File name:

Swallow.zip

Full analysis: https://app.any.run/tasks/e8975693-8e64-4519-a995-0d8064db6ea3
Verdict: Malicious activity
Analysis date: October 08, 2023, 08:02:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F5B07D383D6432B84311FE1AB2398EAB

SHA1:

C71166478B35BFD79A681C22CD7FC8A5A6722E2D

SHA256:

AC40EBEA5D01F113CCBFD6BD11913D0C8E73E4606827F6BACF4A871EF367ACC9

SSDEEP:

98304:FFTJ2TCvCXlzEymvJvK9GdKoI/AA5qqtNqV0TSc8u1xRhYKoKXLVVEcRUHLugiyN:FPyzByZgMX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Swallow.exe (PID: 3644)
      • Swallow.exe (PID: 3440)
    • Drops the executable file immediately after the start

      • Swallow.exe (PID: 3440)
    • Creates a writable file the system directory

      • Swallow.exe (PID: 3440)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 3140)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Swallow.exe (PID: 3440)
    • Starts CMD.EXE for commands execution

      • Swallow.exe (PID: 3440)
      • cmd.exe (PID: 3140)
    • Executing commands from a ".bat" file

      • Swallow.exe (PID: 3440)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3140)
    • Application launched itself

      • cmd.exe (PID: 3140)
  • INFO

    • Checks supported languages

      • Swallow.exe (PID: 3440)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2484)
      • expand.exe (PID: 1828)
    • Create files in a temporary directory

      • Swallow.exe (PID: 3440)
    • Reads the computer name

      • Swallow.exe (PID: 3440)
    • Creates files in the program directory

      • Swallow.exe (PID: 3440)
      • cmd.exe (PID: 3140)
    • Checks operating system version

      • cmd.exe (PID: 3140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:09:29 00:41:00
ZipCRC: 0x8e6c47ed
ZipCompressedSize: 2213331
ZipUncompressedSize: 2220254
ZipFileName: Swallow.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
12
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe no specs swallow.exe no specs swallow.exe cmd.exe no specs expand.exe no specs regsvr32.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1828EXPAND [-r] Swallow.cab .C:\Windows\System32\expand.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7601.24535 (win7sp1_ldr_escrow.191105-1059)
Modules
Images
c:\windows\system32\expand.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\cabinet.dll
2392regsvr32 "C:\Program Files\Swallow6.0\Swallow.ocx" /sC:\Windows\System32\regsvr32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2476C:\Windows\system32\cmd.exe /S /D /c" ver"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
2484"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Swallow.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\winrar\winrar.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2520findstr "3\.[0-9]\.[0-9][0-9]*" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
3044C:\Windows\system32\cmd.exe /S /D /c" ver"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3140C:\Windows\system32\cmd.exe /c ""C:\PROGRA~1\Swallow6.0\SWALLO~1.BAT" "C:\Windows\System32\cmd.exeSwallow.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3304findstr "4\.[0-9]\.[0-9][0-9]*" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\apphelp.dll
3440"C:\Users\admin\AppData\Local\Temp\Rar$EXa2484.13000\Swallow.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2484.13000\Swallow.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2484.13000\swallow.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
3568C:\Windows\system32\cmd.exe /S /D /c" ver"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\apphelp.dll
Total events
1 247
Read events
1 210
Write events
37
Delete events
0

Modification events

(PID) Process:(2484) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2484) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
34
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2484.13000\Swallow.exeexecutable
MD5:3DFF1C825031CA2D174CE57857AFE1C6
SHA256:2B70E7D8E8CFBB7D86CA4B8F4FA6894F501D165D39EEB68EC0AC2D73E6C134F8
3440Swallow.exeC:\Users\admin\AppData\Local\Temp\GLK50BA.tmpexecutable
MD5:517419CAE37F6C78C80F9B7D0FBB8661
SHA256:BFE7E013CFB85E78B994D3AD34ECA08286494A835CB85F1D7BCED3DF6FE93A11
3440Swallow.exeC:\Program Files\Swallow6.0\Swallow.cabcompressed
MD5:38832AAC6D2F2CDCA4848B90F7F4D4CB
SHA256:3C1F856B185875A705AE338ED25E89FD866A6EF61B33F65CD3D2ED6DF63FA7C0
3440Swallow.exeC:\Program Files\Swallow6.0\~GLH0001.TMPtext
MD5:203E2D4404A30BE3CC993AAD57E16219
SHA256:F95C7061D0165C55C03A36FF59FEC107EBDF2E4F20BCE56D06313E1ACEF378A0
3440Swallow.exeC:\Program Files\Swallow6.0\~GLH0000.TMPcompressed
MD5:38832AAC6D2F2CDCA4848B90F7F4D4CB
SHA256:3C1F856B185875A705AE338ED25E89FD866A6EF61B33F65CD3D2ED6DF63FA7C0
3440Swallow.exeC:\Program Files\Swallow6.0\Swallow6.0.battext
MD5:203E2D4404A30BE3CC993AAD57E16219
SHA256:F95C7061D0165C55C03A36FF59FEC107EBDF2E4F20BCE56D06313E1ACEF378A0
1828expand.exeC:\Program Files\Swallow6.0\NVSIEConfig.iniini
MD5:37E0B5E661E96BA316BA8957D887A1EF
SHA256:B77EAFB0A9492D010314B3454A97792E0765A868467775E2D1147AF86C50B0AB
3440Swallow.exeC:\Program Files\Swallow6.0\UNWISE.EXEexecutable
MD5:2B85FE26CA828485BFF6A454B881A295
SHA256:7128574752F0A7DA1284D589C195AAFE25C29F825D7028CEBDB21A7ECC44DC00
1828expand.exeC:\Program Files\Swallow6.0\NVSSDK.dllexecutable
MD5:B93F3C0DEA15C6347B7599D37261AD3C
SHA256:21E93A7BC2B27EB4A1F7941D376E00F489BF3953791A014004DC195C8258794E
1828expand.exeC:\Program Files\Swallow6.0\AVDecSDK.dllexecutable
MD5:E2E63D308FFE7ABBBED521C8A4014B20
SHA256:13A9DBDCA1A38E130343C56552405298A93D9FE0B434ACA35338C15C91D580FC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info