File name:

ALCOR_U2_MP_v20.09.16.00.7z

Full analysis: https://app.any.run/tasks/d60b5aa5-fc78-43fb-872c-54c60846fc88
Verdict: Malicious activity
Analysis date: December 13, 2023, 07:00:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

9FBC9D40C2451418FA85082FDA5E36C0

SHA1:

5E679B8AA57BF5177FE25E611D6F7F7C8DE9F40D

SHA256:

9A2E57E380D5CBEE33D6C3B00A521337D97C0F11FF712F2D516BCE1540AA10EA

SSDEEP:

98304:6MOt0flQfkn2mDExSMQvhzlgjA47CMkkxgDk6SKawPXW3psZ0k1R/AdXPI7oMhGl:mexgUgqQOWXenhu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • LoadDrv.exe (PID: 1888)
    • Creates a writable file in the system directory

      • LoadDrv.exe (PID: 1888)
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 2524)
      • LoadDrv.exe (PID: 1888)
    • Creates files in the driver directory

      • LoadDrv.exe (PID: 1888)
    • Connects to unusual port

      • AlcorMP.exe (PID: 3716)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 2920)
      • AutoMP.exe (PID: 944)
      • AlcorMP.exe (PID: 3716)
      • AlcorMP.exe (PID: 3876)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2920)
      • AutoMP.exe (PID: 3932)
      • AutoMP.exe (PID: 944)
      • AlcorMP.exe (PID: 3716)
      • KillBaboon.exe (PID: 3460)
      • LoadDrv.exe (PID: 968)
      • LoadDrv.exe (PID: 1888)
      • KillBaboon.exe (PID: 2056)
      • DrvCovEx.exe (PID: 984)
      • VerifyCat.exe (PID: 3524)
      • LoadDrv.exe (PID: 2916)
      • LoadDrv.exe (PID: 2940)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2920)
      • AlcorMP.exe (PID: 3716)
      • KillBaboon.exe (PID: 3460)
      • LoadDrv.exe (PID: 1888)
      • DrvCovEx.exe (PID: 984)
    • Application launched itself

      • RdrCEF.exe (PID: 3940)
      • AcroRd32.exe (PID: 1116)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2524)
      • RdrCEF.exe (PID: 3940)
    • Reads the machine GUID from the registry

      • VerifyCat.exe (PID: 3524)
    • Create files in a temporary directory

      • VerifyCat.exe (PID: 3524)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
24
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs wmpnscfg.exe no specs acrord32.exe no specs acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs automp.exe no specs alcormp.exe no specs automp.exe no specs alcormp.exe no specs alcormp.exe no specs alcormp.exe killbaboon.exe no specs loaddrv.exe no specs loaddrv.exe no specs drvcovex.exe no specs killbaboon.exe no specs rundll32.exe no specs verifycat.exe no specs loaddrv.exe no specs loaddrv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
944"C:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\AutoMP.exe" C:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\AutoMP.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AutoMP Microsoft 基础类应用程序
Exit code:
2
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\alcor_u2_mp_v20.09.16.00\automp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mfc42.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
968C:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\drivers\LoadDrv.exe SetIgnoreHwID 058f6387C:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\DRIVERS\LoadDrv.exeAlcorMP.exe
User:
admin
Company:
ALCOR
Integrity Level:
HIGH
Description:
LoadDrv
Exit code:
0
Version:
1, 2, 0, 0
Modules
Images
c:\users\admin\desktop\alcor_u2_mp_v20.09.16.00\drivers\loaddrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
984C:\Windows\system32\DrvCovEx.exe RegisterOnly DrvCovExC:\Windows\System32\DrvCovEx.exeLoadDrv.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\windows\system32\drvcovex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1016"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1164,8243647319095041121,10362609712404587434,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-gpu-compositing --lang=en-US --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12328738564227501697 --renderer-client-id=2 --mojo-platform-channel-handle=1172 --allow-no-sandbox-job /prefetch:1C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
0
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1116"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa2524.35889\AU698X MP user's manual_Chinese.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeWinRAR.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1352"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Temp\Rar$DIa2524.35889\AU698X MP user's manual_Chinese.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1888C:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\drivers\LoadDrv.exe InstByIniC:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\DRIVERS\LoadDrv.exeAlcorMP.exe
User:
admin
Company:
ALCOR
Integrity Level:
HIGH
Description:
LoadDrv
Exit code:
0
Version:
1, 2, 0, 0
Modules
Images
c:\users\admin\desktop\alcor_u2_mp_v20.09.16.00\drivers\loaddrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2028C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2056C:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\drivers\KillBaboon.exe OnceC:\Users\admin\Desktop\ALCOR_U2_MP_v20.09.16.00\DRIVERS\KillBaboon.exeLoadDrv.exe
User:
admin
Integrity Level:
HIGH
Description:
KillBaboon
Exit code:
0
Version:
1, 2, 0, 0
Modules
Images
c:\users\admin\desktop\alcor_u2_mp_v20.09.16.00\drivers\killbaboon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2524"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\ALCOR_U2_MP_v20.09.16.00.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
8 588
Read events
8 444
Write events
139
Delete events
5

Modification events

(PID) Process:(2524) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1352) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
1
(PID) Process:(1352) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
Operation:writeName:uLastAppLaunchTimeStamp
Value:
738908672
Executable files
51
Suspicious files
264
Text files
531
Unknown types
3

Dropped files

PID
Process
Filename
Type
1352AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\SOPHIA.jsonbinary
MD5:01F233C92A89C705229A0D63D09F846A
SHA256:62137C4381ACC2DE8BCA158AD9D9CE730BD7A96A39A2FB64CE7CFA5C861CF7B4
2524WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2524.35889\AU698X MP user's manual_Chinese.pdfpdf
MD5:57FC8257D01A08CB974FF5A44F19B5E8
SHA256:1BCE74E048ACDF8D6878D7613E59CCC97A3B5BE0C7E5E0059E3D5631F7CEB1D7
3940RdrCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0binary
MD5:2C1A2D0F3CD5744492C5754721767A6F
SHA256:D4E313DA7ED021FA87DBCD949E4E14DA7E015FA44B4260121223FF6B54DD35E1
1352AcroRd32.exeC:\Users\admin\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storeibinary
MD5:C73BEC68085E957B08D29BED1AC299C3
SHA256:135C01B699D9F78A13CA1590AB59CD01F2A508EFA799573827D8D6F1B7EC7349
3940RdrCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0binary
MD5:9A454761AF910141B155CA94EE0B6ACC
SHA256:E88DECB2C9073FB5FDD42025B0CBB121BCE4B58AE1420EE01813B0F4E22000A8
1352AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\IconCacheRdr65536.datbinary
MD5:AEA4B7C4BD9A71FE68A3C05EA6C6B9DC
SHA256:77AF5BAF8568F3CCF91B1C21C6099A56A9E103DAA4490707E9184D227595E33B
3940RdrCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0binary
MD5:42D7074974A53832BC5B55EDB8D6F508
SHA256:2F7D2813AA6F43B4D8199D261328152DBE1BA70B572CDE3DD1BA998560625EC5
3940RdrCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0binary
MD5:05F277B612230DA7A3036418A58A468A
SHA256:C9AE46F4B089E167D70334359C7157BB2421F43512FC81092559FFEDFCC92D4B
3940RdrCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0binary
MD5:90655600351A479AD1923E3D50672EDC
SHA256:672C1D1B5253E3830836DFE1CB4DD9EFCBD7BE74F83B5E13F3E90EBF974C76AC
3940RdrCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0binary
MD5:F79205D589E80D98DE390765C8C16F43
SHA256:C45580524542136EC41703FC5176F48917C13974A03BF73D65ACE0EE9E783358
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
16
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
192.168.100.162:49211
unknown
3716
AlcorMP.exe
10.5.100.215:34835
unknown
3716
AlcorMP.exe
16.1.64.254:34835
US
unknown
192.168.100.162:49215
unknown
192.168.100.162:49219
unknown

DNS requests

No data

Threats

No threats detected
No debug info