download:

/files/file/1/download/alcor-u2-mp-v19041500-b16a-b17a_d08/

Full analysis: https://app.any.run/tasks/e9d890d4-4d3d-4bf0-955f-84bc0d345653
Verdict: Malicious activity
Analysis date: January 26, 2025, 00:29:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

B6757AE95EA06BD563A27F4AABAD26DF

SHA1:

4624B8652E8D40420953A614CCC943A26622991F

SHA256:

C9FF8EB52F005AEF6E89BDFF493ACF3EA0AC2984AD51794BB29C8B660754E625

SSDEEP:

98304:CPdR5jtMEMO60fuK0nLPF/UI7zntkFlcTBrpdy6XnMQMranc1E/X+91vp98GF+Ss:aCFw0tp9QtWNh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5560)
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 5560)
      • LoadDrv.exe (PID: 5496)
    • Creates file in the systems drive root

      • AlcorMP.exe (PID: 2160)
    • Executable content was dropped or overwritten

      • LoadDrv.exe (PID: 5496)
    • Creates files in the driver directory

      • LoadDrv.exe (PID: 5496)
    • There is functionality for taking screenshot (YARA)

      • AlcorMP.exe (PID: 2160)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 5560)
      • LoadDrv.exe (PID: 5496)
    • Manual execution by a user

      • notepad.exe (PID: 1156)
      • AlcorMP.exe (PID: 1468)
      • AlcorMP.exe (PID: 2160)
      • AutoMP.exe (PID: 4024)
      • AutoMP.exe (PID: 3188)
      • AlcFmt.exe (PID: 5592)
      • AlcFmt.exe (PID: 1852)
      • AlcorMP.exe (PID: 3296)
      • AlcorMP.exe (PID: 4672)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 5560)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5560)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 1156)
    • Checks supported languages

      • AlcorMP.exe (PID: 2160)
      • KillBaboon.exe (PID: 1356)
      • LoadDrv.exe (PID: 624)
      • LoadDrv.exe (PID: 5496)
      • DrvCovEx.exe (PID: 936)
      • KillBaboon.exe (PID: 5000)
      • VerifyCat.exe (PID: 6072)
      • AlcFmt.exe (PID: 5592)
      • AutoMP.exe (PID: 4024)
      • AlcFmt.exe (PID: 1852)
      • AutoMP.exe (PID: 3188)
      • AlcorMP.exe (PID: 3296)
    • Reads the computer name

      • AlcorMP.exe (PID: 2160)
      • LoadDrv.exe (PID: 5496)
      • AutoMP.exe (PID: 4024)
      • AutoMP.exe (PID: 3188)
      • DrvCovEx.exe (PID: 936)
      • AlcorMP.exe (PID: 3296)
    • Reads the software policy settings

      • VerifyCat.exe (PID: 6072)
    • Reads the machine GUID from the registry

      • VerifyCat.exe (PID: 6072)
    • Create files in a temporary directory

      • VerifyCat.exe (PID: 6072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2020:05:02 13:47:29+00:00
ArchivedFileName: ALCOR U2 MP v19.04.15.00 B16A B17A
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
24
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs notepad.exe no specs alcormp.exe no specs alcormp.exe killbaboon.exe no specs loaddrv.exe no specs conhost.exe no specs loaddrv.exe conhost.exe no specs drvcovex.exe no specs killbaboon.exe no specs verifycat.exe no specs conhost.exe no specs automp.exe no specs alcormp.exe no specs alcfmt.exe no specs conhost.exe no specs alcfmt.exe no specs conhost.exe no specs automp.exe no specs alcormp.exe no specs alcormp.exe no specs alcormp.exe

