File name:

归档.zip

Full analysis: https://app.any.run/tasks/7baf4f7e-e22d-4d95-9369-e24039b261f6
Verdict: Malicious activity
Analysis date: May 06, 2024, 07:19:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

5E79BF1942BFA085570B880093465CA7

SHA1:

967DF8C89F90AD6B62828895C82780488F7599AB

SHA256:

A347401E7C7A6BDA32728E056898DE93FB6B00C369C05ED33221310843184415

SSDEEP:

24576:yvjOMZUmAgz1GBKtQLuhWaAaepzzF4Mi5LgeIe3EwKThAHcqABH0qcDLomLGgPV1:yvjOMZUmAmcMtQLuhWaAaepzzF4Mi5Ll

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3988)
      • LiveUpdate.exe (PID: 752)
      • xsh1.tmp (PID: 316)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Reads the Internet Settings

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Reads security settings of Internet Explorer

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Reads settings of System Certificates

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Checks Windows Trust Settings

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Executable content was dropped or overwritten

      • LiveUpdate.exe (PID: 752)
      • xsh1.tmp (PID: 316)
    • Starts application with an unusual extension

      • LiveUpdate.exe (PID: 752)
    • Starts itself from another location

      • xsh1.tmp (PID: 316)
  • INFO

    • Create files in a temporary directory

      • LiveUpdate.exe (PID: 752)
      • xsh1.tmp (PID: 316)
      • LiveUpdate.exe (PID: 588)
    • Manual execution by a user

      • LiveUpdate.exe (PID: 752)
      • wmpnscfg.exe (PID: 1652)
    • Checks supported languages

      • LiveUpdate.exe (PID: 752)
      • xsh1.tmp (PID: 316)
      • LiveUpdate.exe (PID: 588)
      • wmpnscfg.exe (PID: 1652)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3988)
    • Reads the computer name

      • LiveUpdate.exe (PID: 752)
      • wmpnscfg.exe (PID: 1652)
      • LiveUpdate.exe (PID: 588)
    • Checks proxy server information

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Reads the machine GUID from the registry

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Reads the software policy settings

      • LiveUpdate.exe (PID: 752)
      • LiveUpdate.exe (PID: 588)
    • Creates files or folders in the user directory

      • LiveUpdate.exe (PID: 752)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0008
ZipCompression: Deflated
ZipModifyDate: 2019:11:29 13:09:28
ZipCRC: 0xbea2aa39
ZipCompressedSize: 134002
ZipUncompressedSize: 134228
ZipFileName: LiveUpdate.dat
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe liveupdate.exe xsh1.tmp wmpnscfg.exe no specs liveupdate.exe

Process information

PID
CMD
Path
Indicators
Parent process
316"C:\Users\admin\AppData\Local\Temp\xsh1.tmp" "/TUCPS:LiveUpdate.exe" "/DATFILE:C:\Users\admin\AppData\Local\Temp\Liv1.tmp" /TURCC:\Users\admin\AppData\Local\Temp\xsh1.tmp
LiveUpdate.exe
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
MEDIUM
Description:
TrueUpdate Client
Exit code:
0
Version:
3.8.1.0
Modules
Images
c:\users\admin\appdata\local\temp\xsh1.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
588"C:\Users\admin\AppData\Local\Temp\LiveUpdate.exe" "/TUDEL:xsh1.tmp" "/DATFILE:C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\LIV1.TMP" "/TURC"C:\Users\admin\AppData\Local\Temp\LiveUpdate.exe
xsh1.tmp
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
MEDIUM
Description:
TrueUpdate Client
Exit code:
0
Version:
3.8.1.0
Modules
Images
c:\users\admin\appdata\local\temp\liveupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
752"C:\Users\admin\Desktop\LiveUpdate.exe" C:\Users\admin\Desktop\LiveUpdate.exe
explorer.exe
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
MEDIUM
Description:
TrueUpdate Client
Exit code:
12
Version:
3.8.0.0
Modules
Images
c:\users\admin\desktop\liveupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
1652"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3988"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\归档.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
12 523
Read events
12 373
Write events
128
Delete events
22

