File name:

CHRFile01_2024-02-23_15_11_05.870.zip

Full analysis: https://app.any.run/tasks/bdb73749-d3ec-4bf9-aa28-678d4507adcb
Verdict: Malicious activity
Analysis date: February 23, 2024, 15:11:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v4.5 to extract, compression method=deflate
MD5:

3DC5DAB0D6F33BE6BB2C3D4A321DBBF1

SHA1:

1A0229D6D7E19AD661949585079EE3E41BA43DC7

SHA256:

964AB08EEF10DC0120D99FD3E696816AB572587BA0AA1941A785E177F9FC39B4

SSDEEP:

98304:xhJ2jiYSSRBCHo5VanaUtiJP8tqj0ov0z4ViPHWGwXzbfU7eycbg10HtSXUVvj0E:8hPrz8ru4AGUx6OkUa0uOQMAI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3864)
      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Reads Microsoft Outlook installation path

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Reads the Internet Settings

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Reads Internet Explorer settings

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Executable content was dropped or overwritten

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Process drops legitimate windows executable

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3864)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3864)
    • Checks supported languages

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
      • XSetupCpu.exe (PID: 2124)
    • Reads the computer name

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Checks proxy server information

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Reads the machine GUID from the registry

      • WC78XX_5.433.16.0_PCL6_x64.exe (PID: 3916)
    • Manual execution by a user

      • WINWORD.EXE (PID: 2580)
      • explorer.exe (PID: 3308)
      • WINWORD.EXE (PID: 2364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0801
ZipCompression: Deflated
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0x6cefcadf
ZipCompressedSize: 14284063
ZipUncompressedSize: 14456488
ZipFileName: Device/HarddiskVolume2/IT Stuff/Old Communications IT (do not use)/Xerox_AllinOne/WC78XX_5.433.16.0_PCL6_x64.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe wc78xx_5.433.16.0_pcl6_x64.exe xsetupcpu.exe no specs xsetupcpu.exe winword.exe no specs winword.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2124"C:\Xerox\XSetupCpu.exe" "/CMD32:Setup32.exe; /CMD64:Setup64.exe; /CMD:cmd.exe; /PARAM1:/C; /PARAM2:launch.bat"C:\Xerox\XSetupCpu.exe
WC78XX_5.433.16.0_PCL6_x64.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\xerox\xsetupcpu.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
2364"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\fridaycountry.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
2580"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\fridaycountry.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
2848"C:\Xerox\XSetupCpu.exe" "/CMD32:Setup32.exe; /CMD64:Setup64.exe; /CMD:cmd.exe; /PARAM1:/C; /PARAM2:launch.bat"C:\Xerox\XSetupCpu.exeWC78XX_5.433.16.0_PCL6_x64.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\xerox\xsetupcpu.exe
c:\windows\system32\ntdll.dll
3308"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3864"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\CHRFile01_2024-02-23_15_11_05.870.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3916"C:\Users\admin\AppData\Local\Temp\Rar$EXb3864.11396\Device\HarddiskVolume2\IT Stuff\Old Communications IT (do not use)\Xerox_AllinOne\WC78XX_5.433.16.0_PCL6_x64.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3864.11396\Device\HarddiskVolume2\IT Stuff\Old Communications IT (do not use)\Xerox_AllinOne\WC78XX_5.433.16.0_PCL6_x64.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3864.11396\device\harddiskvolume2\it stuff\old communications it (do not use)\xerox_allinone\wc78xx_5.433.16.0_pcl6_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
14 921
Read events
13 952
Write events
329
Delete events
640

Modification events

(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3864) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\CHRFile01_2024-02-23_15_11_05.870.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
36
Suspicious files
13
Text files
30
Unknown types
11

Dropped files

PID
Process
Filename
Type
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\ntprint.inf_amd64\amd64\pscript.hlphlp
MD5:02C3F8C32018F3AAF66E7421400F1781
SHA256:6FAEF4C998E810FFF139958F28722C79879EC2FD66C97C7E3E2C5040FD5550D9
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3864.11396\manifest.jsonini
MD5:CCBA7AF98F7765054660D8B1519B28DE
SHA256:C5D2A8C8DA203D7FA87BE447C6E6679844C988CB17AD176749562E0812AB31FC
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3864.11396\Device\HarddiskVolume2\IT Stuff\Old Communications IT (do not use)\Xerox_AllinOne\WC78XX_5.433.16.0_PCL6_x64.exeexecutable
MD5:D1E7B8F36231717DA7E51A6A68D04153
SHA256:2E6EE47DDEEA899DCA314BB6392EF52D02256AFBC86EFAD4E00DD5286AD74A36
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\WC78XX_5.433.16.0_PCL6_x64_Driver.inf\xDSPYxVH.iniini
MD5:125C6F5071350211FA2E907DCDC1EC91
SHA256:F81B434B950C8DAB86207013ED5B99B029FF8DFE7B9BD6BC869F239FCD1FECFA
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\WC78XX_5.433.16.0_PCL6_x64_Driver.inf\x2jobtVH.exeexecutable
MD5:433E9C66DD37AC3C72C37B9384EA0AB4
SHA256:5A6B228AA9F6B132172F2266C11CE76144E304A491F921DC40641E9EFF71C855
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\WC78XX_5.433.16.0_PCL6_x64_Driver.inf\x2DSPYX.infbinary
MD5:DA1EBF839942A05289A645A6E7E1B6C4
SHA256:8F47B4E3023304671561A999ED8030C05ED53127EC72597F9CCA7701FFC4585E
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\ntprint.inf_amd64\ntprint.inftxt
MD5:F48E91E4BF1F75722F4A5431FD4A3F44
SHA256:969A3DDD2C0CCBE1ED6873BE6A86D2DE2CEEDCD0DEDDB1059BB2155435416E96
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\Setup64.exeexecutable
MD5:FD730AA34EC1D82790F0EC33D62317E9
SHA256:B017890A6FEE8DE1F3BE73BEE510270CE1E4A2B356A13FDE15B924A93EC93AE0
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\ntprint.inf_amd64\amd64\unidrv.hlphlp
MD5:6798F64959C913673BD66CD4E47F4A65
SHA256:0C02B226BE4E7397F8C98799E58B0A512515E462CCDAAC04EDC10E3E1091C011
3916WC78XX_5.433.16.0_PCL6_x64.exeC:\Xerox\APWinstall.battext
MD5:5C059B0E9901394877D3A961114EECD0
SHA256:3490CD24E20999F1D79BFDCB3FFB3344C10CBC13DE987FA66ACAEEAA2964613B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info