File name:

Mad Hackers S2M Sender.zip

Full analysis: https://app.any.run/tasks/e93bfe78-b6c6-4014-9cc2-1f6963335c28
Verdict: Malicious activity
Analysis date: October 31, 2023, 23:10:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

105194348E1959541E1869706A061F77

SHA1:

1CA6B9A0977BC0B058C23537120F396FEB236D32

SHA256:

999BE5F2D390251B0BEBCFDE7D6381B100912953914B5BAC07B575E1551D9D61

SSDEEP:

98304:6qQCVJiiig2At7LjryQWMbMz0hVvCrLuI1kfPcPg+RZ9Y6yCLipj2IGY+7fm69KC:nXk+aKawPuNgurxPqnF4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • send.exe (PID: 3736)
      • svchost.exe (PID: 1840)
      • Setup.exe (PID: 3776)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • send.exe (PID: 3736)
      • svchost.exe (PID: 1840)
      • Setup.exe (PID: 3776)
    • Reads the Internet Settings

      • send.exe (PID: 3736)
      • Setup.exe (PID: 3776)
      • svchost.exe (PID: 1840)
    • Creates executable files that already exist in Windows

      • Setup.exe (PID: 3776)
      • svchost.exe (PID: 1840)
    • Reads settings of System Certificates

      • svchost.exe (PID: 1840)
    • The process creates files with name similar to system file names

      • svchost.exe (PID: 1840)
      • Setup.exe (PID: 3776)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2564)
    • Checks supported languages

      • send.exe (PID: 3736)
      • Setup.exe (PID: 2976)
      • Setup.exe (PID: 3776)
      • svchost.exe (PID: 1840)
    • Reads the computer name

      • send.exe (PID: 3736)
      • Setup.exe (PID: 2976)
      • Setup.exe (PID: 3776)
      • svchost.exe (PID: 1840)
    • Manual execution by a user

      • send.exe (PID: 3736)
      • notepad++.exe (PID: 240)
    • Create files in a temporary directory

      • send.exe (PID: 3736)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 2976)
      • send.exe (PID: 3736)
      • Setup.exe (PID: 3776)
      • svchost.exe (PID: 1840)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 3776)
      • svchost.exe (PID: 1840)
    • Reads Environment values

      • svchost.exe (PID: 1840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:09:07 02:19:08
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Mad Hacker's S2M Sender/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs send.exe no specs setup.exe no specs setup.exe no specs svchost.exe notepad++.exe

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\config.toml"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1840"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
8.1.1.7900
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\templates\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2564"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Mad Hackers S2M Sender.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2976"C:\Users\admin\AppData\Local\Temp\Setup.exe" C:\Users\admin\AppData\Local\Temp\Setup.exesend.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
8.1.1.7900
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3736"C:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\send.exe" C:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\send.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\mad hackers s2m sender\mad hacker's s2m sender\send.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3776"C:\Users\admin\AppData\Local\Temp\Setup.exe" C:\Users\admin\AppData\Local\Temp\Setup.exesend.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
8.1.1.7900
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
Total events
5 854
Read events
5 794
Write events
60
Delete events
0

Modification events

(PID) Process:(2564) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3736) send.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3736) send.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
5
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\file\links\links.txttext
MD5:759E3F11A2BB6517FE44DB56396E98FF
SHA256:FA0E5107F7EAEF442DBDDA0A805CA5EDE8A2E6457A0D2AF44F34E42324373870
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\doc\requirements.txttext
MD5:DF7561B725E50E527ABED0E3E57D4E33
SHA256:B89FE52C982E70403EF979BD637D2CFE3439846A02B11B435FE745499B8F2D94
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\doc\documentation.htmlhtml
MD5:3A6723A0ED4A94C713719884580D59B2
SHA256:B3A1C483817EC21BB52682A976A2B8555D5B25F78D15626E7FA65AF589242DDD
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\letter\yo.htmltext
MD5:CE3736721907235A6BCE8E34C8EF07F6
SHA256:6A50FE340DB0EF44CB26BA6887B20C0F28C2CF37F36E7E83AC6C8500D7CED031
3736send.exeC:\Users\admin\AppData\Local\Temp\Setup.exeexecutable
MD5:6D5AD2ADCE366350200958C37F08A994
SHA256:C0B6C7B060BA8B898777CE72E4A2D0B0A9DF4591DDDD10037762DA40E6887FC2
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\file\maillist\emails.txttext
MD5:477A7AE36092B382C403700378A9E46F
SHA256:705AD709FAE223F1596B5BDC67A26A7E0B540917C7B47CCF4951106C2999B6B5
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\config.tomltext
MD5:4A2374F001416AE4547C3501D08CA829
SHA256:2737640066AAF0D963B88BD2B7953B69080DDF7FD93E4F3D724B45E8AB2D1628
2564WinRAR.exeC:\Users\admin\Desktop\Mad Hackers S2M Sender\Mad Hacker's S2M Sender\attachments\hello.txttext
MD5:75A70A9352B587BB0CE9AB521FDC961A
SHA256:3A830B8237CD4935021BE29150590C687F68A3311DD2805290325B15D81E46A0
1840svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.zipcompressed
MD5:7ECA085E07E2426A3E07B977EAF19CEC
SHA256:865BE5E48FB179C6A76AF2774A528EF97F257E10622A836A5D6FA86557BC3B15
1840svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeexecutable
MD5:A47C7D6D618A520262CF33BF54DD065A
SHA256:D8C5777404C492F67BAAF5BFC37C6C637065563829B6C1A1D7EAF004ACDC9B95
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1840
svchost.exe
HEAD
200
107.180.41.239:80
http://amazonhost.thedreamsop.com/2023/explorer.txt
unknown
unknown
1840
svchost.exe
HEAD
200
107.180.41.239:80
http://amazonhost.thedreamsop.com/2023/explorer.txt
unknown
unknown
1840
svchost.exe
HEAD
200
107.180.41.239:80
http://amazonhost.thedreamsop.com/2023/explorer.txt
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1088
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
1840
svchost.exe
142.250.185.97:443
proxy-cheap.blogspot.com
GOOGLE
US
whitelisted
1840
svchost.exe
107.180.41.239:80
amazonhost.thedreamsop.com
AS-26496-GO-DADDY-COM-LLC
US
unknown

DNS requests

Domain
IP
Reputation
proxy-cheap.blogspot.com
  • 142.250.185.97
unknown
amazonhost.thedreamsop.com
  • 107.180.41.239
unknown

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled