File name:

250429-a5s1watpv7_pw_infected.zip

Full analysis: https://app.any.run/tasks/2e237c2f-6e17-44da-b617-1192e4786b86
Verdict: Malicious activity
Threats:

Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests.

Analysis date: April 29, 2025, 07:10:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
stealc
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
MD5:

8483E4A47B2294EAEEFB616368485BFB

SHA1:

289F2055815303A5D85529BF78C663CB8C4E1CFB

SHA256:

9A3A0C36310465A6B3AE492ACD797BCE7607FD51D3BFAAC434F66234989B4E2A

SSDEEP:

49152:ZPJBF7H26sv4wMgr+vNIyTJtza7Kl6TdUQ09X3UgFlZLKYgtGMtIO6Rjywv0GZnA:ZPJb7H2VvZMOuWynO7KITSUgFlsXLtW+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7556)
    • STEALC has been detected

      • InstallUtil.exe (PID: 8160)
      • InstallUtil.exe (PID: 4724)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • InstallUtil.exe (PID: 8160)
      • InstallUtil.exe (PID: 4724)
      • WinRAR.exe (PID: 7556)
    • Executes application which crashes

      • InstallUtil.exe (PID: 8160)
      • InstallUtil.exe (PID: 4724)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7556)
    • Reads the machine GUID from the registry

      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
    • Manual execution by a user

      • InstallUtil.exe (PID: 8160)
      • InstallUtil.exe (PID: 4724)
    • Checks proxy server information

      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
      • InstallUtil.exe (PID: 8160)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
      • InstallUtil.exe (PID: 4724)
    • Reads the computer name

      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
      • InstallUtil.exe (PID: 8160)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
      • InstallUtil.exe (PID: 4724)
    • Reads Environment values

      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
    • Reads the software policy settings

      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
      • slui.exe (PID: 7712)
    • Checks supported languages

      • InstallUtil.exe (PID: 8160)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
      • InstallUtil.exe (PID: 4724)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4880)
      • WerFault.exe (PID: 1676)
    • Disables trace logs

      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 1228)
      • 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe (PID: 7916)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0x00000000
ZipCompressedSize: 1084586
ZipUncompressedSize: 1169408
ZipFileName: 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
10
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe #STEALC installutil.exe werfault.exe no specs 29042025_0048_7456f63a46cc318334a70159aa3c4291.exe #STEALC installutil.exe werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\Users\admin\AppData\Local\Temp\Rar$EXb7556.1379\29042025_0048_7456f63a46cc318334a70159aa3c4291.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb7556.1379\29042025_0048_7456f63a46cc318334a70159aa3c4291.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Rgcrx
Exit code:
4294967295
Version:
1.0.2765.29451
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb7556.1379\29042025_0048_7456f63a46cc318334a70159aa3c4291.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1676C:\WINDOWS\system32\WerFault.exe -u -p 4724 -s 1212C:\Windows\System32\WerFault.exeInstallUtil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
4724"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
3221226505
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4880C:\WINDOWS\system32\WerFault.exe -u -p 8160 -s 968C:\Windows\System32\WerFault.exeInstallUtil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
5008C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7556"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\250429-a5s1watpv7_pw_infected.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7676C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7712"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7916"C:\Users\admin\AppData\Local\Temp\Rar$EXb7556.47335\29042025_0048_7456f63a46cc318334a70159aa3c4291.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb7556.47335\29042025_0048_7456f63a46cc318334a70159aa3c4291.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Rgcrx
Exit code:
4294967295
Version:
1.0.2765.29451
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb7556.47335\29042025_0048_7456f63a46cc318334a70159aa3c4291.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
8160"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
3221226505
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
8 603
Read events
8 573
Write events
30
Delete events
0

Modification events

(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\250429-a5s1watpv7_pw_infected.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7916) 29042025_0048_7456f63a46cc318334a70159aa3c4291.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\29042025_0048_7456f63a46cc318334a70159aa3c4291_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
Executable files
2
Suspicious files
4
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
4880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_InstallUtil.exe_1323bf91467d8342e797628f80518b741ce8350_3d87e84d_2d12fc58-8d64-4700-b242-862db1bf580f\Report.wer
MD5:
SHA256:
1676WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_InstallUtil.exe_1323bf91467d8342e797628f80518b741ce8350_3d87e84d_8eb046df-a8d8-49ed-b210-acff4c889d7f\Report.wer
MD5:
SHA256:
1676WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER8481.tmp.xmlxml
MD5:A4632BF7DBB5D19DC6422CB8B0A22D8F
SHA256:63BF605C7B87DA663EF607C1B68425AFD9414292945046DD2A14892F7844AC81
7556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7556.1379\29042025_0048_7456f63a46cc318334a70159aa3c4291.exeexecutable
MD5:3D35FEB1304CF3AD007269AF5258B950
SHA256:C3F20C6B73E715D59D88A9A30AD59E758F8D8A2DE99001D01BA31EB393742F9B
1676WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER83C3.tmp.dmpbinary
MD5:D13C5E5FA0D992A8E8FF9C97DC19E3A6
SHA256:DAD4D8124B5C22512F20F0082F13D58A3305AF33317BCB3DCE8FC80DBA9A1461
4880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREE0C.tmp.WERInternalMetadata.xmlxml
MD5:4B0753091ADD336D8B6CDFB7B3C30B1E
SHA256:009BD7432E7A9913D8FA8F229D8CC651DEA1D629A9E58CCEAC80D391539EB868
1676WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER8451.tmp.WERInternalMetadata.xmlxml
MD5:2AD9B8EBE9E7E7705DE2AF232C1CCF6D
SHA256:C1A5EB29B685778546299E9A9D6AB5687D485717817BF41EC45EFE1FCCCD4F93
4880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREE2C.tmp.xmlxml
MD5:6C200234E5B38C6787077F272FD9F954
SHA256:5AC3759366701AE062B24BD3E4F11EB82D967A7B7E69718DF13FD4F75926A01D
7556WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7556.47335\29042025_0048_7456f63a46cc318334a70159aa3c4291.exeexecutable
MD5:3D35FEB1304CF3AD007269AF5258B950
SHA256:C3F20C6B73E715D59D88A9A30AD59E758F8D8A2DE99001D01BA31EB393742F9B
4880WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\InstallUtil.exe.8160.dmpbinary
MD5:4B553B7E121C715077793BEBACCDEF48
SHA256:62E82878EBF277D7E465FCEB92DFCD63584E91A45C08D8801A0B7C832C8469D2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
25
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7328
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7328
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.20
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.4
  • 40.126.32.76
  • 20.190.160.130
  • 20.190.160.20
  • 20.190.160.14
  • 20.190.160.2
  • 40.126.32.68
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
samsplaying.vip
  • 172.67.200.119
  • 104.21.74.80
unknown
wallsekker.store
unknown
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info