| File name: | Swallow.zip |
| Full analysis: | https://app.any.run/tasks/e8975693-8e64-4519-a995-0d8064db6ea3 |
| Verdict: | Malicious activity |
| Analysis date: | October 08, 2023, 08:02:02 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | F5B07D383D6432B84311FE1AB2398EAB |
| SHA1: | C71166478B35BFD79A681C22CD7FC8A5A6722E2D |
| SHA256: | AC40EBEA5D01F113CCBFD6BD11913D0C8E73E4606827F6BACF4A871EF367ACC9 |
| SSDEEP: | 98304:FFTJ2TCvCXlzEymvJvK9GdKoI/AA5qqtNqV0TSc8u1xRhYKoKXLVVEcRUHLugiyN:FPyzByZgMX |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2023:09:29 00:41:00 |
| ZipCRC: | 0x8e6c47ed |
| ZipCompressedSize: | 2213331 |
| ZipUncompressedSize: | 2220254 |
| ZipFileName: | Swallow.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1828 | EXPAND [-r] Swallow.cab . | C:\Windows\System32\expand.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: LZ Expansion Utility Exit code: 0 Version: 6.1.7601.24535 (win7sp1_ldr_escrow.191105-1059) Modules
| |||||||||||||||
| 2392 | regsvr32 "C:\Program Files\Swallow6.0\Swallow.ocx" /s | C:\Windows\System32\regsvr32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2476 | C:\Windows\system32\cmd.exe /S /D /c" ver" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2484 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Swallow.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 2520 | findstr "3\.[0-9]\.[0-9][0-9]*" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3044 | C:\Windows\system32\cmd.exe /S /D /c" ver" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3140 | C:\Windows\system32\cmd.exe /c ""C:\PROGRA~1\Swallow6.0\SWALLO~1.BAT" " | C:\Windows\System32\cmd.exe | — | Swallow.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3304 | findstr "4\.[0-9]\.[0-9][0-9]*" | C:\Windows\System32\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3440 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2484.13000\Swallow.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2484.13000\Swallow.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3568 | C:\Windows\system32\cmd.exe /S /D /c" ver" | C:\Windows\System32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2484) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2484 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa2484.13000\Swallow.exe | executable | |
MD5:3DFF1C825031CA2D174CE57857AFE1C6 | SHA256:2B70E7D8E8CFBB7D86CA4B8F4FA6894F501D165D39EEB68EC0AC2D73E6C134F8 | |||
| 3440 | Swallow.exe | C:\Users\admin\AppData\Local\Temp\GLK50BA.tmp | executable | |
MD5:517419CAE37F6C78C80F9B7D0FBB8661 | SHA256:BFE7E013CFB85E78B994D3AD34ECA08286494A835CB85F1D7BCED3DF6FE93A11 | |||
| 3440 | Swallow.exe | C:\Program Files\Swallow6.0\Swallow.cab | compressed | |
MD5:38832AAC6D2F2CDCA4848B90F7F4D4CB | SHA256:3C1F856B185875A705AE338ED25E89FD866A6EF61B33F65CD3D2ED6DF63FA7C0 | |||
| 3440 | Swallow.exe | C:\Program Files\Swallow6.0\~GLH0001.TMP | text | |
MD5:203E2D4404A30BE3CC993AAD57E16219 | SHA256:F95C7061D0165C55C03A36FF59FEC107EBDF2E4F20BCE56D06313E1ACEF378A0 | |||
| 3440 | Swallow.exe | C:\Program Files\Swallow6.0\~GLH0000.TMP | compressed | |
MD5:38832AAC6D2F2CDCA4848B90F7F4D4CB | SHA256:3C1F856B185875A705AE338ED25E89FD866A6EF61B33F65CD3D2ED6DF63FA7C0 | |||
| 3440 | Swallow.exe | C:\Program Files\Swallow6.0\Swallow6.0.bat | text | |
MD5:203E2D4404A30BE3CC993AAD57E16219 | SHA256:F95C7061D0165C55C03A36FF59FEC107EBDF2E4F20BCE56D06313E1ACEF378A0 | |||
| 1828 | expand.exe | C:\Program Files\Swallow6.0\NVSIEConfig.ini | ini | |
MD5:37E0B5E661E96BA316BA8957D887A1EF | SHA256:B77EAFB0A9492D010314B3454A97792E0765A868467775E2D1147AF86C50B0AB | |||
| 3440 | Swallow.exe | C:\Program Files\Swallow6.0\UNWISE.EXE | executable | |
MD5:2B85FE26CA828485BFF6A454B881A295 | SHA256:7128574752F0A7DA1284D589C195AAFE25C29F825D7028CEBDB21A7ECC44DC00 | |||
| 1828 | expand.exe | C:\Program Files\Swallow6.0\NVSSDK.dll | executable | |
MD5:B93F3C0DEA15C6347B7599D37261AD3C | SHA256:21E93A7BC2B27EB4A1F7941D376E00F489BF3953791A014004DC195C8258794E | |||
| 1828 | expand.exe | C:\Program Files\Swallow6.0\AVDecSDK.dll | executable | |
MD5:E2E63D308FFE7ABBBED521C8A4014B20 | SHA256:13A9DBDCA1A38E130343C56552405298A93D9FE0B434ACA35338C15C91D580FC | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2656 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |