File name:

Phison_MPALL_v5.13.0C.rar

Full analysis: https://app.any.run/tasks/3fee59f4-c6ab-4cd1-88cc-bf433869f4b5
Verdict: Malicious activity
Analysis date: January 22, 2025, 10:45:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32, flags: Solid
MD5:

6DEB214436E047E6F736111F97C394B9

SHA1:

AB9FBDCAC8DC55FD646CBAD4996B98F53A2C2066

SHA256:

9670E21A30A78AF57E5C4B4A702DA1E8E8BF587CBC66A837B9E172F3B1A1182B

SSDEEP:

98304:JmKmjvLKc2HvGGJ0PfMzd12let30/zSMu0IeJkdwM9p3poTqpXqFJYAXOSrY0SWw:Y4PYM1ziN3lP9B9M+e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Creates files in the driver directory

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Creates or modifies Windows services

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Drops a system driver (possible attempt to evade defenses)

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Process drops legitimate windows executable

      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
  • INFO

    • Checks supported languages

      • GetInfo.exe (PID: 1448)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6352)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6352)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 6352)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6352)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Reads the computer name

      • GetInfo.exe (PID: 1448)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
    • Manual execution by a user

      • GetInfo.exe (PID: 1448)
      • MPALL_F1_9000_v513_0C.exe (PID: 5748)
      • MPALL_F1_9000_v513_0C.exe (PID: 4952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

FileVersion: RAR v4
CompressedSize: 595
UncompressedSize: 707
OperatingSystem: Win32
ModifyDate: 2020:10:25 21:12:46
PackingMethod: Best Compression
ArchivedFileName: Phison MPALL v5.13.0C\MP.ini
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs getinfo.exe mpall_f1_9000_v513_0c.exe no specs mpall_f1_9000_v513_0c.exe

Process information

PID
CMD
Path
Indicators
Parent process
1448"C:\Users\admin\Desktop\Phison MPALL v5.13.0C\GetInfo.exe" C:\Users\admin\Desktop\Phison MPALL v5.13.0C\GetInfo.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Version:
3, 12, 0, 2
Modules
Images
c:\users\admin\desktop\phison mpall v5.13.0c\getinfo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
4952"C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exe" C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exeexplorer.exe
User:
admin
Company:
Best Company
Integrity Level:
MEDIUM
Description:
Build by VC
Exit code:
3221226540
Version:
2.0.1.6
Modules
Images
c:\users\admin\desktop\phison mpall v5.13.0c\mpall_f1_9000_v513_0c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5748"C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exe" C:\Users\admin\Desktop\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exe
explorer.exe
User:
admin
Company:
Best Company
Integrity Level:
HIGH
Description:
Build by VC
Version:
2.0.1.6
Modules
Images
c:\users\admin\desktop\phison mpall v5.13.0c\mpall_f1_9000_v513_0c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
5916C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6352"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Phison_MPALL_v5.13.0C.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
1 781
Read events
1 763
Write events
18
Delete events
0

Modification events

(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Phison_MPALL_v5.13.0C.rar
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5748) MPALL_F1_9000_v513_0C.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cdrom
Operation:writeName:AutoRun
Value:
0
(PID) Process:(5748) MPALL_F1_9000_v513_0C.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\usbflags
Operation:writeName:IgnoreHWSerNum13fe3100
Value:
01
Executable files
14
Suspicious files
73
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_Micron_20160923.BINbinary
MD5:B9C4C34F4CEF6ECEAD01F5C57216741B
SHA256:0D62D8F535192525266D7F0535D0272F3B412A564A293EC43E67B3CC14F8D9C5
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\GetInfo.exeexecutable
MD5:E3223A2D8574CDB4F5352242BEC6B5E3
SHA256:52CA11FB8F8D64BB6074B70196AA178721067BA3FC7F110E7C5CE47977F6D98A
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_1p.BINbinary
MD5:819AF7FDF82C7125DF17EC15CA0A886F
SHA256:237756043A718FF743B544FF7D4B42D2A51D5340BA90A6C1E39896D073C93F5A
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\MPALL_F1_9000_v513_0C.exeexecutable
MD5:0B7385B9B717FD12FE45D984FBF91D0E
SHA256:F61E264404E768E80F1FE09C09205882B42EB2C2C773B18926E86070B28F0704
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\ST_ISP.initext
MD5:8F9F39CFFA8A79D8A59F294C07DB64DD
SHA256:4CF5478AC30F801277B5D68269532E04DD3845B6E0979CE125D610CFC5722B9E
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\IDBLK_TIMING.dllexecutable
MD5:1DAFD56538A94B6DA2B4C76C63981573
SHA256:7FA222EF7132D64218C9DE375F7B5B392AF3141AACB4A4BBB6ECE6203A8936F5
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_20170110_Checkoff.BINbinary
MD5:B5454F11FF1C65FA6A90D350CBEA4749
SHA256:AE7B80CB496BEC8ACF718D7AC2EFB790E8846E7153B24E4C392B5C3EC0EB6F31
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\MPParamEdit_F1.exeexecutable
MD5:ECCBD4D651C2A562586BECB85CC45B15
SHA256:A6F9A7E6357B570AED3B5F3F7AC15E7E6B4D89F0073245BDEBBC366591623B49
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\2267FW060334_25_2p.BINbinary
MD5:B3A7C64505E268A25CA25E95AF37A694
SHA256:7E65A9CFE642AFD9030412F45B222574295D7EBD9DBB25586BF3983C7C3DF88F
6352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6352.7872\Phison MPALL v5.13.0C\inpout32.dllexecutable
MD5:99ECECB007D9D62941AC0EDCDB4C265E
SHA256:2A08780ECD3A2C42BEBDA55D3EEC3A69A417312E7A884F89B53AECAD729B9AF3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6520
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7044
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7044
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.162:443
Akamai International B.V.
DE
unknown
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
104.126.37.161:443
Akamai International B.V.
DE
unknown
1076
svchost.exe
2.23.242.9:443
go.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.20
  • 40.126.32.138
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.72
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
Process
Message
GetInfo.exe
2
GetInfo.exe
3
MPALL_F1_9000_v513_0C.exe
LockPort
MPALL_F1_9000_v513_0C.exe
****CMPProgramDlg::GetVarFromIni
MPALL_F1_9000_v513_0C.exe
blEraseKeepEarly = 1
MPALL_F1_9000_v513_0C.exe
W7 GetMACaddress start
MPALL_F1_9000_v513_0C.exe
W7 GetMacAddress [96EE]
MPALL_F1_9000_v513_0C.exe
IgnoreHWSerNum13fe3100
MPALL_F1_9000_v513_0C.exe
IgnoreHWSerNum13fe3400
MPALL_F1_9000_v513_0C.exe
Get ini File 3