File name:

Phison_MPALL_v5.13.0C.rar

Full analysis: https://app.any.run/tasks/3fee59f4-c6ab-4cd1-88cc-bf433869f4b5
Verdict: Malicious activity
Analysis date: January 22, 2025, 10:45:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32, flags: Solid
MD5:

6DEB214436E047E6F736111F97C394B9

SHA1:

AB9FBDCAC8DC55FD646CBAD4996B98F53A2C2066

SHA256:

9670E21A30A78AF57E5C4B4A702DA1E8E8BF587CBC66A837B9E172F3B1A1182B

SSDEEP:

98304:JmKmjvLKc2HvGGJ0PfMzd12let30/zSMu0IeJkdwM9p3poTqpXqFJYAXOSrY0SWw:Y4PYM1ziN3lP9B9M+e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Drops a system driver (possible attempt to evade defenses)

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Creates files in the driver directory

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Creates or modifies Windows services

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Process drops legitimate windows executable

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6352)
    • Manual execution by a user

      • GetInfo.exe (PID: 1448)
      • MPALL_F1_9000_v513_0C.exe (PID: 4952)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Reads the computer name

      • GetInfo.exe (PID: 1448)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Checks supported languages

      • GetInfo.exe (PID: 1448)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • The sample compiled with english language support

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
      • WinRAR.exe (PID: 6352)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6352)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 6352)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

FileVersion: RAR v4
CompressedSize: 595
UncompressedSize: 707
OperatingSystem: Win32
ModifyDate: 2020:10:25 21:12:46
PackingMethod: Best Compression
ArchivedFileName: Phison MPALL v5.13.0C\MP.ini
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs getinfo.exe mpall_f1_9000_v513_0c.exe no specs mpall_f1_9000_v513_0c.exe

Process information

PID
CMD
Path
Indicators
Parent process
1448"C:\Users\admin\Desktop\Phison MPALL v5.13.0C\GetInfo.exe" C:\Users\admin\Desktop\Phison MPALL v5.13.0C\GetInfo.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Version:
3, 12, 0, 2
Modules
Images
c:\users\admin\desktop\phison mpall v5.13.0c\getinfo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
4952"C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exe" C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exeexplorer.exe
User:
admin
Company:
Best Company
Integrity Level:
MEDIUM
Description:
Build by VC
Exit code:
3221226540
Version:
2.0.1.6
Modules
Images
c:\users\admin\desktop\phison mpall v5.13.0c\mpall_f1_9000_v513_0c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5748"C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exe" C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exe
explorer.exe
User:
admin
Company:
Best Company
Integrity Level:
HIGH
Description:
Build by VC
Version:
2.0.1.6
Modules
Images
c:\users\admin\desktop\phison mpall v5.13.0c\mpall_f1_9000_v513_0c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
5916C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6352"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Phison_MPALL_v5.13.0C.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
1 781
Read events
1 763
Write events
18
Delete events
0

Modification events

(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Phison_MPALL_v5.13.0C.rar
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5748) MPALL_F1_9000_v513_0C.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cdrom
Operation:writeName:AutoRun
Value:
0
(PID) Process:(5748) MPALL_F1_9000_v513_0C.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\usbflags
Operation:writeName:IgnoreHWSerNum13fe3100
Value:
01
Executable files
14
Suspicious files
73
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_2p.BINbinary
MD5:55C95DE47198F8473C5DD64F5D573964
SHA256:0C9427FD08D4285622FA53BCC37A8AFB0DAC1535957CCB9D81849910A6E2BFF3
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_25_2p.BINbinary
MD5:B3A7C64505E268A25CA25E95AF37A694
SHA256:7E65A9CFE642AFD9030412F45B222574295D7EBD9DBB25586BF3983C7C3DF88F
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_Micron_20160923.BINbinary
MD5:B9C4C34F4CEF6ECEAD01F5C57216741B
SHA256:0D62D8F535192525266D7F0535D0272F3B412A564A293EC43E67B3CC14F8D9C5
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_Hynix_20171003.BINbinary
MD5:305B48E3D9A30DC6DC9A0CE892806543
SHA256:5ED305E2AF8B40C4BD339E036BE1E21CEB8A021D805568FF89BC4CF276514800
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\IDBLK_TIMING.dllexecutable
MD5:1DAFD56538A94B6DA2B4C76C63981573
SHA256:7FA222EF7132D64218C9DE375F7B5B392AF3141AACB4A4BBB6ECE6203A8936F5
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_1p.BINbinary
MD5:819AF7FDF82C7125DF17EC15CA0A886F
SHA256:237756043A718FF743B544FF7D4B42D2A51D5340BA90A6C1E39896D073C93F5A
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2261PRAM_20171019.BINbinary
MD5:ED0A2A5F61184384652EDD95023D6095
SHA256:6046750A5EF7E65253D18328E61F02C90DBA47F896951175255BC467812CE02F
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_20170110_Checkoff.BINbinary
MD5:B5454F11FF1C65FA6A90D350CBEA4749
SHA256:AE7B80CB496BEC8ACF718D7AC2EFB790E8846E7153B24E4C392B5C3EC0EB6F31
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_Hynix_20161128.BINbinary
MD5:0A20AC54D30DA442B11F2AE93E5131D3
SHA256:A5A6CEF41BF6E78E3695F39790BC031160E5654A10F71B72DFE27DD738008C0E
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_20170921_8K.BINbinary
MD5:460B08153695F33E59471FBCB07F2BCB
SHA256:EE0814C26754DB5A059B1A41E83185FD5DB9E8C9E5460FE6EB522F941447F1D3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
RU
binary
1.01 Kb
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
QA
binary
973 b
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
QA
binary
973 b
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
6520
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
DE
binary
471 b
whitelisted
7044
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
QA
binary
408 b
whitelisted
7044
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
QA
binary
419 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.162:443
Akamai International B.V.
DE
unknown
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
104.126.37.161:443
Akamai International B.V.
DE
unknown
1076
svchost.exe
2.23.242.9:443
go.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.20
  • 40.126.32.138
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.72
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
Process
Message
GetInfo.exe
2
GetInfo.exe
3
MPALL_F1_9000_v513_0C.exe
LockPort
MPALL_F1_9000_v513_0C.exe
****CMPProgramDlg::GetVarFromIni
MPALL_F1_9000_v513_0C.exe
blEraseKeepEarly = 1
MPALL_F1_9000_v513_0C.exe
W7 GetMACaddress start
MPALL_F1_9000_v513_0C.exe
W7 GetMacAddress [96EE]
MPALL_F1_9000_v513_0C.exe
IgnoreHWSerNum13fe3100
MPALL_F1_9000_v513_0C.exe
IgnoreHWSerNum13fe3400
MPALL_F1_9000_v513_0C.exe
Get ini File 3