File name:

[MMTOOL] v5.0.0.7369.7z

Full analysis: https://app.any.run/tasks/b0f81fe4-d3b1-45d4-81cd-c0561aba83e1
Verdict: Malicious activity
Analysis date: April 13, 2025, 10:35:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

4EF7F4FB44B38BD0EDE1F3004E9FA1DF

SHA1:

655C8BC0925CB7CA09AF0B599480D1D9D0903182

SHA256:

C35D5B4DA0E61D77B70CA4F1D971137157975A3FB00FE7A31916A0052B38A59F

SSDEEP:

98304:6JgZuFgMDgJF+iIeTqE49s/0iE55Js4jAFFV87Q18chpTa47DBL/xtbGslijZcrk:bYoZeNTuPC8kVZ9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6972)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • MMTOOL_v5.0.0.7369.exe (PID: 7728)
      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
    • Application launched itself

      • MMTOOL_v5.0.0.7369.exe (PID: 7728)
      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
    • Reads the Windows owner or organization settings

      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
    • Executable content was dropped or overwritten

      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
    • Process drops legitimate windows executable

      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
    • There is functionality for taking screenshot (YARA)

      • mmtool.exe (PID: 7868)
    • The process drops C-runtime libraries

      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
  • INFO

    • Process checks computer location settings

      • MMTOOL_v5.0.0.7369.exe (PID: 7728)
      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
    • Reads the computer name

      • MMTOOL_v5.0.0.7369.exe (PID: 7728)
      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
      • mmtool.exe (PID: 7868)
    • Manual execution by a user

      • MMTOOL_v5.0.0.7369.exe (PID: 7728)
    • Checks supported languages

      • MMTOOL_v5.0.0.7369.exe (PID: 7728)
      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
      • mmtool.exe (PID: 7868)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6972)
    • Create files in a temporary directory

      • MMTOOL_v5.0.0.7369.exe (PID: 7800)
      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
    • Creates files or folders in the user directory

      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
    • Compiled with Borland Delphi (YARA)

      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
    • The sample compiled with english language support

      • MMTOOL_v5.0.0.7369.exe (PID: 7840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2011:07:23 10:13:49+00:00
ArchivedFileName: MMTOOL_v5.0.0.7369-0.bin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs mmtool_v5.0.0.7369.exe no specs mmtool_v5.0.0.7369.exe mmtool_v5.0.0.7369.exe mmtool.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6972"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7216C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7252"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7684C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7728"C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exe" C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exeexplorer.exe
User:
admin
Company:
github
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
1
Version:
5.0.0.7369
Modules
Images
c:\users\admin\downloads\[mmtool] v5.0.0.7369\mmtool_v5.0.0.7369.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7800"C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exe" /SPAWNWND=$2032E /NOTIFYWND=$2032E C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exe
MMTOOL_v5.0.0.7369.exe
User:
admin
Company:
github
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
1
Version:
5.0.0.7369
Modules
Images
c:\users\admin\downloads\[mmtool] v5.0.0.7369\mmtool_v5.0.0.7369.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7840"C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exe" /VERYSILENTC:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exe
MMTOOL_v5.0.0.7369.exe
User:
admin
Company:
github
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
5.0.0.7369
Modules
Images
c:\users\admin\downloads\[mmtool] v5.0.0.7369\mmtool_v5.0.0.7369.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7868"C:\Users\admin\AppData\Roaming\mmtool.exe"C:\Users\admin\AppData\Roaming\mmtool.exeMMTOOL_v5.0.0.7369.exe
User:
admin
Company:
American Megatrends, Inc
Integrity Level:
HIGH
Description:
MMTool
Version:
5, 0, 0, 7
Modules
Images
c:\users\admin\appdata\roaming\mmtool.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
3 530
Read events
3 475
Write events
41
Delete events
14

Modification events

(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369.7z
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6972) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
19
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6972WinRAR.exeC:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369-1.bin
MD5:
SHA256:
6972WinRAR.exeC:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369-0.binbinary
MD5:3A8BE4B41D856251DE492F98FFF6E913
SHA256:3DE7CDBCF357180AF74827833372BC387E81B7EDDAE738FD22C97E3C45D4F17A
7800MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Local\Temp\is-19HKJ.tmp\_isetup\_isdecmp.dllexecutable
MD5:C6AE924AD02500284F7E4EFA11FA7CFC
SHA256:31D04C1E4BFDFA34704C142FA98F80C0A3076E4B312D6ADA57C4BE9D9C7DCF26
6972WinRAR.exeC:\Users\admin\Downloads\[MMTOOL] v5.0.0.7369\MMTOOL_v5.0.0.7369.exeexecutable
MD5:5C4AF0E1B433C7ED9632F2FEE381FA92
SHA256:12C0A1D6EF2A7FAF5DE0001E5D83C343AEBD8A5126AE8BDD4057B3BCF7BAFD47
7800MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Local\Temp\is-19HKJ.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
7840MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Local\Temp\is-BIISH.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
7840MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Roaming\mmtool.exeexecutable
MD5:6BE9244F9E5415BF04EFBC441D2CCBD8
SHA256:28049163FD1E3423C42B229A5F6ED877F14E7CAF3B794BF7EFB970B375E6FF41
7840MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Roaming\is-CH9LB.tmpexecutable
MD5:6BE9244F9E5415BF04EFBC441D2CCBD8
SHA256:28049163FD1E3423C42B229A5F6ED877F14E7CAF3B794BF7EFB970B375E6FF41
7840MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Roaming\IsCabView.exeexecutable
MD5:E98F599801E6DD5E652F830591BE9438
SHA256:7C0C00D7FE55CCE5CC4DEB15948EAB7D69D61344C432AAAFF168F1F15F69D78E
7840MMTOOL_v5.0.0.7369.exeC:\Users\admin\AppData\Local\Temp\is-BIISH.tmp\_isetup\_isdecmp.dllexecutable
MD5:C6AE924AD02500284F7E4EFA11FA7CFC
SHA256:31D04C1E4BFDFA34704C142FA98F80C0A3076E4B312D6ADA57C4BE9D9C7DCF26
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
17
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8084
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8084
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
8084
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8084
SIHClient.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
google.com
  • 172.217.18.110
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.75
  • 40.126.31.67
  • 40.126.31.69
  • 20.190.159.131
  • 40.126.31.73
  • 20.190.159.23
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info