File name:

7601.24214.180801-1700.win7sp1_ldr_escrow_CLIENT_ULTIMATE_x64FRE_en-us.iso.cmd

Full analysis: https://app.any.run/tasks/75853157-513e-434d-8ea4-3d189ce632f4
Verdict: Malicious activity
Analysis date: May 23, 2025, 15:55:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text
MD5:

488837D839EBB5E2706EDBAFF7E4702B

SHA1:

A3F0EC890C907C8E746F7629BFCA0A2B7EFF14A9

SHA256:

94FC80EFECC5B0C8677D6D05153BD3C6A7E4412D4B476F4C81541E6C3A8F3D11

SSDEEP:

48:z/sW2kfC0Uymve1bIJOepRSY0y1Wg7rwekEny3fRvbuLL8Ui:z7zfpukleSY06Xwe/yvluLIUi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads files via BITSADMIN.EXE

      • cmd.exe (PID: 7348)
  • SUSPICIOUS

    • Application launched itself

      • cmd.exe (PID: 7348)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7416)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 7348)
    • Executable content was dropped or overwritten

      • expand.exe (PID: 8068)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7348)
    • The executable file from the user directory is run by the CMD process

      • aria2c.exe (PID: 5408)
      • aria2c.exe (PID: 6384)
      • aria2c.exe (PID: 6964)
    • Drops 7-zip archiver for unpacking

      • expand.exe (PID: 8068)
  • INFO

    • Checks supported languages

      • expand.exe (PID: 8068)
      • aria2c.exe (PID: 5408)
      • aria2c.exe (PID: 6384)
      • aria2c.exe (PID: 6964)
    • Uses BITSADMIN.EXE

      • cmd.exe (PID: 7416)
    • Reads the machine GUID from the registry

      • expand.exe (PID: 8068)
      • aria2c.exe (PID: 5408)
      • aria2c.exe (PID: 6384)
      • aria2c.exe (PID: 6964)
    • Create files in a temporary directory

      • expand.exe (PID: 8068)
      • aria2c.exe (PID: 5408)
      • aria2c.exe (PID: 6384)
      • aria2c.exe (PID: 6964)
    • The sample compiled with english language support

      • expand.exe (PID: 8068)
    • Checks operating system version

      • cmd.exe (PID: 7348)
    • Reads the computer name

      • aria2c.exe (PID: 5408)
      • aria2c.exe (PID: 6384)
      • aria2c.exe (PID: 6964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
17
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs conhost.exe no specs cmd.exe no specs bitsadmin.exe no specs findstr.exe no specs bitsadmin.exe no specs sppextcomobj.exe no specs slui.exe no specs expand.exe cmd.exe no specs timeout.exe no specs aria2c.exe cmd.exe no specs cmd.exe no specs choice.exe no specs aria2c.exe aria2c.exe

Process information

PID
CMD
Path
Indicators
Parent process
900C:\WINDOWS\system32\cmd.exe /c type "C:\Users\admin\AppData\Local\Temp\1\list.txt"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5408"C:\Users\admin\AppData\Local\Temp\bin\aria2c.exe" -x1 -s1 -d"C:\Users\admin\AppData\Local\Temp\1" -o"list.txt" "https://files.rg-adguard.net/file/0f22b1bf-49db-25eb-07aa-36e932813793/list" --disable-ipv6C:\Users\admin\AppData\Local\Temp\bin\aria2c.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bin\aria2c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6384"C:\Users\admin\AppData\Local\Temp\bin\aria2c.exe" -x1 -s1 -d"C:\Users\admin\AppData\Local\Temp\1" -o"dl.txt" "https://files.rg-adguard.net/dl/free/0f22b1bf-49db-25eb-07aa-36e932813793" --disable-ipv6C:\Users\admin\AppData\Local\Temp\bin\aria2c.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bin\aria2c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
6620CHOICE /c fs /n /m "Save all or just the requested file?"C:\Windows\System32\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6964"C:\Users\admin\AppData\Local\Temp\bin\aria2c.exe" -x1 -s1 -j1 -c -R -d"C:\Users\admin\AppData\Local\Temp" -i"C:\Users\admin\AppData\Local\Temp\1\dl.txt" --disable-ipv6C:\Users\admin\AppData\Local\Temp\bin\aria2c.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\bin\aria2c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
7260C:\WINDOWS\system32\cmd.exe /c type "C:\Users\admin\AppData\Local\Temp\1\list.txt"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
7348C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\7601.24214.180801-1700.win7sp1_ldr_escrow_CLIENT_ULTIMATE_x64FRE_en-us.iso.cmd.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
7356\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7416C:\WINDOWS\system32\cmd.exe /c bitsadmin.exe /CREATE /DOWNLOAD "Download Tools" | findstr "Created job"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
7432bitsadmin.exe /CREATE /DOWNLOAD "Download Tools" C:\Windows\System32\bitsadmin.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BITS administration utility
Exit code:
0
Version:
7.8.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\bitsadmin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\sspicli.dll
Total events
1 068
Read events
1 068
Write events
0
Delete events
0

Modification events

No data
Executable files
8
Suspicious files
0
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
8068expand.exeC:\Users\admin\AppData\Local\Temp\bin\aria2c.exeexecutable
MD5:8C71B86BF407C05BAF11E8D296B9C8B8
SHA256:BE2099C214F63A3CB4954B09A0BECD6E2E34660B886D4C898D260FEBFE9D70C2
8068expand.exeC:\Users\admin\AppData\Local\Temp\bin\smv.exeexecutable
MD5:F3C45AE821B803E521B9E14B4B87EB1A
SHA256:93FBA2D50921565BCF283075BB3B8195F2B9B10719EC5123FBF06EA596A782B4
8068expand.exeC:\Users\admin\AppData\Local\Temp\bin\7z.cmdtext
MD5:5DD57ED7AFC26FFC598AF730B224CF52
SHA256:25C5A15960D922036F863879914C891A93830E773630F6E7EA4FCE35398AA440
8068expand.exeC:\Users\admin\AppData\Local\Temp\bin\7z.dllexecutable
MD5:4E35A902CA8ED1C3D4551B1A470C4655
SHA256:77222E81CB7004E8C3E077AADA02B555A3D38FB05B50C64AFD36CA230A8FD5B9
8068expand.exeC:\Users\admin\AppData\Local\Temp\bin\7z.exeexecutable
MD5:9A1DD1D96481D61934DCC2D568971D06
SHA256:8CEBB25E240DB3B6986FCAED6BC0B900FA09DAD763A56FB71273529266C5C525
8068expand.exeC:\Users\admin\AppData\Local\Temp\bin\smv.cmdtext
MD5:4DD25E07C4506DB89FE59962235E5CD4
SHA256:732B5B32C38AB6BADDAB060B2DF2BF21A75F97E8B9F7055DCDB245D10FE74A90
5408aria2c.exeC:\Users\admin\AppData\Local\Temp\1\list.txttext
MD5:DEF228F53DB878B48B42FEA2E5A82E30
SHA256:0996FFD50306B1F14DA56C55FD61C116F8C5DB585C22C2C7243A194DC3D598B6
6384aria2c.exeC:\Users\admin\AppData\Local\Temp\1\dl.txttext
MD5:967B6BAB579D9A2AE7C913F6DBC90D33
SHA256:817AA6D1B69A29736BEF24845F6A60CD5E4FCD613E53FADA4DE46ECD052B28CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
25
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
756
lsass.exe
GET
200
142.250.185.99:80
http://c.pki.goog/r/gsr1.crl
US
binary
1.70 Kb
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
868 b
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
868 b
whitelisted
756
lsass.exe
GET
200
142.250.185.99:80
http://c.pki.goog/r/r4.crl
US
binary
530 b
whitelisted
GET
200
23.216.77.43:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
whitelisted
3240
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
DE
binary
407 b
whitelisted
3240
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
DE
binary
419 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.43:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3812
svchost.exe
239.255.255.250:1900
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.43
  • 23.216.77.9
  • 23.216.77.25
  • 23.216.77.27
  • 23.216.77.37
  • 23.216.77.21
  • 23.216.77.5
  • 23.216.77.23
  • 23.216.77.34
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.159.131
  • 20.190.159.2
  • 20.190.159.68
  • 20.190.159.23
  • 40.126.31.69
  • 20.190.159.75
  • 20.190.159.128
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
files.rg-adguard.net
  • 104.21.48.1
  • 104.21.32.1
  • 104.21.16.1
  • 104.21.96.1
  • 104.21.80.1
  • 104.21.112.1
  • 104.21.64.1
whitelisted
c.pki.goog
  • 142.250.185.99
whitelisted
c8kcmvb5.rg-adguard.net
  • 104.21.48.1
  • 104.21.32.1
  • 104.21.112.1
  • 104.21.80.1
  • 104.21.16.1
  • 104.21.96.1
  • 104.21.64.1
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
No debug info