Process information

PID
CMD
Path
Indicators
Parent process
624"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\drivers\LoadDrv.exe" SetIgnoreHwID 058f6387C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\DRIVERS\LoadDrv.exeAlcorMP.exe
User:
admin
Company:
ALCOR
Integrity Level:
HIGH
Description:
LoadDrv
Exit code:
0
Version:
1, 2, 0, 0
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\drivers\loaddrv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
936C:\WINDOWS\system32\DrvCovEx.exe RegisterOnly DrvCovExC:\Windows\SysWOW64\DrvCovEx.exeLoadDrv.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\windows\syswow64\drvcovex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1156"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.iniC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1356"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\\DRIVERS\KillBaboon.exe"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\DRIVERS\KillBaboon.exeAlcorMP.exe
User:
admin
Integrity Level:
HIGH
Description:
KillBaboon
Version:
1, 2, 0, 0
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\drivers\killbaboon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1468"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.exe" C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MP
Exit code:
3221226540
Version:
3, 1, 1, 33
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\alcormp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1852"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcFmt.exe" C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcFmt.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\alcfmt.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shell32.dll
c:\windows\syswow64\msvcp_win.dll
2160"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.exe" C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
MP
Version:
3, 1, 1, 33
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\alcormp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
3188"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AutoMP.exe" C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AutoMP.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AutoMP Microsoft 基础类应用程序
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\automp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
3260\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLoadDrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3260"C:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\\AlcorMP.exe" -AT:0005048AC:\Users\admin\Desktop\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.exeAutoMP.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MP
Exit code:
3221226540
Version:
3, 1, 1, 33
Modules
Images
c:\users\admin\desktop\alcor u2 mp v19.04.15.00 b16a b17a\alcormp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
8 886
Read events
8 863
Write events
23
Delete events
0

Modification events

(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\alcor-u2-mp-v19041500-b16a-b17a_d08.7z
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(5560) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
32
Suspicious files
13
Text files
267
Unknown types
0

Dropped files

PID
Process
Filename
Type
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.initext
MD5:D5F6BC4865E865E788F5B6CCBBB55F39
SHA256:0D9E4AB9514CA51925E3AF30C41661A34E0E7E90088280E6F36A1AD764C11A79
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\AUTORUN\9384.imgbinary
MD5:08F9BCB981C3018B18AC8D7DFF51D822
SHA256:7239FF04D41997F048CB6C9B42D2DEAC2D2B7AFCD7296B180AEB4B63C25D9ABB
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\flashlist.aflbinary
MD5:1D48BAD23C2A81969EE7334334CB66A3
SHA256:F19801F9B7B91BA7BC56773DA6EB5B6AF8E73D9B489EB967E58ED25E55DD184E
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\DRIVERS\BackMp.catbinary
MD5:0AE58B2F6F109240B81E626CD0E5C137
SHA256:79BB3DB8720E5B60D20581897377569316C479493E8777A09B1F2054B89E1CFF
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\AUTORUN\Reserve.imgbinary
MD5:9F0B3CFC69D17A67B7B0AE7EA93BC57C
SHA256:3E4001500F6ECFC1AF63E8286DA31E17730457B03D0E5718A619C1FA0FAE33F7
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\DRIVERS\CatSetting.initext
MD5:A5087171A86654CE35201CEB6653AF14
SHA256:784F1CB69D7428425707DE38CC47E97BCB63D9682A622F92B4682D60291930A9
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\FlashList.inibinary
MD5:9A5216A5137FAC86BE192387A36410C4
SHA256:C29A8AC2F950918B45715CDD90B94830EBDA0FE002B81A1809ABE7DA5840FA10
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\FlashList.dattext
MD5:D211356E46C4B16FC7DC97F4DB38ABF3
SHA256:56C0C0B4B4C91E0232C71C1D4321159784F416F0A2F78FCA6FC9A053A36CD112
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\AU698X MP user's manual_Chinese.pdfpdf
MD5:2E0E8192CBD52D9D1E369D2C2555A127
SHA256:BC5943224F643234924B3D83F71C98FC3CEA43B8EA5CD1EB99DD46EF78BAE37A
5560WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5560.19444\ALCOR U2 MP v19.04.15.00 B16A B17A\AlcorMP.cfgtext
MD5:F4BA0B8C9057DE6C9E07AD45B03FCB9B
SHA256:374403C7A14667DD4321D58AED8B32102C84074ADEEB6943F385733C1F2CDE6D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
23
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3976
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5208
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.206:49687
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
dns.msftncsi.com
  • 131.107.255.255
whitelisted

Threats

No threats detected
No debug info