analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

DecryWin.zip

Full analysis: https://app.any.run/tasks/5f52cefb-1d2e-41dd-a364-a2033056065d
Verdict: Malicious activity
Analysis date: October 09, 2019, 07:02:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

BCE0B55DA4956CC40AB639DB0CFF7715

SHA1:

1D6767BA97C40E35911F0F1AB1F9F80BD2F3B6C4

SHA256:

BA439B10B1E02FF14E7C13B91D2974767AB1EEF5DC825D9F2D8B6BD6A8BC24D4

SSDEEP:

24576:k8VJrqxfq0+swNxgf72YbeFQg1vYDhmBS0r6qyTDxyz15FjfmxwPreT2m2331m2:JVwEU72j0VKS0OqyTdI1cSrG323lm2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DecryWin.exe (PID: 2540)
      • DecryWin.exe (PID: 3888)
    • Actions looks like stealing of personal data

      • DecryWin.exe (PID: 3888)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2948)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: DecryWin.exe
ZipUncompressedSize: 1592832
ZipCompressedSize: 677275
ZipCRC: 0x574c5613
ZipModifyDate: 2019:10:07 04:43:06
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start winrar.exe decrywin.exe no specs decrywin.exe

Process information

PID
CMD
Path
Indicators
Parent process
2948"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\DecryWin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2540"C:\Users\admin\AppData\Local\Temp\Rar$EXa2948.5480\DecryWin.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2948.5480\DecryWin.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225786
3888"C:\Users\admin\AppData\Local\Temp\Rar$EXa2948.8851\DecryWin.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2948.8851\DecryWin.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Total events
453
Read events
441
Write events
12
Delete events
0

Modification events

(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2948) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\DecryWin.zip
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
8
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.5480\DecryWin.exeexecutable
MD5:E2DA7ADB978C23B5A8A6D4B62B748383
SHA256:62FD640065ED102EAA31831315FFC3D941CE8E235D045523FC4895E25181AA5E
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.8851\DecryWin.exeexecutable
MD5:E2DA7ADB978C23B5A8A6D4B62B748383
SHA256:62FD640065ED102EAA31831315FFC3D941CE8E235D045523FC4895E25181AA5E
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.5480\DecryWin64.exeexecutable
MD5:FBCA4B9754CEAEB80417664A910FEEA2
SHA256:20FF44226B7F9ACDB7FF6317EB27928DB5B25F8FA2654F0D9E0CF273D2B69298
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.7461\DecryWin.exeexecutable
MD5:E2DA7ADB978C23B5A8A6D4B62B748383
SHA256:62FD640065ED102EAA31831315FFC3D941CE8E235D045523FC4895E25181AA5E
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.6617\DecryWin.exeexecutable
MD5:E2DA7ADB978C23B5A8A6D4B62B748383
SHA256:62FD640065ED102EAA31831315FFC3D941CE8E235D045523FC4895E25181AA5E
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.8851\DecryWin64.exeexecutable
MD5:FBCA4B9754CEAEB80417664A910FEEA2
SHA256:20FF44226B7F9ACDB7FF6317EB27928DB5B25F8FA2654F0D9E0CF273D2B69298
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.7461\DecryWin64.exeexecutable
MD5:FBCA4B9754CEAEB80417664A910FEEA2
SHA256:20FF44226B7F9ACDB7FF6317EB27928DB5B25F8FA2654F0D9E0CF273D2B69298
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2948.6617\DecryWin64.exeexecutable
MD5:FBCA4B9754CEAEB80417664A910FEEA2
SHA256:20FF44226B7F9ACDB7FF6317EB27928DB5B25F8FA2654F0D9E0CF273D2B69298
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info