File name:

15327006606.zip.zip

Full analysis: https://app.any.run/tasks/bdc01f73-b7ba-48dc-95a0-57b8392fa3a8
Verdict: Malicious activity
Analysis date: February 23, 2024, 00:11:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

8DAB84DE721415A4E6D5CD33522D7378

SHA1:

77F631539556F085FCA4EEECB2DE79E8442C32E8

SHA256:

BC7B3CE0C63C90E4AA386EF83F6C16CD8694BB525D630235F9E0656F5BDD3B6B

SSDEEP:

98304:5TeGd2PTo6nr7XB5O8sCnZKDAHqM/3KrMm8JIVkpGPfgzO7f7FU1PBR6lFCmAxmF:BygSGiyqW88Spq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3644)
      • powershell.exe (PID: 3396)
  • SUSPICIOUS

    • Reads the Internet Settings

      • msiexec.exe (PID: 2860)
      • mmc.exe (PID: 3808)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2240)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 3644)
      • powershell.exe (PID: 3396)
    • Unusual connection from system programs

      • powershell.exe (PID: 3644)
      • powershell.exe (PID: 3396)
    • Reads Microsoft Outlook installation path

      • mmc.exe (PID: 3808)
    • Reads Internet Explorer settings

      • mmc.exe (PID: 3808)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 3216)
      • msiexec.exe (PID: 2860)
      • mmc.exe (PID: 3140)
      • mmc.exe (PID: 3808)
      • msconfig.exe (PID: 3492)
      • msconfig.exe (PID: 2476)
      • msiexec.exe (PID: 3320)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 2860)
      • mmc.exe (PID: 3808)
      • msiexec.exe (PID: 3320)
    • Reads the software policy settings

      • msiexec.exe (PID: 2860)
      • msiexec.exe (PID: 3320)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 2860)
      • msiexec.exe (PID: 3320)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 2860)
      • mmc.exe (PID: 3808)
    • Create files in a temporary directory

      • msiexec.exe (PID: 2860)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2860)
      • msiexec.exe (PID: 3320)
    • Checks proxy server information

      • mmc.exe (PID: 3808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.kmz | Google Earth saved working session (60)
.zip | ZIP compressed archive (40)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 2024:02:22 23:58:48
ZipCRC: 0x97d2d0c3
ZipCompressedSize: 6615648
ZipUncompressedSize: 6613600
ZipFileName: 15327006606.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
11
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs msiexec.exe powershell.exe vssvc.exe no specs mmc.exe no specs mmc.exe msconfig.exe no specs msconfig.exe msiexec.exe powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2240C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2476"C:\Windows\system32\msconfig.exe" C:\Windows\System32\msconfig.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
System Configuration Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2860"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\Desktop\a.msi" C:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3140"C:\Windows\system32\mmc.exe" "C:\Windows\system32\services.msc" C:\Windows\System32\mmc.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Management Console
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
3216"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\15327006606.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3320"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\Desktop\a.msi" C:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3396"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noninteractive -ExecutionPolicy bypass -c "$w="$env:LOCALAPPDATA"+'/OPWC/';[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'OperaSharpDLL.dll'));[OperaSharpDLL.Helper]::Startup(1)"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
MSIB621.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3492"C:\Windows\system32\msconfig.exe" C:\Windows\System32\msconfig.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
System Configuration Utility
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msconfig.exe
c:\windows\system32\ntdll.dll
3644"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noninteractive -ExecutionPolicy bypass -c "$w="$env:LOCALAPPDATA"+'/OPWC/';[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'OperaSharpDLL.dll'));[OperaSharpDLL.Helper]::Startup(1)"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
MSIF2A4.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3808"C:\Windows\system32\mmc.exe" "C:\Windows\system32\services.msc" C:\Windows\System32\mmc.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Management Console
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mfc42u.dll
Total events
22 512
Read events
22 323
Write events
186
Delete events
3

Modification events

(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4052) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\15327006606.zip.zip
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4052) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
37
Suspicious files
10
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
3216WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3216.12260\45fb5807dc1f88cb65dbfe611028ad09f1e85ab0ab244a1f691408c063851cc1
MD5:
SHA256:
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIA48A.tmpexecutable
MD5:B158D8D605571EA47A238DF5AB43DFAA
SHA256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIA941.tmpexecutable
MD5:FB4665320C9DA54598321C59CC5ED623
SHA256:9FB3156C665211A0081B189142C1D1AB18CDA601EE54D5F5D8883ECFA4177A59
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\TarA228.tmpcat
MD5:9C0C641C06238516F27941AA1166D427
SHA256:4276AF3669A141A59388BC56A87F6614D9A9BDDDF560636C264219A7EB11256F
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\CabA227.tmpcompressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIB5A8.tmpexecutable
MD5:FB4665320C9DA54598321C59CC5ED623
SHA256:9FB3156C665211A0081B189142C1D1AB18CDA601EE54D5F5D8883ECFA4177A59
2860msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560binary
MD5:EA8858B8719171914248446F47FFFA4C
SHA256:3C42AD71B06D54B9A1FD9A75C1A483FB7AA6C3B699BD1BBD01D0EF423EF23D9B
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIA529.tmpexecutable
MD5:FB4665320C9DA54598321C59CC5ED623
SHA256:9FB3156C665211A0081B189142C1D1AB18CDA601EE54D5F5D8883ECFA4177A59
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIB28A.tmpexecutable
MD5:FB4665320C9DA54598321C59CC5ED623
SHA256:9FB3156C665211A0081B189142C1D1AB18CDA601EE54D5F5D8883ECFA4177A59
2860msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBBE4.tmpexecutable
MD5:B158D8D605571EA47A238DF5AB43DFAA
SHA256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
14
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2860
msiexec.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?84ad992363c0e1c3
unknown
compressed
65.2 Kb
unknown
2860
msiexec.exe
GET
200
104.18.20.226:80
http://secure.globalsign.com/cacert/codesigningrootr45.crt
unknown
binary
1.37 Kb
unknown
268
powershell.exe
POST
200
99.86.105.6:80
http://d2q8odwdblz94i.cloudfront.net/
unknown
binary
19 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
2860
msiexec.exe
104.18.20.226:80
secure.globalsign.com
CLOUDFLARENET
shared
2860
msiexec.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
2788
powershell.exe
52.222.153.77:443
d1bxm9wzv2im84.cloudfront.net
AMAZON-02
US
unknown
2128
powershell.exe
99.86.105.6:443
d2q8odwdblz94i.cloudfront.net
AMAZON-02
US
unknown
268
powershell.exe
99.86.105.6:80
d2q8odwdblz94i.cloudfront.net
AMAZON-02
US
unknown
3644
powershell.exe
99.86.105.6:443
d2q8odwdblz94i.cloudfront.net
AMAZON-02
US
unknown
3084
powershell.exe
99.86.105.6:443
d2q8odwdblz94i.cloudfront.net
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
secure.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
d1bxm9wzv2im84.cloudfront.net
  • 52.222.153.77
  • 52.222.153.14
  • 52.222.153.46
  • 52.222.153.150
  • 18.239.47.114
  • 18.239.47.136
  • 18.239.47.13
  • 18.239.47.92
unknown
d2q8odwdblz94i.cloudfront.net
  • 99.86.105.6
  • 99.86.105.94
  • 99.86.105.97
  • 99.86.105.69
  • 18.239.15.28
  • 18.239.15.229
  • 18.239.15.226
  • 18.239.15.3
unknown

Threats

No threats detected
No debug info