File name:

DSD+2.395 FL_START_FIX_DMR.zip

Full analysis: https://app.any.run/tasks/95e32a38-25cc-47cd-b753-dcad64482528
Verdict: Malicious activity
Analysis date: August 26, 2024, 05:27:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

F8EE3DCA542028AD3BE2B6E5E6E5D028

SHA1:

F94BEEF75AA05C5FB1C9A53861B788827B380A95

SHA256:

C5A62DAB1105DEEB60685950357FD48E940777F44F41160B3FAD5A7FE6943517

SSDEEP:

98304:Tnn3naYw4cqvazbV7Mofzqo2mbrlVRx1zxOT05+Qx7rk0eeu2eZTgxjnunIQQHUe:d+GX/Sot/PiAX/K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6708)
  • INFO

    • Checks supported languages

      • FMP24.exe (PID: 6368)
      • FMP-Map.EXE (PID: 6532)
      • FMPA.exe (PID: 2092)
      • FMPA.exe (PID: 6220)
      • Survey.exe (PID: 7040)
      • FMPP.exe (PID: 3236)
    • Manual execution by a user

      • FMPA.exe (PID: 6220)
      • FMP24.exe (PID: 6368)
      • FMP-Map.EXE (PID: 6532)
      • FMPA.exe (PID: 2092)
      • FMPP.exe (PID: 3236)
      • Survey.exe (PID: 7040)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6708)
    • Reads the computer name

      • FMP-Map.EXE (PID: 6532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:09:04 10:45:28
ZipCRC: 0x6d88006a
ZipCompressedSize: 173
ZipUncompressedSize: 6148
ZipFileName: DSD+2.395 FL/.DS_Store
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
14
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs fmpa.exe no specs conhost.exe no specs fmp24.exe no specs conhost.exe no specs fmp-map.exe conhost.exe no specs fmpa.exe no specs conhost.exe no specs survey.exe no specs conhost.exe no specs fmpp.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2068\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFMPP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2092"C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\Executables\FMPA.exe" C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\Executables\FMPA.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\downloads\dsd+2.395 fl_start_fix_dmr\dsd+2.395 fl\dsdplus base files\executables\fmpa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2524\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFMPA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3236"C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\Executables\FMPP.exe" C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\Executables\FMPP.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\downloads\dsd+2.395 fl_start_fix_dmr\dsd+2.395 fl\dsdplus base files\executables\fmpp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6220"C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\FMPA.exe" C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\FMPA.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\downloads\dsd+2.395 fl_start_fix_dmr\dsd+2.395 fl\fmpa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6308\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFMPA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6364\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFMP24.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6368"C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\FMP24.exe" C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\FMP24.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\downloads\dsd+2.395 fl_start_fix_dmr\dsd+2.395 fl\fmp24.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6500C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6532"C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\FMP-Map.EXE" C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\FMP-Map.EXE
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\downloads\dsd+2.395 fl_start_fix_dmr\dsd+2.395 fl\fmp-map.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
4 933
Read events
4 913
Write events
20
Delete events
0

Modification events

(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR.zip
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR
(PID) Process:(6708) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
36
Suspicious files
3
Text files
61
Unknown types
0

Dropped files

PID
Process
Filename
Type
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\1R.battext
MD5:C0789B5ACD8A94EC93032BD2C3766253
SHA256:3891A2F9C0F940D9311271585A8A3C0B8814D58A4A4D0675A408EAC44664FBC5
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\1R.battext
MD5:C0789B5ACD8A94EC93032BD2C3766253
SHA256:3891A2F9C0F940D9311271585A8A3C0B8814D58A4A4D0675A408EAC44664FBC5
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\FMP24-VC.battext
MD5:B9742AB8ED76304E33F65EAA6333F47A
SHA256:527498B9B99217FC2E0BF942A87EB4C136E8EE1170670116CF970C111D283B74
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\1Ra.battext
MD5:4D38186816A199B7094C809C3F52F13C
SHA256:0C9124791C05E6AE24313F78C8ED56509FD39D83A6F3EF01C684F89791E9D8F4
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\CC.battext
MD5:1C4FF2D70B18D7ACF8B69DB7E7CF90AE
SHA256:88F987BC13B8CE4A98760CB7007FAFF001604BB628EECFE1818DE06BF100874A
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\FMP24-CC.battext
MD5:9E279AE07CCF3155161A4CF51A61A9CD
SHA256:A9D3D79F872E0F88F9B0FCBC0753D5D8F1AE5F07DA9A6E16DFE0EC320CE07EC3
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\CC.battext
MD5:1C4FF2D70B18D7ACF8B69DB7E7CF90AE
SHA256:88F987BC13B8CE4A98760CB7007FAFF001604BB628EECFE1818DE06BF100874A
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\airspy.dllexecutable
MD5:DBBAC0A53D598C48AE622F6A11AE6705
SHA256:061CDA302E13D5CFD4DE55FFB42EB58DB25A764AD2BEEF10DB4C084415CC35B5
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\VC.battext
MD5:80EBD239ED3ED760B85E6E1A04C8F88D
SHA256:8E72CBE5AC4B3F740B3D3C7353C0D6EE6E8B08F18E2B08DF0CF54427CED8D83A
6708WinRAR.exeC:\Users\admin\Downloads\DSD+2.395 FL_START_FIX_DMR\DSD+2.395 FL\DSDPlus Base Files\BatchFiles\FMPA-CC.battext
MD5:A307F39B461D0556306699D5700DD9F0
SHA256:4881DA6FA378EE55AEF3DB79A95A0B156307E95B59151004449D85584871934E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
25
DNS requests
15
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6620
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5904
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6620
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6532
FMP-Map.EXE
GET
200
151.101.65.91:80
http://tile.openstreetmap.org/1/0/0.png
unknown
whitelisted
6532
FMP-Map.EXE
GET
200
151.101.65.91:80
http://tile.openstreetmap.org/1/1/1.png
unknown
whitelisted
6532
FMP-Map.EXE
GET
200
151.101.65.91:80
http://tile.openstreetmap.org/1/0/1.png
unknown
whitelisted
6532
FMP-Map.EXE
GET
200
151.101.65.91:80
http://tile.openstreetmap.org/1/1/0.png
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3992
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
1492
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3992
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6620
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6620
SIHClient.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.74.206
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.133
  • 40.126.32.136
  • 20.190.160.14
  • 40.126.32.76
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
tile.openstreetmap.org
  • 151.101.65.91
  • 151.101.129.91
  • 151.101.1.91
  • 151.101.193.91
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
Potentially Bad Traffic
ET USER_AGENTS User-Agent (Internet Explorer)
No debug info