File name:

Rust.7z

Full analysis: https://app.any.run/tasks/04b930d0-799f-43f7-b80d-6478cf40a876
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 16, 2025, 12:01:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
stealer
crypto-regex
xor-url
generic
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

DBB042979CDB7C197A69139459A9087B

SHA1:

C6D2D615F5EEA487BC55FAC9D3D8004A974115EA

SHA256:

7732B699DA2B384AB56F1D68D71D5301752EAF37BAB9823D7BD3600B73CEF3A2

SSDEEP:

98304:Qr4soxXLPHoFk4a+caAdCPhohLyRdaBw3vzW6SWCACwW4otb2IovuLGD8c1ToYk5:Fss2T29BXb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7328)
    • Actions looks like stealing of personal data

      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7864)
    • Steals credentials from Web Browsers

      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7864)
    • XORed URL has been found (YARA)

      • LumiraV26.exe (PID: 7440)
      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7708)
      • TumiyaFixed.exe (PID: 7864)
  • SUSPICIOUS

    • The process checks if it is being run in the virtual environment

      • LumiraV26.exe (PID: 7440)
      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7708)
      • TumiyaFixed.exe (PID: 7864)
    • Reads the date of Windows installation

      • LumiraV26.exe (PID: 7440)
      • TumiyaFixed.exe (PID: 7708)
    • Reads security settings of Internet Explorer

      • LumiraV26.exe (PID: 7440)
      • TumiyaFixed.exe (PID: 7708)
    • Application launched itself

      • LumiraV26.exe (PID: 7440)
      • TumiyaFixed.exe (PID: 7708)
    • Found regular expressions for crypto-addresses (YARA)

      • LumiraV26.exe (PID: 7440)
      • TumiyaFixed.exe (PID: 7708)
      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7864)
  • INFO

    • Reads the computer name

      • LumiraV26.exe (PID: 7440)
      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7708)
      • TumiyaFixed.exe (PID: 7864)
    • Checks supported languages

      • LumiraV26.exe (PID: 7440)
      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7708)
      • TumiyaFixed.exe (PID: 7864)
    • Process checks computer location settings

      • LumiraV26.exe (PID: 7440)
      • TumiyaFixed.exe (PID: 7708)
    • Manual execution by a user

      • LumiraV26.exe (PID: 7440)
      • TumiyaFixed.exe (PID: 7708)
    • Checks proxy server information

      • LumiraV26.exe (PID: 7588)
      • TumiyaFixed.exe (PID: 7864)
      • slui.exe (PID: 5176)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7328)
    • Reads the software policy settings

      • slui.exe (PID: 5176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(7440) LumiraV26.exe
Decrypted-URLs (1)https://docs.rs/getrandom#nodejs-es-module-support
(PID) Process(7588) LumiraV26.exe
Decrypted-URLs (1)https://docs.rs/getrandom#nodejs-es-module-support
(PID) Process(7708) TumiyaFixed.exe
Decrypted-URLs (1)https://docs.rs/getrandom#nodejs-es-module-support
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2025:05:16 01:50:55+00:00
ArchivedFileName: CrowsWorn Setup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
10
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #XOR-URL lumirav26.exe no specs conhost.exe no specs #XOR-URL lumirav26.exe conhost.exe no specs #XOR-URL tumiyafixed.exe no specs conhost.exe no specs #XOR-URL tumiyafixed.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
5176C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7328"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Rust.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7440"C:\Users\admin\Desktop\LumiraV26.exe" C:\Users\admin\Desktop\LumiraV26.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\lumirav26.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
xor-url
(PID) Process(7440) LumiraV26.exe
Decrypted-URLs (1)https://docs.rs/getrandom#nodejs-es-module-support
7448\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLumiraV26.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7588"C:\Users\admin\Desktop\LumiraV26.exe" C:\Users\admin\Desktop\LumiraV26.exe
LumiraV26.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\lumirav26.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
xor-url
(PID) Process(7588) LumiraV26.exe
Decrypted-URLs (1)https://docs.rs/getrandom#nodejs-es-module-support
7600\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLumiraV26.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7708"C:\Users\admin\Desktop\TumiyaFixed.exe" C:\Users\admin\Desktop\TumiyaFixed.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\tumiyafixed.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
xor-url
(PID) Process(7708) TumiyaFixed.exe
Decrypted-URLs (1)https://docs.rs/getrandom#nodejs-es-module-support
7716\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTumiyaFixed.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7864"C:\Users\admin\Desktop\TumiyaFixed.exe" C:\Users\admin\Desktop\TumiyaFixed.exe
TumiyaFixed.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\tumiyafixed.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
7876\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTumiyaFixed.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 570
Read events
5 558
Write events
12
Delete events
0

Modification events

(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Rust.7z
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
32
(PID) Process:(7328) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
0
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7588LumiraV26.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
7328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa7328.24806\LumiraV26.exeexecutable
MD5:DA9C230E8E621E62C3D6EC9CC1005FB2
SHA256:D4E89B14D6408DAB14EAFF99CC4611775B0E467EF1E858E9D6B7D6AF11A46321
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
44
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8184
SIHClient.exe
GET
200
23.216.77.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7588
LumiraV26.exe
POST
200
185.224.3.219:8080
http://185.224.3.219:8080/api/send
unknown
unknown
7864
TumiyaFixed.exe
POST
200
185.224.3.219:8080
http://185.224.3.219:8080/api/send
unknown
unknown
8184
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
23.216.77.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
23.216.77.19:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
8184
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
7588
LumiraV26.exe
185.224.3.219:8080
Elektrohat Bilgi Teknolojileri Ve Telekomunikasyon Hizmetleri A.S
TR
unknown
7864
TumiyaFixed.exe
185.224.3.219:8080
Elektrohat Bilgi Teknolojileri Ve Telekomunikasyon Hizmetleri A.S
TR
unknown
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8184
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8184
SIHClient.exe
23.216.77.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
8184
SIHClient.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7184
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
crl.microsoft.com
  • 23.216.77.19
  • 23.216.77.26
  • 23.216.77.20
  • 23.216.77.18
  • 23.216.77.13
  • 23.216.77.21
  • 23.216.77.25
  • 23.216.77.6
  • 23.216.77.16
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.43
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.2
  • 40.126.31.130
  • 20.190.159.129
  • 40.126.31.1
  • 20.190.159.75
  • 20.190.159.131
  • 40.126.31.128
whitelisted

Threats

No threats detected
No debug info