analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

Launcher_x64.zip

Full analysis: https://app.any.run/tasks/85e606b0-4c66-41bf-9fdd-bd214839e792
Verdict: Malicious activity
Analysis date: January 18, 2020, 11:03:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

DCF05FD51D73E24501938EB0DB3DD1D2

SHA1:

8CE7A76C9CCDD4D4D2D8BF9EBDFC2719C09F122B

SHA256:

89F169FB5B5C48B159267BAFCD99A305F1893D33E63E683BA5F7A3A38E14F0DF

SSDEEP:

98304:vq72XgABrSzxYkvEFKOV/vgvpsQrEEY8mrYZLuaPwzN9WFSfwXM2NV8:vJXAzxFvrORmsCG8WyLuaPwzLfvUV8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3420)
    • Application was dropped or rewritten from another process

      • Install.exe (PID: 1024)
      • Install.exe (PID: 3840)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2112)
    • Application launched itself

      • Install.exe (PID: 1024)
    • Creates files in the user directory

      • Install.exe (PID: 3840)
  • INFO

    • Manual execution by user

      • Install.exe (PID: 1024)
      • WinRAR.exe (PID: 2112)
      • chrome.exe (PID: 3020)
    • Application launched itself

      • chrome.exe (PID: 3020)
    • Reads the hosts file

      • chrome.exe (PID: 3020)
      • chrome.exe (PID: 3140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2019:11:09 21:47:21
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: en-US/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
17
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe searchprotocolhost.exe no specs install.exe no specs install.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3900"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\Launcher_x64.zip.xpiC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2112"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\Launcher_x64.zip" C:\Users\admin\Desktop\Launcher_x64\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3420"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
1024"C:\Users\admin\Desktop\Launcher_x64\Install.exe" C:\Users\admin\Desktop\Launcher_x64\Install.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3840"C:\Users\admin\Desktop\Launcher_x64\Install.exe"C:\Users\admin\Desktop\Launcher_x64\Install.exe
Install.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3020"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
3221225547
Version:
75.0.3770.100
292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6fc1a9d0,0x6fc1a9e0,0x6fc1a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
716"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1756 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2644"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1012,9963599843819386336,16336257095877305939,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6237635804463987228 --mojo-platform-channel-handle=1020 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3140"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1012,9963599843819386336,16336257095877305939,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=13583980029164623512 --mojo-platform-channel-handle=1540 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
640
Read events
551
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
28
Text files
58
Unknown types
4

Dropped files

PID
Process
Filename
Type
3020chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\6db041c9-81a1-4c21-b7b5-28aad9fb325d.tmp
MD5:
SHA256:
3020chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:C4D6CBB269C626168A5D6D0D8CCE6C30
SHA256:B62CDBB758278A0C2E50593357390119441D8DE09428EB29027F3DFD1332E348
3840Install.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@mywps[1].txttext
MD5:3D5200832014D23666D21A79B56F8BE8
SHA256:E536A9B97AB3D92548BCC5CE83506AB22C096829E2A316DD23466171ABBCB295
3020chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
3020chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF3aeeab.TMPtext
MD5:C4D6CBB269C626168A5D6D0D8CCE6C30
SHA256:B62CDBB758278A0C2E50593357390119441D8DE09428EB29027F3DFD1332E348
2112WinRAR.exeC:\Users\admin\Desktop\Launcher_x64\xperm.dllexecutable
MD5:1B8F236C551EF8ED2CDE51ADAB838A87
SHA256:A0BA71E322FBCE81FE792B4ABE09CB6D46A26CB38757018184B0346942AA9C54
3020chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:3D551B6E929CF62F7AA66091E718704B
SHA256:1698A1B1BC3E86676392FB8BD4C712438302A5A2220503C08F290ED4B1790404
2112WinRAR.exeC:\Users\admin\Desktop\Launcher_x64\Install.exeexecutable
MD5:096C218FF118EDF534A918143680EE13
SHA256:0813CF4BDB8ACDB13EE466F0FCF010B744C6E029F47F5FE0A4B1EBE529A3DD7B
3840Install.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
3020chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:213AE3DA120D7862D60B5763B6C9D466
SHA256:5736534D6EE654C1BF1A8E79E73330AF58F622E8657285330D2C7189A55604F4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
11
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3140
chrome.exe
172.217.16.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3140
chrome.exe
172.217.18.163:443
www.google.com.ua
Google Inc.
US
whitelisted
3840
Install.exe
104.18.57.40:443
fiasyfssa.mywps.me
Cloudflare Inc
US
unknown
3140
chrome.exe
172.217.23.131:443
www.gstatic.com
Google Inc.
US
whitelisted
3140
chrome.exe
172.217.18.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3140
chrome.exe
172.217.16.173:443
accounts.google.com
Google Inc.
US
whitelisted
3140
chrome.exe
216.58.207.46:443
apis.google.com
Google Inc.
US
whitelisted
3140
chrome.exe
172.217.22.46:443
ogs.google.com
Google Inc.
US
whitelisted
3140
chrome.exe
216.58.210.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3140
chrome.exe
216.58.208.35:443
www.google.co.uk
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
fiasyfssa.mywps.me
  • 104.18.57.40
  • 104.18.56.40
suspicious
clientservices.googleapis.com
  • 172.217.16.131
whitelisted
accounts.google.com
  • 172.217.16.173
shared
www.google.com.ua
  • 172.217.18.163
whitelisted
fonts.googleapis.com
  • 172.217.18.106
whitelisted
www.gstatic.com
  • 172.217.23.131
whitelisted
fonts.gstatic.com
  • 216.58.210.3
whitelisted
apis.google.com
  • 216.58.207.46
whitelisted
ogs.google.com
  • 172.217.22.46
whitelisted
www.google.com
  • 172.217.21.228
whitelisted

Threats

No threats detected
No debug info