File name:

processhacker-2.39-bin.zip

Full analysis: https://app.any.run/tasks/c0c966d5-3232-4ed3-8b6d-4db2302e16ea
Verdict: Malicious activity
Analysis date: February 27, 2019, 09:50:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

41CE544132439494CEA046F7CFBB6422

SHA1:

AE42490C5412EA13455498CCB1DF329388F001BD

SHA256:

C7921C71A40EC56CDE34CAC854C7164AF456BBB7393BCBF8C306702BFF15719F

SSDEEP:

49152:l85pB0X687BimNifJTbWhzV71f/6HzsQ+rMuhu5vEQ1tYFZzgs993VdbrD1O:S5pan1OWhzV9CHzR+rWeHz9zQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • ProcessHacker.exe (PID: 3744)
      • ProcessHacker.exe (PID: 2564)
    • Application was dropped or rewritten from another process

      • ProcessHacker.exe (PID: 3744)
      • ProcessHacker.exe (PID: 2564)
  • SUSPICIOUS

    • Creates files in the user directory

      • ProcessHacker.exe (PID: 3744)
    • Application launched itself

      • ProcessHacker.exe (PID: 3744)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3544)
  • INFO

    • Reads settings of System Certificates

      • ProcessHacker.exe (PID: 2564)
      • ProcessHacker.exe (PID: 3744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2017:10:02 17:04:24
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: processhacker-2.39-bin/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe processhacker.exe processhacker.exe

Process information

PID
CMD
Path
Indicators
Parent process
2564"C:\Users\admin\AppData\Local\Temp\Rar$EXa3544.9224\processhacker-2.39-bin\x86\ProcessHacker.exe" -v -selecttab DiskC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.9224\processhacker-2.39-bin\x86\ProcessHacker.exe
ProcessHacker.exe
User:
admin
Company:
wj32
Integrity Level:
HIGH
Description:
Process Hacker
Exit code:
0
Version:
2.39.0.124
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3544.9224\processhacker-2.39-bin\x86\processhacker.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winsta.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3544"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\processhacker-2.39-bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3744"C:\Users\admin\AppData\Local\Temp\Rar$EXa3544.9224\processhacker-2.39-bin\x86\ProcessHacker.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3544.9224\processhacker-2.39-bin\x86\ProcessHacker.exe
WinRAR.exe
User:
admin
Company:
wj32
Integrity Level:
MEDIUM
Description:
Process Hacker
Exit code:
0
Version:
2.39.0.124
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3544.9224\processhacker-2.39-bin\x86\processhacker.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winsta.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
939
Read events
900
Write events
39
Delete events
0

Modification events

(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3544) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\processhacker-2.39-bin.zip
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3544) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
58
Suspicious files
2
Text files
10
Unknown types
2

Dropped files

PID
Process
Filename
Type
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\COPYRIGHT.txttext
MD5:39B07060A5C6199730219E29C747C061
SHA256:319CD301CF40BE03C00CD086560D4E810E0F6D0DBFDC2D28D6AF3522C027CF49
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\x64\plugins\ExtendedNotifications.dllexecutable
MD5:BE4DC4D2D1D05001AB0BB2BB8659BFAD
SHA256:61E8CD8DE80A5C0D7CED280FE04AD8387A846A7BF2EE51BCBBA96B971C7C1795
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\x64\plugins\ExtendedServices.dllexecutable
MD5:4858BDB7731BF0B46B247A1F01F4A282
SHA256:5AE7C0972FD4E4C4AE14C0103602CA854377FEFCBCCD86FA68CFC5A6D1F99F60
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\x64\plugins\ExtendedTools.dllexecutable
MD5:BC61E6FB02FBBFE16FB43CC9F4E949F1
SHA256:F2805E0F81513641A440F1A21057A664961C22192CB33FCA3870362C8F872D87
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\LICENSE.txttext
MD5:EB59E0A5D01D0A5B02DA0C9E7786969F
SHA256:C38E811F6F83428921D0CECD998A44B717149B577B4C1A63B66064F03C34E4E7
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\CHANGELOG.txttext
MD5:B13DE4E8531AF294F87FFDDCCB08D7CE
SHA256:69E38F590A9A25F656E7507AF76229A3A6678A8C57B4E879FF8CE7E52FD704FF
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\x64\peview.exeexecutable
MD5:DDE1F44789CD50C1F034042D337DEAE3
SHA256:4259E53D48A3FED947F561FF04C7F94446BEDD64C87F52400B2CB47A77666AAA
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\README.txttext
MD5:72AC5A8DD6491E525B9783C9BC439FE6
SHA256:0C4F051675A690EA4DB6AB2EB81FDCED6990E2538AD21DC4610AA5925253A090
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\x64\plugins\WindowExplorer.dllexecutable
MD5:0E8D04159C075F0048B89270D22D2DBB
SHA256:282696487EA5DC781788D5D8477B977F72B7C70F201C2AF0CFE7E1A9FD8D749A
3544WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3544.7783\processhacker-2.39-bin\x64\plugins\ToolStatus.dllexecutable
MD5:3788EFFF135F8B17A179D02334D505E6
SHA256:5713D40DEC146DBC819230DAEFE1B886FA6D6F6DBD619301BB8899562195CBAB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3744
ProcessHacker.exe
162.243.25.33:443
wj32.org
Digital Ocean, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
wj32.org
  • 162.243.25.33
whitelisted

Threats

No threats detected
No debug info