Modification events

(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3988) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\归档.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
3
Suspicious files
16
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
752LiveUpdate.exeC:\Users\admin\AppData\Local\Temp\Xshell 6 Update Log.txttext
MD5:719778F8B7986334C7413A972951962D
SHA256:7245D325F76CE72333ED3BD6A5C317C0BCCB8801D54ED5D2A710E49FDE46EB8C
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.33922\LiveUpdate.datcompressed
MD5:F04205E024C79BEF6B94441B1C98999F
SHA256:FD8ED22B34558606B9F6E0039BAD08612BB4A8FDC472D1B0D716DDDE27C6E07A
752LiveUpdate.exeC:\Users\admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG3.JPGimage
MD5:E39405E85E09F64CCDE0F59392317DD3
SHA256:CFD9677E1C0E10B1507F520C4ECD40F68DB78154C0D4E6563403D540F3BF829F
752LiveUpdate.exeC:\Users\admin\AppData\Local\Temp\_ir_tu2_temp_0\_tu_DATUP_0\xshell6Beta.ts2
MD5:
SHA256:
752LiveUpdate.exeC:\Users\admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG2.JPGimage
MD5:F6BF82A293B69AA5B47D4E2DE305D45A
SHA256:6A9368CDD7B3FF9B590E206C3536569BC45C338966D0059784959F73FE6281E0
752LiveUpdate.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:E1BAA661F2288EB1D07E4CC8E66CDCD3
SHA256:AEE9C7588AA6D21852E34F1D027B06D977FC14947184A741677BD4D7FDE1C3F7
752LiveUpdate.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:994CA3CCF790D3F4997044CC9CAB23D8
SHA256:B6D9AF159861BB3BDB0AD62644D1DEDF40EDCB6A790AD0C07F7A65E6CC152727
752LiveUpdate.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\83D863F495E7D991917B3ABB3E1EB382_C67B949E74917EAB9049C4E027ECA4AAbinary
MD5:E97261C6DD4CABA224A12E44160F2C6E
SHA256:7A5B6EA573E9CC7CE7847641A69403F4B5CC3A66CCE3FCBBAA1B42848D2CC3E1
752LiveUpdate.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:CC63F8B9FADC797D87C8C544B6986865
SHA256:66B0585929DDE077AF50A06C8115CA0F3440AFE5A347A7D7965091EDECC75598
752LiveUpdate.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517binary
MD5:E3D71C9D967501DF03E6DBA9F88D7007
SHA256:54ACD6BB1F5D00F39D7FCF570782F6A29B33EECA54F57B3E190850E030F84F43
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
17
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
752
LiveUpdate.exe
GET
304
92.123.77.25:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?be36ae1029c3a67f
unknown
unknown
752
LiveUpdate.exe
GET
200
108.138.2.173:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
unknown
unknown
752
LiveUpdate.exe
GET
200
18.245.39.64:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
unknown
unknown
752
LiveUpdate.exe
GET
200
18.245.39.64:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
unknown
752
LiveUpdate.exe
GET
200
18.245.65.219:80
http://ocsp.r2m03.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQqHI%2BsdmapawQncL1rpCEZZ8gTSAQUVdkYX9IczAHhWLS%2Bq9lVQgHXLgICEAX5O75jmJWGuyFKZzFTNDk%3D
unknown
unknown
752
LiveUpdate.exe
GET
200
216.58.206.67:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
752
LiveUpdate.exe
GET
200
216.58.206.67:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
unknown
1088
svchost.exe
GET
304
92.123.77.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?90076af29193d397
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
752
LiveUpdate.exe
54.218.235.37:443
transact.netsarang.com
AMAZON-02
US
unknown
752
LiveUpdate.exe
92.123.77.25:80
ctldl.windowsupdate.com
Akamai International B.V.
NL
unknown
752
LiveUpdate.exe
108.138.2.173:80
o.ss2.us
AMAZON-02
US
unknown
752
LiveUpdate.exe
18.245.39.64:80
ocsp.rootg2.amazontrust.com
US
unknown
752
LiveUpdate.exe
18.245.65.219:80
ocsp.r2m03.amazontrust.com
US
unknown
752
LiveUpdate.exe
172.67.69.54:443
cdn.netsarang.net
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
transact.netsarang.com
  • 54.218.235.37
  • 35.164.90.83
unknown
ctldl.windowsupdate.com
  • 92.123.77.25
  • 92.123.77.35
whitelisted
o.ss2.us
  • 108.138.2.173
  • 108.138.2.107
  • 108.138.2.10
  • 108.138.2.195
whitelisted
ocsp.rootg2.amazontrust.com
  • 18.245.39.64
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.245.39.64
shared
ocsp.r2m03.amazontrust.com
  • 18.245.65.219
unknown
cdn.netsarang.net
  • 172.67.69.54
  • 104.26.9.6
  • 104.26.8.6
unknown
ocsp.pki.goog
  • 216.58.206.67
whitelisted
update.netsarangapi.com
  • 54.218.235.37
  • 35.164.90.83
unknown

Threats

No threats detected
No debug info