| File name: | MalwareSample_DownloadAssistant.zip |
| Full analysis: | https://app.any.run/tasks/c3e18fe8-23ec-4cdc-8dc2-1b1df9a64c34 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | May 12, 2025, 16:40:12 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | 24AAFF49DEEA0280691EF00B127A20E6 |
| SHA1: | 0E3E00C739229B20D983748EAB41F5DFB0D1514B |
| SHA256: | A2066F122E1C22B8F990AE8B06C1715C656FDD0DE60CD0D09A6757B9CDFC2B59 |
| SSDEEP: | 98304:RYA+s+cgy/hJHRq4aOx+5UTzx9/Wo7QHLxYFDz7HlWt3xZ29F5K8Mxu2EIlu3pNZ:Wbc7kQ4pSY6NecmpE0/k |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2025:05:12 16:34:00 |
| ZipCRC: | 0xee34f9dd |
| ZipCompressedSize: | 7464260 |
| ZipUncompressedSize: | 7487626 |
| ZipFileName: | rebuilder_2K068DgOTV.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 920 | "C:\Users\admin\Desktop\rebuilder_2K068DgOTV.exe" /SPAWNWND=$3024C /NOTIFYWND=$D02AE | C:\Users\admin\Desktop\rebuilder_2K068DgOTV.exe | rebuilder_2K068DgOTV.tmp | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: True Image WD Edition Setup Version: Modules
| |||||||||||||||
| 1532 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1676 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1812 | "C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\trueimagewdedition675.exe" c3a7f6f8517555bd86e9608f76bf7a19 | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\trueimagewdedition675.exe | rebuilder_2K068DgOTV.tmp | ||||||||||||
User: admin Integrity Level: HIGH Version: 21.0.1.675 Modules
| |||||||||||||||
| 2092 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1812 -s 1100 | C:\Windows\SysWOW64\WerFault.exe | — | trueimagewdedition675.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2616 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1812 -s 1324 | C:\Windows\SysWOW64\WerFault.exe | — | trueimagewdedition675.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2616 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1812 -s 996 | C:\Windows\SysWOW64\WerFault.exe | — | trueimagewdedition675.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4164 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1812 -s 1032 | C:\Windows\SysWOW64\WerFault.exe | — | trueimagewdedition675.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4180 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1812 -s 1332 | C:\Windows\SysWOW64\WerFault.exe | — | trueimagewdedition675.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\MalwareSample_DownloadAssistant.zip | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000 | |||
| (PID) Process: | (6584) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\uninstall\is-HUNUN.tmp | executable | |
MD5:D93CF1B42A548F3B215D2186994D2620 | SHA256:B50F766773B85D7866B9A93B46A4C5729E5ACED76009ADBC69219A2D2C8813A1 | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\libEGL.dll | executable | |
MD5:EAE56B896A718C3BC87A4253832A5650 | SHA256:EE1D7D8F396D627FEE7DCF2655FB5ACFE5A1EE2A5DEEDA764EF311E75B94CEA1 | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\uninstall\unins000.exe | executable | |
MD5:D93CF1B42A548F3B215D2186994D2620 | SHA256:B50F766773B85D7866B9A93B46A4C5729E5ACED76009ADBC69219A2D2C8813A1 | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\is-IM1HF.tmp | executable | |
MD5:DAE4100039A943128C34BA3E05F6CD02 | SHA256:2357806CA24C9D3152D54D34270810DA9D9CA943462EBF7291AE06A10E5CB8BA | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\is-HRP1R.tmp | executable | |
MD5:EAE56B896A718C3BC87A4253832A5650 | SHA256:EE1D7D8F396D627FEE7DCF2655FB5ACFE5A1EE2A5DEEDA764EF311E75B94CEA1 | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\icuin51.dll | executable | |
MD5:A7F201C0B9AC05E950ECC55D4403EC16 | SHA256:173092C4E256958B100683A6AB2CE0D1C9895EC63F222198F9DE485E61C728CA | |||
| 4892 | rebuilder_2K068DgOTV.exe | C:\Users\admin\AppData\Local\Temp\is-1VTEC.tmp\rebuilder_2K068DgOTV.tmp | executable | |
MD5:A7FE2A915B669ECBFEAB097C1166B3AA | SHA256:2ABB9D391A7E1298D45E2AB720DD3B29109C110DB4651B1C6DA6BE7C205FC956 | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\Temp\is-IC32J.tmp\_isetup\_setup64.tmp | executable | |
MD5:4FF75F505FDDCC6A9AE62216446205D9 | SHA256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81 | |||
| 6184 | rebuilder_2K068DgOTV.tmp | C:\Users\admin\AppData\Local\True Image WD Edition 21.0.1.675\libGLESv2.dll | executable | |
MD5:A73EE126B2E6D43182D4C3482899D338 | SHA256:06BBE605D7B0EF044871633B496948A8D65C78661E457D0844DC434A0609F763 | |||
| 920 | rebuilder_2K068DgOTV.exe | C:\Users\admin\AppData\Local\Temp\is-LNARD.tmp\rebuilder_2K068DgOTV.tmp | executable | |
MD5:A7FE2A915B669ECBFEAB097C1166B3AA | SHA256:2ABB9D391A7E1298D45E2AB720DD3B29109C110DB4651B1C6DA6BE7C205FC956 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.16.168.114:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.168.114:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1812 | trueimagewdedition675.exe | POST | — | 104.21.80.1:80 | http://start7345724.ru/new/net_api | unknown | — | — | unknown |
1812 | trueimagewdedition675.exe | POST | — | 104.21.80.1:80 | http://start7345724.ru/new/net_api | unknown | — | — | unknown |
6036 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6036 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 2.16.168.114:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
— | — | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 40.126.32.72:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1812 | trueimagewdedition675.exe | 104.21.80.1:80 | start7345724.ru | CLOUDFLARENET | — | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
start7345724.ru |
| unknown |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | A Network Trojan was detected | MALWARE [ANY.RUN] Suspected domain Associated with Malware Distribution (start7345724 .ru) |
1812 | trueimagewdedition675.exe | Possibly Unwanted Program Detected | ADWARE [ANY.RUN] DownloadAssistant HTTP POST Request |
1812 | trueimagewdedition675.exe | Possibly Unwanted Program Detected | ADWARE [ANY.RUN] DownloadAssistant HTTP POST Request |