File name:

EzExploit.zip

Full analysis: https://app.any.run/tasks/8a396627-c085-4568-98f2-f4f239c131c7
Verdict: Malicious activity
Analysis date: September 05, 2024, 11:39:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

D9A446A0754E884AEEF30AEBD8CB6E36

SHA1:

7867F141F13BBEA869D77483EA2CC85E5DBE204B

SHA256:

8453A4888C6DBE1EC6E127CDF6DCAA16B8312413ADA1FC70477CED568A95BB67

SSDEEP:

1536:F3IitJGTz36y0Ry8eKoxMXLnswflQrmUUOCeIdcLd9C4TuFcCR1C:FYitQT2TgJEOrmxOCHdcLfC4TwbC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • java.exe (PID: 4732)
      • java.exe (PID: 4008)
      • java.exe (PID: 4316)
      • java.exe (PID: 4824)
  • INFO

    • Creates files in the program directory

      • java.exe (PID: 4732)
    • Checks supported languages

      • java.exe (PID: 4732)
      • java.exe (PID: 4008)
      • javaw.exe (PID: 1448)
      • java.exe (PID: 4316)
      • java.exe (PID: 4824)
    • Manual execution by a user

      • cmd.exe (PID: 3332)
      • cmd.exe (PID: 5744)
      • notepad.exe (PID: 7028)
      • notepad.exe (PID: 368)
      • cmd.exe (PID: 4164)
      • cmd.exe (PID: 5400)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6496)
      • OpenWith.exe (PID: 4804)
      • OpenWith.exe (PID: 2224)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 4804)
      • OpenWith.exe (PID: 2224)
    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 4804)
      • notepad.exe (PID: 4920)
      • OpenWith.exe (PID: 2224)
      • notepad.exe (PID: 7028)
      • notepad.exe (PID: 368)
    • Create files in a temporary directory

      • java.exe (PID: 4732)
      • java.exe (PID: 4008)
      • javaw.exe (PID: 1448)
      • java.exe (PID: 4316)
      • java.exe (PID: 4824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:07:07 16:19:40
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: EzExploit/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
22
Malicious processes
4
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs icacls.exe no specs conhost.exe no specs openwith.exe no specs notepad.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs openwith.exe no specs javaw.exe no specs notepad.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs notepad.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
368"C:\WINDOWS\System32\NOTEPAD.EXE" C:\Users\admin\Desktop\EzExploit\launch-standard.batC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1448"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\Desktop\EzExploit\ezexploit_standard.jar" C:\Program Files\Java\jre1.8.0_271\bin\javaw.exeOpenWith.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2224C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2720C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ntmarta.dll
3332C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit\launch-standard.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
4008java -jar ezexploit_standard.jarC:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.execmd.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files (x86)\common files\oracle\java\javapath_target_2989500\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4164C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit\launch-standard.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
4316java -jar ezexploit_standard.jarC:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.execmd.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files (x86)\common files\oracle\java\javapath_target_2989500\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4732java -jar ezexploit_standard.jarC:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.execmd.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files (x86)\common files\oracle\java\javapath_target_2989500\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4804C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
5 327
Read events
5 305
Write events
22
Delete events
0

Modification events

(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\EzExploit.zip
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF1201000035000000D20400001E020000
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:psize
Value:
80
Executable files
2
Suspicious files
7
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\launch-standard.battext
MD5:94C75B944240C0176898696F27116665
SHA256:874F32053F82FCC17168D294D239FEDF256958CC9CA90176153A8EB62886B4BE
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\modules\cmd_send.jarcompressed
MD5:BD2949539C806D6FEA49C0A26DD8810C
SHA256:5399B872C37B0E5DD6F6BF414B5EF783D2B002CE3D497AC050036DA95BF69B7C
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\ezexploit_standard.jarjava
MD5:109F51F21C044D3292F4A3EF3E2B5C0D
SHA256:249401D3529E543A99A63ADBCC8E6B09F62CC70C0B5F32D788D0F739CE16905A
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\modules\reconnect_yaml.jarcompressed
MD5:D1FDE0D321918ADC22002D9072EF23CA
SHA256:23147BFA63E2AC2ADD7C57480AB579F6A3D3B6091D480E712B610B1B9B79A4E4
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\modules\cmd_find.jarcompressed
MD5:7B5E43FBEEADB29E464B83438B364B41
SHA256:CE8061E18A7ADDA05365EB3FBC46DD8860725EE8D529B91C1362AABB24E6915D
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\modules\cmd_alert.jarcompressed
MD5:56416BFFC290B5531375807E134053F4
SHA256:785152401573F49A3B1D9A3CF50EDB89B971ACF0BFF4F50C1BA93678B15E92CB
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\modules.ymltext
MD5:18F81D9DE7DD889E0277E9F67F7DF9BE
SHA256:75A3D3E3D4023E832463B0020B08325A5CAD6CDB0603B4D25FDACACF3CC2665D
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\plugins\RconFix.jarjava
MD5:BB0199FAD177D12AC638D2DA61F9A4DF
SHA256:87E3C42B1CDBA0B17983EE04ED656D94EBC2101923F4BA4F6DD96DEA83705751
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\plugin.ymltext
MD5:C551A46F1CA1D5D6B58DBFD9094C34D8
SHA256:4841CA6DB6F33D429F3CD7C7D6E9DCC3E4DCDB3684D9F4D735D7205643FE678D
6496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6496.19995\EzExploit\plugins\VdsPro.jarcompressed
MD5:49322DFBB0BEAED49C9DC64C94924FB0
SHA256:B1BA51E4D0A434601B25CEA274E01D35085FF7D3422B58DCABCF6B0606A5089F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
27
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3652
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
936
SIHClient.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
936
SIHClient.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2120
MoUsoCoreWorker.exe
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
4
System
192.168.100.255:138
whitelisted
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
4316
RUXIMICS.exe
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
2120
MoUsoCoreWorker.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
6872
svchost.exe
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
4
System
192.168.100.255:137
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3652
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.119.249.228
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.142
whitelisted
www.microsoft.com
  • 23.32.185.131
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.133
  • 40.126.32.134
  • 20.190.160.20
  • 40.126.32.138
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info