File name:

Silent Crypto Miner Builder v3.2.1.zip

Full analysis: https://app.any.run/tasks/cb3793d1-c8dc-48de-aa1f-d460e63246a9
Verdict: Malicious activity
Analysis date: August 11, 2024, 14:43:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

885523DD16A5B4E4B9B2CB5DC65F585B

SHA1:

735BF7649747703C7180260E41742353711F79CA

SHA256:

935A951302E7D7F90234307ACAA2554519D6F9277FC5CFC177658A24C54DE3FE

SSDEEP:

98304:QS6VBfqIbpFwJ5K5uhdaSyCiPJW6gt1TPFf+x04j5ra6xQNlQRRlU9U+zMtzl9Sf:+vsGtuZSu6Rgl5ec

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6484)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 6484)
      • index.exe (PID: 30672)
      • index.exe (PID: 6716)
    • The process drops C-runtime libraries

      • index.exe (PID: 6716)
      • index.exe (PID: 30672)
    • Process drops legitimate windows executable

      • index.exe (PID: 30672)
      • index.exe (PID: 6716)
    • Process drops python dynamic module

      • index.exe (PID: 30672)
      • index.exe (PID: 6716)
    • Executable content was dropped or overwritten

      • index.exe (PID: 30672)
      • index.exe (PID: 6716)
    • Loads Python modules

      • index.exe (PID: 6736)
      • index.exe (PID: 31220)
    • Application launched itself

      • index.exe (PID: 30672)
      • index.exe (PID: 6716)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6484)
    • Reads the computer name

      • index.exe (PID: 6716)
      • index.exe (PID: 6736)
      • index.exe (PID: 30672)
      • index.exe (PID: 31220)
      • TextInputHost.exe (PID: 10288)
    • Checks supported languages

      • index.exe (PID: 6716)
      • index.exe (PID: 30672)
      • index.exe (PID: 31220)
      • TextInputHost.exe (PID: 10288)
      • index.exe (PID: 6736)
    • Create files in a temporary directory

      • index.exe (PID: 6716)
      • index.exe (PID: 30672)
    • Checks proxy server information

      • index.exe (PID: 6736)
      • index.exe (PID: 31220)
    • Reads the machine GUID from the registry

      • index.exe (PID: 6736)
      • index.exe (PID: 31220)
    • PyInstaller has been detected (YARA)

      • index.exe (PID: 6716)
      • index.exe (PID: 30672)
      • index.exe (PID: 6736)
      • index.exe (PID: 31220)
    • Manual execution by a user

      • notepad.exe (PID: 33156)
      • mspaint.exe (PID: 55612)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 33156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:06:21 15:08:06
ZipCRC: 0x0698735a
ZipCompressedSize: 6325580
ZipUncompressedSize: 6499201
ZipFileName: index.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
8
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe THREAT index.exe THREAT index.exe THREAT index.exe THREAT index.exe notepad.exe no specs textinputhost.exe no specs mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6484"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Silent Crypto Miner Builder v3.2.1.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6716"C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.25899\index.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.25899\index.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6484.25899\index.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6736"C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.25899\index.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.25899\index.exe
index.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6484.25899\index.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
10288"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
30672"C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.30010\index.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.30010\index.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6484.30010\index.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
31220"C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.30010\index.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6484.30010\index.exe
index.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6484.30010\index.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
33156"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\info.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
55612"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\ageapproach.jpg"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Total events
300 590
Read events
300 563
Write events
27
Delete events
0

