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF11601e.TMP
MD5:
SHA256:
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF11606c.TMP
MD5:
SHA256:
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF116118.TMP
MD5:
SHA256:
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
3980WinRAR.exeC:\Users\admin\Desktop\+·+¦¦¦¦n++ ¦++d-ñ+«.alzbinary
MD5:86683A2C4F34FC8AD3C1EEF8B793B3F9
SHA256:B7155C3AB8353DC1A792EBAC23E0FEF1D3F4F32879400614003693C21A5D1D41
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
1116msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.oldtext
MD5:3E3FAD7BC02D9F39F64DACB4E9DD2624
SHA256:43C8C6C59477341650E102E67EE991E2414C4F098AD0EA0C1C4CEF3966F7CBDD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
107
DNS requests
128
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3780
BANDIZIP-SETUP-STD-ALL.EXE
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
unknown
3780
BANDIZIP-SETUP-STD-ALL.EXE
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
unknown
2280
└·└█▒╟ ░ⁿ╖├ │╗┐δ┴ñ╕«_240506 ▓└ ╚«└╬╟╧╜├░φ ┴╢─í║╬┼╣╡σ╕│┤╧┤┘1.exe
GET
200
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?d11ee5be6134aafc
unknown
unknown
3780
BANDIZIP-SETUP-STD-ALL.EXE
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEBuRJhVl1EslGbwM0iynBP4%3D
unknown
unknown
3780
BANDIZIP-SETUP-STD-ALL.EXE
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?64d61d4d36924ad9
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
1116
msedge.exe
239.255.255.250:1900
unknown
1488
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1488
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1488
msedge.exe
204.79.197.203:443
ntp.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1488
msedge.exe
2.17.147.131:443
assets.msn.com
Akamai International B.V.
CZ
unknown
1488
msedge.exe
18.244.18.38:443
sb.scorecardresearch.com
US
unknown

DNS requests

Domain
IP
Reputation
ntp.msn.com
  • 204.79.197.203
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
assets.msn.com
  • 2.17.147.131
  • 2.17.147.187
whitelisted
img-s-msn-com.akamaized.net
  • 2.17.147.42
  • 2.17.147.88
whitelisted
sb.scorecardresearch.com
  • 18.244.18.38
  • 18.244.18.122
  • 18.244.18.27
  • 18.244.18.32
shared
th.bing.com
  • 95.100.146.34
  • 95.100.146.32
whitelisted
api.msn.com
  • 204.79.197.203
whitelisted
c.bing.com
  • 13.107.21.237
  • 204.79.197.237
whitelisted
c.msn.com
  • 68.219.88.97
whitelisted

Threats

PID
Process
Class
Message
1488
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] A free CDN for open source projects (jsdelivr .net)
No debug info