File name:

769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe

Full analysis: https://app.any.run/tasks/96390dbf-dac4-44dd-a567-6f2b525e874d
Verdict: Malicious activity
Analysis date: April 14, 2025, 08:14:55
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

D369B0ABB477BED3CDA7EE99B203D45D

SHA1:

E77C9F4EEAD9652134C3EB82741BFECDD6A191E0

SHA256:

769863EC7BA1E28A77C7CC0BDA19BB79E6869CAE63ECDFAB97C669FC40348A0C

SSDEEP:

6144:p/rB+ZOlklWs/UdtMWx8+QJx5gh17qIIoJY32Cab1a+oW:SZOul5Ax8+2mh1R3JY5+oW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Antivirus name has been found in the command line (generic signature)

      • avg.exe (PID: 4436)
    • Executing a file with an untrusted certificate

      • arpa.exe (PID: 5968)
      • unsecapp.exe (PID: 7188)
    • Changes the autorun value in the registry

      • arpa.exe (PID: 5968)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • avg.exe (PID: 4436)
      • 769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe (PID: 1116)
      • arpa.exe (PID: 5968)
    • Reads security settings of Internet Explorer

      • avg.exe (PID: 4436)
      • unsecapp.exe (PID: 7188)
    • There is functionality for taking screenshot (YARA)

      • 769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe (PID: 1116)
    • Starts itself from another location

      • arpa.exe (PID: 5968)
    • The process checks if it is being run in the virtual environment

      • arpa.exe (PID: 5968)
  • INFO

    • The sample compiled with english language support

      • avg.exe (PID: 4436)
      • arpa.exe (PID: 5968)
    • Checks supported languages

      • avg.exe (PID: 4436)
      • 769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe (PID: 1116)
      • arpa.exe (PID: 5968)
      • unsecapp.exe (PID: 7188)
    • Create files in a temporary directory

      • avg.exe (PID: 4436)
    • Reads the computer name

      • avg.exe (PID: 4436)
      • 769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe (PID: 1116)
      • unsecapp.exe (PID: 7188)
    • Process checks computer location settings

      • avg.exe (PID: 4436)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 2384)
    • Checks proxy server information

      • unsecapp.exe (PID: 7188)
    • Creates files in the program directory

      • arpa.exe (PID: 5968)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:12:04 03:42:24+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.23
CodeSize: 54784
InitializedDataSize: 299008
UninitializedDataSize: -
EntryPoint: 0x12a4
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe avg.exe rundll32.exe no specs arpa.exe unsecapp.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1116"C:\Users\admin\AppData\Local\Temp\769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe" C:\Users\admin\AppData\Local\Temp\769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2384"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\admin\AppData\Local\Temp\arpa.exeC:\Windows\SysWOW64\rundll32.exeavg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4436c:\windows\temp\avg.exeC:\Windows\Temp\avg.exe
769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\temp\avg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5968"C:\Users\admin\AppData\Local\Temp\arpa.exe" C:\Users\admin\AppData\Local\Temp\arpa.exe
rundll32.exe
User:
admin
Company:
ESET
Integrity Level:
MEDIUM
Description:
ESET HTTP Server Service
Exit code:
0
Version:
5.0.511.0
Modules
Images
c:\users\admin\appdata\local\temp\arpa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7188"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -appC:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe
arpa.exe
User:
admin
Company:
ESET
Integrity Level:
MEDIUM
Description:
ESET HTTP Server Service
Version:
5.0.511.0
Modules
Images
c:\programdata\eset malware protectionlyo\unsecapp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7268C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7300"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 234
Read events
1 232
Write events
2
Delete events
0

Modification events

(PID) Process:(5968) arpa.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:ESET Malware ProtectionLYo
Value:
"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app
(PID) Process:(5968) arpa.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:ESET Malware ProtectionLYo
Value:
"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app
Executable files
5
Suspicious files
3
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1116769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c.zip.exeC:\Windows\Temp\avg.exeexecutable
MD5:FBA356748C02DA7A65DDEF9470AA1CF2
SHA256:C86D452461B671FF8F7364A579FF9BA64105B9537FF0AABE8850371164E84B5B
5968arpa.exeC:\ProgramData\ESET Malware ProtectionLYo\http_dll.dllexecutable
MD5:5B92266D9A26260B4C9920EDE267BA37
SHA256:018286B6DDE76859ADB06BFB7B993E81C354ECEC471BD283CEAA73540569687B
4436avg.exeC:\Users\admin\AppData\Local\Temp\http_dll.dllexecutable
MD5:5B92266D9A26260B4C9920EDE267BA37
SHA256:018286B6DDE76859ADB06BFB7B993E81C354ECEC471BD283CEAA73540569687B
5968arpa.exeC:\ProgramData\ESET Malware ProtectionLYo\http_dll.datbinary
MD5:27A4ED145A9A6CB41AF09B8927FD5BEE
SHA256:8FC204508F4142BFFAA3E69BC5E0B1C3ED6DEAED8F0F04D69B15DCC3B4E2998F
4436avg.exeC:\Users\admin\AppData\Local\Temp\http_dll.datbinary
MD5:27A4ED145A9A6CB41AF09B8927FD5BEE
SHA256:8FC204508F4142BFFAA3E69BC5E0B1C3ED6DEAED8F0F04D69B15DCC3B4E2998F
5968arpa.exeC:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exeexecutable
MD5:28C6F235946FD694D2634C7A2F24C1BA
SHA256:C3159D4F85CEB84C4A0F7EA9208928E729A30DDDA4FEAD7EC6257C7DD1984763
4436avg.exeC:\Users\admin\AppData\Local\Temp\arpa.exeexecutable
MD5:28C6F235946FD694D2634C7A2F24C1BA
SHA256:C3159D4F85CEB84C4A0F7EA9208928E729A30DDDA4FEAD7EC6257C7DD1984763
4436avg.exeC:\Users\admin\AppData\Local\Temp\nsyB355.tmpbinary
MD5:BEDCF4782030C85B8A274A4E5102CF29
SHA256:868E85235A0475AD3B1B535D8094824F35DC84460ED86752481966AFC25FF722
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7860
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7860
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
7188
unsecapp.exe
45.248.87.140:443
Anchnet Asia Limited
CN
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7860
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.130
  • 20.190.160.131
  • 20.190.160.3
  • 20.190.160.65
  • 40.126.32.74
  • 20.190.160.5
  • 40.126.32.68
  • 20.190.160.4
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info