File name:

Quarantined Messages.zip

Full analysis: https://app.any.run/tasks/48ece2bc-11b6-4c5a-80c9-0a27a6f57d0f
Verdict: Malicious activity
Analysis date: November 16, 2023, 05:52:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/zip
File info: Zip archive data, at least v4.5 to extract
MD5:

B81C80342DCB34B439D74651D6F51E36

SHA1:

6756216CC96B21FAAA92C564A65D691D59F02E7C

SHA256:

842D52F1920CD6E06DBDA150D4041DE13606A3A0E3F38DC5336CCA2002B061F5

SSDEEP:

98304:O9jHv1q4HAkkLENorNPGti6HprNIdXLTdmgqu9ipwd4f0Rugmw6NKIzEW6s3/Y4Z:UBxFTPFYBtOskoeePJoa/j+f

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • dlxvg3.exe (PID: 3668)
    • Reads Internet Explorer settings

      • dlxvg3.exe (PID: 3668)
    • Reads the Internet Settings

      • dlxvg3.exe (PID: 3668)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • EXCEL.EXE (PID: 3028)
  • INFO

    • Checks supported languages

      • dlxvg3.exe (PID: 3668)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3504)
    • Reads the computer name

      • dlxvg3.exe (PID: 3668)
    • Checks proxy server information

      • dlxvg3.exe (PID: 3668)
    • Reads the machine GUID from the registry

      • dlxvg3.exe (PID: 3668)
    • Create files in a temporary directory

      • dlxvg3.exe (PID: 3668)
    • Manual execution by a user

      • dlxvg3.exe (PID: 3668)
      • WinRAR.exe (PID: 3504)
      • POWERPNT.EXE (PID: 4004)
      • EXCEL.EXE (PID: 3028)
      • rundll32.exe (PID: 756)
    • Reads mouse settings

      • POWERPNT.EXE (PID: 4004)
      • EXCEL.EXE (PID: 3028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 45
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2023:11:16 05:51:44
ZipCRC: 0x74e34a66
ZipCompressedSize: 4294967295
ZipUncompressedSize: 4294967295
ZipFileName: upgrade.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs dlxvg3.exe no specs powerpnt.exe no specs excel.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
756"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\upgrade\dlxxl32.dllC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3028"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\microsoft office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3460"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Quarantined Messages.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3504"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\upgrade.zip" C:\Users\admin\Desktop\upgrade\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3668"C:\Users\admin\Desktop\upgrade\dlxvg3.exe" C:\Users\admin\Desktop\upgrade\dlxvg3.exeexplorer.exe
User:
admin
Company:
Haver Analytics Inc.
Integrity Level:
MEDIUM
Description:
Haver DLXVG3
Exit code:
0
Version:
5.3.2.9
Modules
Images
c:\users\admin\desktop\upgrade\dlxvg3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
4004"C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\admin\Desktop\upgrade\dlx.ppam"C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft PowerPoint
Exit code:
0
Version:
14.0.6009.1000
Modules
Images
c:\program files\microsoft office\office14\powerpnt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\program files\microsoft office\office14\ppcore.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
3 908
Read events
3 787
Write events
101
Delete events
20

Modification events

(PID) Process:(3460) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3460) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3504) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3504) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
Executable files
4
Suspicious files
7
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4004POWERPNT.EXEC:\Users\admin\AppData\Local\Temp\CVR6FE0.tmp.cvr
MD5:
SHA256:
3028EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRA057.tmp.cvr
MD5:
SHA256:
3504WinRAR.exeC:\Users\admin\Desktop\upgrade\dlxxl32.dllexecutable
MD5:0EED838488E17CAE2B5948E0F5DA2DBB
SHA256:A7C26F119B909EFE9734415B44052CD43810237F35051D8956D6DF9CBE3232E4
3504WinRAR.exeC:\Users\admin\Desktop\upgrade\dlxvg3.exeexecutable
MD5:2B96CABEE14FEBBF54E6C7280A760D40
SHA256:AAEEEDFF65AB854495CBD3F0018DD6968D72149C14EC461068E47C8DDF8C4CCD
3504WinRAR.exeC:\Users\admin\Desktop\upgrade\dlx.ppamdocument
MD5:EB1F615A9D09FCFAEB4F7AE4BC3620C8
SHA256:0FD22A7631D4473C26D5EEA1B7F495825341C6612657943C0E04B7F897323BDE
3504WinRAR.exeC:\Users\admin\Desktop\upgrade\dlx.xlamdocument
MD5:E3AAF055CD1CD5D69BB010B9ED26D8B8
SHA256:E0F9D72B6EBAD23CE3591E06852BEFD34483FE56FD0EF90C68769DA902A59CA1
3460WinRAR.exeC:\Users\admin\Desktop\upgrade.zipcompressed
MD5:0AAB70D4381310C204D9FA81AC8B3E99
SHA256:878726F01966A466A11B5EA4E5197344DD140BFA16E7942882881060ECCB3391
3668dlxvg3.exeC:\Users\admin\AppData\Local\Temp\@temp.htmtext
MD5:E9767BE8092050427FFC3A2F1D4B3B7B
SHA256:9C28A83690B8FC6015BB21B820735507402D8869A7BAE78C3133BCAAD8622433
3504WinRAR.exeC:\Users\admin\Desktop\upgrade\dlxxl64.dllexecutable
MD5:089BC585DFCC776D48D3330D5410C871
SHA256:10AC743728CA6511D20AB091F8122B22B0A5EB244C3ABE3B967985A39CB93668
4004POWERPNT.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:4C9D83F0CF3CABA76DE1FD723AA45E03
SHA256:AAB81438E28474827B94E7227415693D69B3EF1B652706DF54BD6DC26FCF0979
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info