download:

/DroidVPN-Official/DroidVPN/releases/download/3.0.5.3/DroidVPN_PC_v3.2.zip

Full analysis: https://app.any.run/tasks/985411e7-7c48-4a90-b6e3-7e47a503a551
Verdict: Malicious activity
Analysis date: April 06, 2025, 12:16:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

2B39B731FFEF0527F021D23557DFF770

SHA1:

0CEA5A54C600F48DBCB2999CD57294BDB5F88167

SHA256:

B240475F1B3498D812293C241FFF35438474688385C228A3DF28655AA8B57F14

SSDEEP:

49152:Oz8JTlZ8iLSxGng7Z5GPKr3vMNCT7RNtV9z9DYIVrlCDYIyocJ4UoSC5jDYID5Dw:cuX8iLSN5GKvdTVNt/Nnrly4iUoSC538

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates file in the systems drive root

      • WinRAR.exe (PID: 4300)
    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 4300)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 4300)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4300)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4300)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 4300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2022:01:01 16:57:10
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: DroidVPN/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4300"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7236C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7268"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 231
Read events
3 207
Write events
11
Delete events
13

Modification events

(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
18
Suspicious files
10
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\DroidVPNLauncher.exeexecutable
MD5:F5F5C47EB00F2D55228500A744D33CA2
SHA256:30251FDD7DB959A319D3FBCDA79EB773A0AEE9FD0E7FCEE6A79E6218EDF39F50
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\driver\x64\tap0901.catbinary
MD5:074EF7F1DB5DC377F3FF7367BF4D805A
SHA256:7D9AA813B0C765A12FB92394A676015D9E193CF498B37D77AA5A0C32C29C6ED5
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\DroidVPN.exeexecutable
MD5:FDCB0F507F402053A86150DB123B0FFD
SHA256:A89178129E5FDEF2BC5E6900FCAA8A47C6311C7201B26B59DB4A0374564760BA
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\driver\x64\tap0901.sysexecutable
MD5:B6E9DF4829CD9FCBB8C69B8DA4C5108F
SHA256:E6E3583C7A14ACE94738B14A69D978F29AE68FFB67730DE45C09C7BA276E7D1F
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\droidvpn.conftext
MD5:18D9214DE7342F3B256CC8465AACBB60
SHA256:681B9FD164EAFF083ECE59BBFA413203D7F607246CB79AC71FD2D1007483E9AE
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\driver\x86\tap0901.catbinary
MD5:CBC64A0DB899A217546CAD0B7AAE63E7
SHA256:F74EE1DB54D3AF3FE6495AAAFED42D2A0CF77E1B3993B00BF301A51D6943A2FC
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\droidvpn.dllexecutable
MD5:4166324B5EA73036FF6B40353B7CBEC9
SHA256:F5EAA8A3472CDC786A43C11C890B854EAEBD59C9F39A174A4DF773C8A171BDC9
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\driver\x86\tapinstall.exeexecutable
MD5:D1B6303856C0BD48190CB0B4B1FA7F5F
SHA256:AFBBC11B086CCD0B23FA4B9B60718690B99544AF94931E5AFB05A8266190C6F1
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\driver\x64\tapinstall.exeexecutable
MD5:C09FCA2937AD64400370168BAC68C4CA
SHA256:D8AF500530C30063C4A88A401F4C0E272A7BB8105CD9ADF9FA13E43A811608A7
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\DroidVPN_PC_v3.2\DroidVPN\driver\x64\OemWin2k.infbinary
MD5:25ADFCB985E4AA3F6FBA315454553A20
SHA256:A6F766A6A86A62EFD200DB7FB6A246D96CBA5B1752778DA9415120229613C63B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7804
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7804
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
20.7.1.246:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
google.com
  • 142.250.186.110
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
client.wns.windows.com
  • 20.7.1.246
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.130
  • 20.190.160.65
  • 40.126.32.74
  • 20.190.160.128
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info