URL:

http://www.newtechnologiesweb.com/downloads/Descargas_2_03_0019_COPY.zip

Full analysis: https://app.any.run/tasks/c3aac70f-33b7-4ea1-91c7-6706e5ff008a
Verdict: Malicious activity
Analysis date: May 17, 2024, 12:33:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
exploit
Indicators:
MD5:

2BCD3D52FF51957F7B2BFE8B79DEB0A3

SHA1:

4B45F03223A21C0800CB1E97CCA30E0D999BD661

SHA256:

8B017EF805F1C32CAD661C5E54E1B86ED78001D807B650D56176E5CFDA32F98B

SSDEEP:

3:N1KJS40iAaeqHzKXKgEwOc41/:Cc40qmagXz41/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 764)
    • Reads security settings of Internet Explorer

      • DescargasEjecutor.exe (PID: 2256)
      • Descargas.exe (PID: 1980)
      • DescargasEjecutor.exe (PID: 2516)
      • Descargas.exe (PID: 1888)
    • Reads the Internet Settings

      • DescargasEjecutor.exe (PID: 2256)
      • DescargasEjecutor.exe (PID: 2516)
      • Descargas.exe (PID: 1980)
      • Descargas.exe (PID: 1888)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 2032)
      • DescargasEjecutor.exe (PID: 2256)
      • DescargasEjecutor.exe (PID: 2516)
      • Descargas.exe (PID: 1980)
      • Descargas.exe (PID: 1888)
    • Application launched itself

      • iexplore.exe (PID: 3968)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2032)
      • DescargasEjecutor.exe (PID: 2256)
      • DescargasEjecutor.exe (PID: 2516)
      • Descargas.exe (PID: 1980)
      • Descargas.exe (PID: 1888)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2032)
      • DescargasEjecutor.exe (PID: 2256)
      • DescargasEjecutor.exe (PID: 2516)
      • Descargas.exe (PID: 1980)
      • Descargas.exe (PID: 1888)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3968)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3968)
      • WinRAR.exe (PID: 764)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 764)
    • Reads the machine GUID from the registry

      • DescargasEjecutor.exe (PID: 2256)
      • DescargasEjecutor.exe (PID: 2516)
      • Descargas.exe (PID: 1980)
      • Descargas.exe (PID: 1888)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 764)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
8
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs winrar.exe descargasejecutor.exe descargasejecutor.exe descargas.exe no specs descargas.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
764"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY.zip"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1888"C:\Users\admin\Desktop\Descargas.exe" C:\Users\admin\Desktop\Descargas.exeexplorer.exe
User:
admin
Company:
New Technologies
Integrity Level:
MEDIUM
Description:
Descargas
Exit code:
2
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\descargas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1980"C:\Users\admin\Desktop\Descargas.exe" C:\Users\admin\Desktop\Descargas.exeexplorer.exe
User:
admin
Company:
New Technologies
Integrity Level:
MEDIUM
Description:
Descargas
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\descargas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2032"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2256"C:\Users\admin\Desktop\DescargasEjecutor.exe" C:\Users\admin\Desktop\DescargasEjecutor.exe
explorer.exe
User:
admin
Company:
New Technologies
Integrity Level:
MEDIUM
Description:
Descargas
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\descargasejecutor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2516"C:\Users\admin\Desktop\DescargasEjecutor.exe" C:\Users\admin\Desktop\DescargasEjecutor.exe
explorer.exe
User:
admin
Company:
New Technologies
Integrity Level:
MEDIUM
Description:
Descargas
Exit code:
1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\descargasejecutor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3968"C:\Program Files\Internet Explorer\iexplore.exe" "http://www.newtechnologiesweb.com/downloads/Descargas_2_03_0019_COPY.zip"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
4028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3968 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
23 034
Read events
22 838
Write events
153
Delete events
43

Modification events

(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31107158
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31107158
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3968) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
55
Suspicious files
185
Text files
110
Unknown types
1

Dropped files

PID
Process
Filename
Type
3968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verCE00.tmpxml
MD5:CBD0581678FA40F0EDCBC7C59E0CAD10
SHA256:159BD4343F344A08F6AF3B716B6FA679859C1BD1D7030D26FF5EF0255B86E1D9
3968iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:F646488E081A5C175CE1FB03BA482264
SHA256:E6312E65983DF0745340CF492DE216BE2CF14F34CEBA56A53B26A5F196C31F8F
3968iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:4BB3C3F1734E9FB2A30A07590075DBB6
SHA256:F6B094F29B463F62AA4879CF54AE9AD884178727C9341CAFDBB8619C669DB2E2
3968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY.zipcompressed
MD5:1A49A6BEEBB7EE72ABE3207ACC29C636
SHA256:18FDF19FB06D8B731D69B589C6DEA6A4F5D97A33534C987255E48673E3CB50BD
764WinRAR.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY\CapturadorFD_2_0.jarcompressed
MD5:605C9CE5349142D10EE8CD229D0F6429
SHA256:F468C12F79C058EF94C9E6B5FE1448795113751A06C86B2769386C2E93C01D7D
764WinRAR.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY\curl-ca-bundle.crttext
MD5:CBA7B319792B372675225B57279BE08E
SHA256:6ED95025FBA2AEF0CE7B647607225745624497F876D74EF6EC22B26E73E9DE77
764WinRAR.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY\Descargas1.dllexecutable
MD5:E2E5B426431E8C55E5712901620C98F3
SHA256:96DDFEE167EA54BD6D022C537ADDD7D0FE69C269D7673996CCFD6F6180229582
764WinRAR.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY\Descargas.exeexecutable
MD5:F48AA2C02A7864C2181091F22C93A8F5
SHA256:0C037248C745A197B569194F3ED7A68BA897C572A24568C547435CE2340507DA
764WinRAR.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY\Castle.Core.dllexecutable
MD5:29E9BE2F8BEA5D7923CD906C1F2B9464
SHA256:27D72253A5F37D971D7BC7341ABEEFACEC2CCDC3A305B297248C9791C678FAA9
764WinRAR.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Descargas_2_03_0019_COPY\Descargas.chmbinary
MD5:18433015FB3C6317F9A8E0B7500126F6
SHA256:EB7A23C5255D613BD2566A56332A12672D6A608774515081CA2CD50D05CADD94
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
21
DNS requests
11
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4028
iexplore.exe
GET
209.59.169.153:80
http://www.newtechnologiesweb.com/downloads/Descargas_2_03_0019_COPY.zip
unknown
unknown
3968
iexplore.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c21588876f974d24
unknown
unknown
3968
iexplore.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7d495c908dca8b32
unknown
unknown
3968
iexplore.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?375896791b56e52b
unknown
unknown
1088
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?4f7497503626c948
unknown
unknown
3968
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
4028
iexplore.exe
GET
206
209.59.169.153:80
http://www.newtechnologiesweb.com/downloads/Descargas_2_03_0019_COPY.zip
unknown
unknown
3968
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
3968
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
unknown
unknown
3968
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4028
iexplore.exe
209.59.169.153:80
www.newtechnologiesweb.com
LIQUIDWEB
US
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3968
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted
3968
iexplore.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3968
iexplore.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3968
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1088
svchost.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3968
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3968
iexplore.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
www.newtechnologiesweb.com
  • 209.59.169.153
unknown
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
www.msn.com
  • 131.253.33.203
whitelisted

Threats

PID
Process
Class
Message
Attempted Administrator Privilege Gain
AV EXPLOIT Potential ZIP file exploiting CVE-2023-36413
Process
Message
DescargasEjecutor.exe
log4net:ERROR Appender named [ADDebug] not found.
DescargasEjecutor.exe
log4net:ERROR XmlHierarchyConfigurator: No appender named [ADDebug] could be found.
DescargasEjecutor.exe
log4net:ERROR XmlHierarchyConfigurator: No appender named [ADResultados] could be found.
DescargasEjecutor.exe
log4net:ERROR Appender named [ADResultados] not found.
DescargasEjecutor.exe
log4net:ERROR Appender named [ADResultados] not found.
DescargasEjecutor.exe
log4net:ERROR XmlHierarchyConfigurator: No appender named [ADDebug] could be found.
DescargasEjecutor.exe
log4net:ERROR Appender named [ADDebug] not found.
DescargasEjecutor.exe
log4net:ERROR XmlHierarchyConfigurator: No appender named [ADResultados] could be found.