File name:

ETHandBNBgen.zip

Full analysis: https://app.any.run/tasks/4b7fb57f-65e1-4fec-aef6-2b7d6c5b733e
Verdict: Malicious activity
Analysis date: July 17, 2024, 23:02:03
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

E2FEB040D96AB80F29E47961C6551BFD

SHA1:

FD1C48A5EBD7251EF14712320964D58D3659AC41

SHA256:

B6563EFDAF9745B7E05F2D4F3A9363C8A06A90BD6C5789B4C109128FE41195F2

SSDEEP:

98304:wZjTk8NX7v1BLhNw1yGUi1INtqY76d3yAua4KaxeT0kiN0jcMmbwk8MN8VtqLYfz:1geTiWXRHWgHia0JD8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2104)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2104)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2104)
    • Checks supported languages

      • MoneyGen.exe (PID: 1920)
      • AppLaunch.exe (PID: 4680)
    • Reads the computer name

      • AppLaunch.exe (PID: 4680)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 4680)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2022:03:18 18:40:02
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: ETHandBNBgen/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe moneygen.exe no specs conhost.exe no specs applaunch.exe

Process information

PID
CMD
Path
Indicators
Parent process
1920"C:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\MoneyGen.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\MoneyGen.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb2104.15105\ethandbnbgen\moneygen.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2104"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\ETHandBNBgen.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4680"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
MoneyGen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
5228\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeMoneyGen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
7 714
Read events
7 685
Write events
29
Delete events
0

Modification events

(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\ETHandBNBgen.zip
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
17
Suspicious files
9
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Browser Emulation\chrome.exeexecutable
MD5:E29E507A9742C2DADCAD126734FF5695
SHA256:943B6F433463CA8B7AAB072000FB9D7C9FB0D9C021A5B4ED95D165506B33CA43
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Browser Emulation\sbs_mscorsec.dllexecutable
MD5:A1A3F9E8A096B629CBA87F9A1EF0CAC6
SHA256:118361EDEB3AE2C7F791A454FD08969F8D8288D735DB44A3C150BAFE332D4A66
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Metamask Emulation\nkbihfbeogaeaoehlefnkodbefgpgknn\000049.ldbbinary
MD5:AB70CDE711990A33A6224772016C4BBA
SHA256:0DE0ECADA2DF84044A8FC7AD695E84D9F8B5D1DA6B64550AD513ED126481C929
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\libGLESv2.dllexecutable
MD5:7FF6836C626BBC7F0833A66AA77A7A7F
SHA256:8CFC024D09A6784486DA7DC0EBFD90C0C8136B27C08EC1C3F352CD4FA43B9273
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Metamask Emulation\nkbihfbeogaeaoehlefnkodbefgpgknn\000005.ldbbinary
MD5:14BE6BE12BE09C148DF115BC243EC0F0
SHA256:7BA8852EA8DDC995C5F23A14E2FD2DAD6067EE488062F0FFBC1DA9F4FC291947
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Browser Emulation\sbs_mscorrc.dllexecutable
MD5:A1A3F9E8A096B629CBA87F9A1EF0CAC6
SHA256:118361EDEB3AE2C7F791A454FD08969F8D8288D735DB44A3C150BAFE332D4A66
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Browser Emulation\chrome_100_percent.pakbinary
MD5:542FCCF0937F7BC6BCA587CA63395A78
SHA256:046FF2F7C1C6C2C217E65D9883375F4D7E4DCB5ED8192F5588A2361C0E87C773
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Browser Emulation\chrome_elf.dllexecutable
MD5:72914900A7E1C701F2E36F867B071D6A
SHA256:44E0B4A949D0C101AE60B26D5CA5E1823B1F639B86E6B2ED6068494267AC87C2
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\Browser Emulation\chrome.exe.sigpi2
MD5:04E23074DBA7CCF2A91CDAA84A6C9771
SHA256:863F84B90A734AE1B6AEADC7434EA0F9191A77F60ADC643477D206E6C6ED7AA3
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2104.15105\ETHandBNBgen\libEGL.dllexecutable
MD5:371AEB50F7816108B346B67EF2B11E1A
SHA256:12903D93A7F57B479401602A533849E6F813FF5C2C92F3A02D468FC98E7AC1D5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
60
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6072
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3156
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4912
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4656
SearchApp.exe
104.126.37.130:443
www.bing.com
Akamai International B.V.
DE
unknown
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
unknown
4724
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6072
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
www.bing.com
  • 104.126.37.130
  • 104.126.37.139
  • 104.126.37.170
  • 104.126.37.131
  • 104.126.37.136
  • 104.126.37.144
  • 104.126.37.185
  • 104.126.37.178
  • 104.126.37.129
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.238
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.23
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.71
  • 40.126.31.73
  • 40.126.31.67
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info