Modification events

(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Silent Crypto Miner Builder v3.2.1.zip
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
33
Suspicious files
2
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\_bz2.pydexecutable
MD5:E877E39CC3C42ED1F5461E2D5E62FC0F
SHA256:4B1D29F19ADAF856727FA4A1F50EEE0A86C893038DFBA2E52F26C11AB5B3672F
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\_hashlib.pydexecutable
MD5:4FB84E5D3F58453D7CCBF7BCC06266A0
SHA256:DF47255C100D9CC033A14C7D60051ABE89C24DA9C60362FE33CDF24C19651F7C
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\base_library.zipcompressed
MD5:D33D5A354DC5A45E58934FE6BB9DFE86
SHA256:B1304CFD03D0B5CC77FB36ACCA6073C3BD286F4073E95B7B54C4C4EE3C71BA04
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\libcrypto-1_1.dllexecutable
MD5:63C4F445B6998E63A1414F5765C18217
SHA256:664C3E52F914E351BB8A66CE2465EE0D40ACAB1D2A6B3167AE6ACF6F1D1724D2
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\_queue.pydexecutable
MD5:7E7D6DA688789AA48094EDA82BE671B7
SHA256:9AD5BCF2A88E1FFFF3B8EE29235DC92CE48B7FCA4655E87CB6E4D71BD1150AFB
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\certifi\cacert.pemtext
MD5:D3E74C9D33719C8AB162BAA4AE743B27
SHA256:7A347CA8FEF6E29F82B6E4785355A6635C17FA755E0940F65F15AA8FC7BD7F92
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\python310.dllexecutable
MD5:316CE972B0104D68847AB38ABA3DE06A
SHA256:34F0E44A0D089587E1EA48C1CC4C3164A1819C6DB27A7C1B746AF46D6388C26E
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\libssl-1_1.dllexecutable
MD5:BD857F444EBBF147A8FCD1215EFE79FC
SHA256:B7C0E42C1A60A2A062B899C8D4EBD0C50EF956177BA21785CE07C517C143AEAF
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\charset_normalizer\md__mypyc.cp310-win_amd64.pydexecutable
MD5:494F5B9ADC1CFB7FDB919C9B1AF346E1
SHA256:AD9BCC0DE6815516DFDE91BB2E477F8FB5F099D7F5511D0F54B50FA77B721051
6716index.exeC:\Users\admin\AppData\Local\Temp\_MEI67162\charset_normalizer\md.cp310-win_amd64.pydexecutable
MD5:F33CA57D413E6B5313272FA54DBC8BAA
SHA256:9B3D70922DCFAEB02812AFA9030A40433B9D2B58BCF088781F9AB68A74D20664
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
18 367
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4292
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
18200
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
18144
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
1164
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5588
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6736
index.exe
37.230.118.111:443
riadagestan.ru
JSC IOT
RU
unknown
31220
index.exe
37.230.118.111:443
riadagestan.ru
JSC IOT
RU
unknown
5336
SearchApp.exe
104.126.37.171:443
www.bing.com
Akamai International B.V.
DE
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
  • 20.73.194.208
whitelisted
riadagestan.ru
  • 37.230.118.111
whitelisted
www.bing.com
  • 104.126.37.171
  • 104.126.37.163
  • 104.126.37.168
  • 104.126.37.154
  • 104.126.37.179
  • 104.126.37.161
  • 104.126.37.169
  • 104.126.37.162
  • 104.126.37.160
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.179
  • 104.126.37.128
  • 104.126.37.123
  • 104.126.37.137
  • 104.126.37.169
  • 104.126.37.136
  • 104.126.37.171
  • 104.126.37.130
  • 104.126.37.186
whitelisted
r.bing.com
  • 104.126.37.160
  • 104.126.37.162
  • 104.126.37.170
  • 104.126.37.161
  • 104.126.37.153
  • 104.126.37.163
  • 104.126.37.145
  • 104.126.37.146
  • 104.126.37.155
whitelisted
browser.pipe.aria.microsoft.com
  • 20.44.10.122
whitelisted
client.wns.windows.com
  • 40.113.103.199
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.4
  • 20.190.159.64
  • 20.190.159.71
  • 40.126.31.69
  • 20.190.159.23
  • 40.126.31.71
  • 20.190.159.68
whitelisted

Threats

No threats detected
No debug info