| File name: | 139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.zip |
| Full analysis: | https://app.any.run/tasks/6ae274e1-6f11-4dd2-8198-a05a0f7d21c7 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | May 16, 2025, 09:25:30 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract, compression method=AES Encrypted |
| MD5: | EF60972D8CA08992D92FC3B517B36F2F |
| SHA1: | 7C802D587427989D744E530E76A7B21E2C6D0DCE |
| SHA256: | 9DA7BE829E77B4084DB0472AE3AC874A7F2B0C20E18B0DD487286852D4F9B07F |
| SSDEEP: | 98304:GoRtfnN12BkD7AqGvDQ/p5zqBtW+8EMfExI8zQFO2MxaCK1PFiMehjeEscTIdbG2:1W3DLMP |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0003 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2025:05:16 09:25:14 |
| ZipCRC: | 0x4901bcd1 |
| ZipCompressedSize: | 2924086 |
| ZipUncompressedSize: | 4497752 |
| ZipFileName: | 139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 5492 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7308 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 7436 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) | |||||||||||||||
| 7896 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb7308.38869\139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb7308.38869\139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: PowerPoint Viewer, Inc. Version: 2.2.3.8 Modules
| |||||||||||||||
| (PID) Process: | (7308) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath0 |
Value: C:\Windows\web\wallpaper\Windows\img0.jpg | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath1 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath2 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath3 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | delete value | Name: | BackgroundHistoryPath4 |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers |
| Operation: | write | Name: | BackgroundHistoryPath0 |
Value: C:\Windows\web\wallpaper\Windows\img0.jpg | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\Network |
| Operation: | delete value | Name: | INSTALLTIME |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\Network |
| Operation: | write | Name: | INSTALLTIME |
Value: 35002E0031003600 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5492 | explorer.exe | C:\ProgramData\kernelquick.sys | binary | |
MD5:AE50B29A0B8DCC411F24F1863B0EAFDE | SHA256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68 | |||
| 5492 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 7308 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb7308.38869\139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.exe | executable | |
MD5:8030E60EBED7DF5D76E3CFD3223435C6 | SHA256:139466A8596FE3E2F172B28E5A7437A400FBA6C5B6D85D83359101ED68E95A5F | |||
| 7896 | 139466a8596fe3e2f172b28e5a7437a400fba6c5b6d85d83359101ed68e95a5f.exe | C:\Users\Public\Downloads\bb.jpg | binary | |
MD5:8DD7EC06A0473B75AF7B2BFF8848F39C | SHA256:FB4ACD3185571B379FB7768CE8488DEFC92FBB5861A758C31CED8836A24369F4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.43:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7744 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7744 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.43:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1196 | RUXIMICS.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
7744 | SIHClient.exe | 52.149.20.212:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7744 | SIHClient.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
dsh.fvsrchps.cn |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
5492 | explorer.exe | A Network Trojan was detected | ET MALWARE Win32/ProcessKiller CnC Initialization M2 |
5492 | explorer.exe | Potentially Bad Traffic | PAYLOAD [ANY.RUN] XORed Windows executable has been loaded |
5492 | explorer.exe | Potentially Bad Traffic | PAYLOAD [ANY.RUN] XORed Windows executable has been loaded |
5492 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE Winos4.0 Framework CnC Login Message |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox TCP Init Packet |
5492 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE Winos4.0 Framework CnC Login Message CnC Server Response |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Encrypted Client Packet |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Keep-Alive Client Packet |
5492 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Keep-Alive Client Packet |