File name:

123.zip

Full analysis: https://app.any.run/tasks/0aaf8577-5330-4872-8305-3a926b45b2a3
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: August 01, 2025, 03:20:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
socks5systemz
proxybot
botnet
inno
installer
delphi
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

0FF7A0768EB3F146A4F3D678962F25F4

SHA1:

F707291B8443F6F7E0C33B96B3B4ABD7956EE246

SHA256:

B0AA2EBEC798A008EBA01E646C3AFEFAF6E3202D08BAA219AE9BA0533A9D4D29

SSDEEP:

98304:Bplr/0qthMbu6jbEq+Mxpvfy1ewpCQoSwg1UG5UwV+FjOGrwpUaDU1WNCRUWkGsf:Sbyrb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SOCKS5SYSTEMZ has been found (auto)

      • WinRAR.exe (PID: 4648)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • 123.tmp (PID: 3624)
    • Executable content was dropped or overwritten

      • 123.exe (PID: 2320)
      • 123.tmp (PID: 3624)
      • xmldriveimage681.exe (PID: 5012)
    • Reads the Windows owner or organization settings

      • 123.tmp (PID: 3624)
    • Process drops legitimate windows executable

      • 123.tmp (PID: 3624)
    • Starts POWERSHELL.EXE for commands execution

      • xmldriveimage681.exe (PID: 5012)
    • Reads security settings of Internet Explorer

      • xmldriveimage681.exe (PID: 5012)
    • Connects to unusual port

      • xmldriveimage681.exe (PID: 5012)
    • Checks for external IP

      • xmldriveimage681.exe (PID: 5012)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4648)
    • Checks supported languages

      • 123.tmp (PID: 3624)
      • xmldriveimage681.exe (PID: 5012)
      • 123.exe (PID: 2320)
    • Create files in a temporary directory

      • 123.tmp (PID: 3624)
      • 123.exe (PID: 2320)
    • Creates a software uninstall entry

      • 123.tmp (PID: 3624)
    • Creates files or folders in the user directory

      • 123.tmp (PID: 3624)
      • xmldriveimage681.exe (PID: 5012)
    • Creates files in the program directory

      • xmldriveimage681.exe (PID: 5012)
    • Reads the computer name

      • xmldriveimage681.exe (PID: 5012)
      • 123.tmp (PID: 3624)
    • The sample compiled with english language support

      • 123.tmp (PID: 3624)
      • xmldriveimage681.exe (PID: 5012)
    • Process checks computer location settings

      • xmldriveimage681.exe (PID: 5012)
    • Detects InnoSetup installer (YARA)

      • 123.exe (PID: 2320)
      • 123.tmp (PID: 3624)
    • Changes the registry key values via Powershell

      • xmldriveimage681.exe (PID: 5012)
    • Checks proxy server information

      • xmldriveimage681.exe (PID: 5012)
      • slui.exe (PID: 6004)
    • Compiled with Borland Delphi (YARA)

      • 123.tmp (PID: 3624)
    • Reads the software policy settings

      • slui.exe (PID: 6004)
      • xmldriveimage681.exe (PID: 5012)
    • Reads the machine GUID from the registry

