| File name: | SPAM.7z |
| Full analysis: | https://app.any.run/tasks/b46b388c-c431-427c-984a-5af2691ffb3e |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | March 24, 2025, 11:47:20 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | BFBB8576405234C7201DD921FFE3503B |
| SHA1: | 6913E85074F255B0E66594245CC8A845673E37CB |
| SHA256: | 8DBA826D9AFCCE08018A7FC7CA2B6EFD9293398B1C95655A85B3B4C26BCDD898 |
| SSDEEP: | 393216:z74/xMY2HbGuojrlSSKKn1BwtVKy7cC+UtGk7Eoi:fsm77Yrl1DjM0AcC+cuoi |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|---|
| ModifyDate: | 2025:03:24 02:13:08+00:00 |
| ArchivedFileName: | VER_006764817_2025-24-05-44202007_86580124F6N.vbs |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 720 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\Desktop\SPAM\VER_041159253_2025-24-05-1113564896_2052T7H4.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 744 | "C:\Users\Public\CbeSpyEHHZCQ.exe" | C:\Users\Public\CbeSpyEHHZCQ.exe | wscript.exe | ||||||||||||
User: admin Company: CloudBridge Solutions 8624285 Inc. Integrity Level: MEDIUM Description: Advanced Data Protection Management 8624285, 35817.23513.13747.61906, Y242. Version: 35817.23513.13747.61906 Modules
| |||||||||||||||
| 1164 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\Desktop\SPAM\VER_44203466585_2025-24-05-6430590109_7338057XR26.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 1276 | "C:\Users\Public\NxfFrgEOdmrgKIrmYPJtX.exe" | C:\Users\Public\NxfFrgEOdmrgKIrmYPJtX.exe | wscript.exe | ||||||||||||
User: admin Company: CloudBridge Solutions 437756 Inc. Integrity Level: MEDIUM Description: Advanced Data Protection Management 437756, 49590.13709.32418.30035, I821. Exit code: 0 Version: 49590.13709.32418.30035 Modules
| |||||||||||||||
| 1672 | "C:\Users\Public\lwRdZCigjFAjd.exe" | C:\Users\Public\lwRdZCigjFAjd.exe | wscript.exe | ||||||||||||
User: admin Company: CloudBridge Solutions 4596154 Inc. Integrity Level: MEDIUM Description: Advanced Data Protection Management 4596154, 18735.63608.52600.57062, I404. Version: 18735.63608.52600.57062 Modules
| |||||||||||||||
| 2088 | "C:\Users\Public\yHjotMriAPjhRPgEGATKBEIAKAJI.exe" | C:\Users\Public\yHjotMriAPjhRPgEGATKBEIAKAJI.exe | wscript.exe | ||||||||||||
User: admin Company: CloudBridge Solutions 0730194 Inc. Integrity Level: MEDIUM Description: Advanced Data Protection Management 0730194, 31086.26765.11881.17806, R739. Version: 31086.26765.11881.17806 Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2560 | "C:\Users\Public\gcGtGcGrKWcwqRIJFW.exe" | C:\Users\Public\gcGtGcGrKWcwqRIJFW.exe | wscript.exe | ||||||||||||
User: admin Company: CloudBridge Solutions 3051868 Inc. Integrity Level: MEDIUM Description: Advanced Data Protection Management 3051868, 13001.55083.42695.44047, R807. Version: 13001.55083.42695.44047 Modules
| |||||||||||||||
| 2772 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\Desktop\SPAM\VER_081313490_2025-24-05-86712836_7756601174.vbs" | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 2800 | "C:\Users\Public\gVLlAogOOvonQYNBHHtQXkthhfIS.exe" | C:\Users\Public\gVLlAogOOvonQYNBHHtQXkthhfIS.exe | wscript.exe | ||||||||||||
User: admin Company: CloudBridge Solutions 5807457 Inc. Integrity Level: MEDIUM Description: Advanced Data Protection Management 5807457, 16433.52435.45617.60111, Y282. Version: 16433.52435.45617.60111 Modules
| |||||||||||||||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\SPAM.7z | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (8100) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (7408) SIHClient.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\sih\sls\{522D76A4-93E1-47F8-B8CE-07C937AD1A1E}\/SLS/{522D76A4-93E1-47F8-B8CE-07C937AD1A1E}/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL |
| Operation: | write | Name: | Expires |
Value: 2025-03-26 11:48:11 | |||
| (PID) Process: | (7408) SIHClient.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\sih\sls\{522D76A4-93E1-47F8-B8CE-07C937AD1A1E}\/SLS/{522D76A4-93E1-47F8-B8CE-07C937AD1A1E}/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL |
| Operation: | write | Name: | LastModified |
Value: 2001-01-01 00:00:00 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4120 | WinRAR.exe | C:\Users\admin\Desktop\SPAM\VER_04721852_2025-24-05-5145244081_60896ZA39Q5.vbs | text | |
MD5:6C8D9DB6D5CE33A9A66358071B88461C | SHA256:6DD776C16C704ABED1E6AE6FF3848690B5B3E28B4180875238F0C1308F023AAC | |||
| 4120 | WinRAR.exe | C:\Users\admin\Desktop\SPAM\VER_006764817_2025-24-05-44202007_86580124F6N.vbs | text | |
MD5:93DDC8B7838A14C96843C1A1BDB6CDF4 | SHA256:D6E823FA5D81B3878F04BCBAF4FAD22279BC8E8C872A3F77323CAF265A282C43 | |||
| 7408 | SIHClient.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9E94643DE99F5621BC288D045BEA85DD | binary | |
MD5:B69C738C71C947FD12B66D6319DF84A5 | SHA256:5582F1CB870F1C1801E659399C2295CB131E180893A6E54FC992B0DCD2FB88A2 | |||
| 7408 | SIHClient.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\51867C3735CFAECCDB556E146BB12C28 | binary | |
MD5:F6E0F40130BB0E42121D40A03EE56ADA | SHA256:C3541DE3AE73D6B440B237548B8ABE7528833DC9A2CBB57621EFD87585AD1DFE | |||
| 7408 | SIHClient.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\51867C3735CFAECCDB556E146BB12C28 | binary | |
MD5:C9F83563ECF15CF675A4207F4FBD5524 | SHA256:84AAF3B97C1E91817DF5EE7C854B8D43221EC57BC58AC2670007D369F8A890F4 | |||
| 4120 | WinRAR.exe | C:\Users\admin\Desktop\SPAM\VER_041159253_2025-24-05-1113564896_2052T7H4.vbs | text | |
MD5:C8EE509A00416DEAFAFA9E2A6EFAB5D5 | SHA256:4A71A5F71BFC9C8AFBE5A5346BCEE5D798FF1200BCB33F410082768A44C96CE7 | |||
| 6972 | wscript.exe | C:\Users\Public\JXGFSJrsmni5H8BAB0Z420Y3NDKNMSyravs.yls | — | |
MD5:— | SHA256:— | |||
| 4120 | WinRAR.exe | C:\Users\admin\Desktop\SPAM\VER_071167030_2025-24-05-735831680_0959H650.vbs | text | |
MD5:CFB4EAC44E7284B5B35D0D7560FE7EDE | SHA256:F8DBAF0FBCAA27D782B25802573D0D029EF76CA4CBAC97E2A0D4C0C586C5071B | |||
| 6972 | wscript.exe | C:\Users\Public\NxfFrgEOdmrgKIrmYPJtX.exe | — | |
MD5:— | SHA256:— | |||
| 4120 | WinRAR.exe | C:\Users\admin\Desktop\SPAM\VER_1151366825_2025-24-05-49588327960_5044GO2G7X.vbs | text | |
MD5:ED86DE2D0452CD86A62008F2C208E9B2 | SHA256:AE471E8035D65784507DCB6FF5A1904A571664A33334962927AA6D6A190D7F57 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7804 | backgroundTaskHost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
7408 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7408 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6544 | svchost.exe | 40.126.31.1:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
— | — | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7804 | backgroundTaskHost.exe | 20.31.169.57:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7804 | backgroundTaskHost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
7408 | SIHClient.exe | 20.12.23.50:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite) |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
2196 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite) |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite) |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
1276 | NxfFrgEOdmrgKIrmYPJtX.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite) |