      • xmldriveimage681.exe (PID: 5012)
    • Manual execution by a user

      • 123.exe (PID: 2320)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2025:07:31 20:15:26
ZipCRC: 0xb6802447
ZipCompressedSize: 4849470
ZipUncompressedSize: 4873348
ZipFileName: 123
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
7
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #SOCKS5SYSTEMZ winrar.exe 123.exe 123.tmp xmldriveimage681.exe powershell.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2320"C:\Users\admin\Desktop\123.exe" C:\Users\admin\Desktop\123.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
XML Drive Image Setup
Version:
Modules
Images
c:\users\admin\desktop\123.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2632"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c Set-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" -Name "XDriveIMG" -Value "C:\ProgramData\XMLDriveImage\XMLDriveImage.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exexmldriveimage681.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3624"C:\Users\admin\AppData\Local\Temp\is-3C9F2.tmp\123.tmp" /SL5="$D02EA,4625181,54272,C:\Users\admin\Desktop\123.exe" C:\Users\admin\AppData\Local\Temp\is-3C9F2.tmp\123.tmp
123.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-3c9f2.tmp\123.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4648"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\123.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5012"C:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\xmldriveimage681.exe" -iC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\xmldriveimage681.exe
123.tmp
User:
admin
Integrity Level:
MEDIUM
Description:
XML Drive Image
Version:
0.58.0.4681
Modules
Images
c:\users\admin\appdata\local\xml drive image 0.58.0.4681\xmldriveimage681.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\imm32.dll
6004C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
10 259
Read events
10 229
Write events
30
Delete events
0

Modification events

(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\123.zip
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
27
Suspicious files
5
Text files
4
Unknown types
4

Dropped files

PID
Process
Filename
Type
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\msvcp100.dllexecutable
MD5:E3C817F7FE44CC870ECDBCBC3EA36132
SHA256:D769FAFA2B3232DE9FA7153212BA287F68E745257F1C00FAFB511E7A02DE7ADF
2320123.exeC:\Users\admin\AppData\Local\Temp\is-3C9F2.tmp\123.tmpexecutable
MD5:2F699DD6985220D236F66253422526C5
SHA256:662B1420DB85EF8D3FE233C5F6E99D668084A69BCE195C81545E393B0E3E7B32
3624123.tmpC:\Users\admin\AppData\Local\Temp\is-GV1QG.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\uninstall\is-RL4T4.tmpexecutable
MD5:C077CFEB288FE31F3448815B6C453DB2
SHA256:CA35A27F164486E22E5B4AB9930C7E0BF6EFC9FFF410512E299646F04B31E778
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\icuin51.dllexecutable
MD5:A7F201C0B9AC05E950ECC55D4403EC16
SHA256:173092C4E256958B100683A6AB2CE0D1C9895EC63F222198F9DE485E61C728CA
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\is-3B67N.tmpexecutable
MD5:DAE4100039A943128C34BA3E05F6CD02
SHA256:2357806CA24C9D3152D54D34270810DA9D9CA943462EBF7291AE06A10E5CB8BA
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\is-G3OMK.tmp
MD5:
SHA256:
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\xmldriveimage681.exe
MD5:
SHA256:
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\is-DRVLG.tmpexecutable
MD5:A7F201C0B9AC05E950ECC55D4403EC16
SHA256:173092C4E256958B100683A6AB2CE0D1C9895EC63F222198F9DE485E61C728CA
3624123.tmpC:\Users\admin\AppData\Local\XML Drive Image 0.58.0.4681\is-C3KVJ.tmpexecutable
MD5:A73EE126B2E6D43182D4C3482899D338
SHA256:06BBE605D7B0EF044871633B496948A8D65C78661E457D0844DC434A0609F763
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
39
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
NL
binary
814 b
whitelisted
2528
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
1268
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
whitelisted
2940
svchost.exe
GET
200
72.246.169.163:80
http://x1.c.lencr.org/
DE
binary
734 b
whitelisted
4768
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
DE
binary
420 b
whitelisted
4768
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
DE
binary
408 b
whitelisted
5012
xmldriveimage681.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
binary
1.42 Kb
whitelisted
5012
xmldriveimage681.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
binary
2.18 Kb
whitelisted
5012
xmldriveimage681.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQD4YMPNfNbP1JKHdHRDbiB0
US
binary
472 b
whitelisted
5012
xmldriveimage681.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/?fields=66846719&lang=en
US
binary
531 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6584
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2528
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2528
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.74
  • 20.190.160.67
  • 20.190.160.66
  • 20.190.160.4
  • 20.190.160.2
  • 20.190.160.3
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 74.178.76.128
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
self.events.data.microsoft.com
  • 13.89.179.10
whitelisted

Threats

No threats detected
No debug info