File name:

STTOOL_V381_12_SZ_20210618_MOD.7z

Full analysis: https://app.any.run/tasks/9b9fb7e0-16a1-4969-9e7e-cfe230733509
Verdict: Malicious activity
Analysis date: June 25, 2025, 19:55:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

5F93E734F975D869ADE2F470A595095F

SHA1:

ACA72BEE164877719F354B71A97DFF190FC32363

SHA256:

CE1597A6BEF8C4282A769AF1F7848221B109192C582BD1FA36A3A656218B9EC1

SSDEEP:

98304:Lu3QcDPDjpItMVWbi2EKhmdIpndk2/+VThwUiZIccjVs4nu/3nTBue6r29ShbggD:1JM52xPx4pb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 6412)
      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
      • STTOOL_F1_90_v200_00_SZ.exe (PID: 4828)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7096)
      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
    • Creates files in the driver directory

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
    • Executable content was dropped or overwritten

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
    • Drops a system driver (possible attempt to evade defenses)

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
    • Creates or modifies Windows services

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
    • There is functionality for taking screenshot (YARA)

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
      • MPParamEdit_F1_90.exe (PID: 5808)
    • Application launched itself

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 7096)
      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7096)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 7096)
    • Reads the computer name

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
      • MPParamEdit_F1_90.exe (PID: 5808)
      • STTOOL_F1_90_v200_00_SZ.exe (PID: 4828)
    • Checks supported languages

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
      • MPParamEdit_F1_90.exe (PID: 5808)
      • STTOOL_F1_90_v200_00_SZ.exe (PID: 4828)
    • Process checks computer location settings

      • STTOOL_F1_90_v200_00_SZ.exe (PID: 1984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2023:05:10 00:27:52+00:00
ArchivedFileName: BinColor
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
6
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sttool_f1_90_v200_00_sz.exe no specs sttool_f1_90_v200_00_sz.exe mpparamedit_f1_90.exe sttool_f1_90_v200_00_sz.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1984"C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exe
WinRAR.exe
User:
admin
Company:
Best Company
Integrity Level:
HIGH
Description:
Build by VC
Exit code:
2
Version:
2.0.1.6
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7096.12141\sttool_f1_90_v200_00_sz.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
4828"C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exe
STTOOL_F1_90_v200_00_SZ.exe
User:
admin
Company:
Best Company
Integrity Level:
HIGH
Description:
Build by VC
Version:
2.0.1.6
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7096.12141\sttool_f1_90_v200_00_sz.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
5284C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5808"C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\MPParamEdit_F1_90.exe" 144 .\ST.ini DL01 1C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\MPParamEdit_F1_90.exe
STTOOL_F1_90_v200_00_SZ.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Version:
3, 10, 11, 0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7096.12141\mpparamedit_f1_90.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6412"C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exeWinRAR.exe
User:
admin
Company:
Best Company
Integrity Level:
MEDIUM
Description:
Build by VC
Exit code:
3221226540
Version:
2.0.1.6
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7096.12141\sttool_f1_90_v200_00_sz.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7096"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\STTOOL_V381_12_SZ_20210618_MOD.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
2 658
Read events
2 634
Write events
24
Delete events
0

Modification events

(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\STTOOL_V381_12_SZ_20210618_MOD.7z
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1984) STTOOL_F1_90_v200_00_SZ.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\usbflags
Operation:writeName:IgnoreHWSerNum13fe3400
Value:
01
(PID) Process:(1984) STTOOL_F1_90_v200_00_SZ.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\usbflags
Operation:writeName:IgnoreHWSerNum13fe3100
Value:
01
Executable files
13
Suspicious files
80
Text files
24
Unknown types
0

Dropped files

PID
Process
Filename
Type
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\16GB_BinColor.initext
MD5:F5E147145DD0854DEE974E6EFA667BD5
SHA256:603C592F1742F526EA57A3CDB047D03071691BF35885FF150D3EFEDCBFB9F131
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\32GB_BinColor.initext
MD5:A9E65E9316C32E95F87F0D7023FE8968
SHA256:CB9A098D96A92DAAE9B3D6EB6F8E2D69BF25B4A70D62DF2C2A243D8604947628
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\192GB_BinColor.initext
MD5:BB043F1E4F89CFEAD001D5C724168EA9
SHA256:FE5C8738112D344E490FFC5121BF9DC66B397F3155CBC3DEF397A6F6C1C81EB2
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\384GB_BinColor.initext
MD5:09FFC539E3E7A064C0241D8381A77EC3
SHA256:1D974DD6F374EAC2EFC741F52056BD7B2C9623595D0C4123183A9B92FD7BF9BE
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\512GB_BinColor.initext
MD5:F938C3DD7FA9A68F9D965CE618D675E1
SHA256:FDD6A4E266C2C3E09035597B4C8DCC6BD65B9B2267BE7CA01511A5250837F98D
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\64GB_BinColor.initext
MD5:1AAC4743FD6F7C9E908C907B49C74979
SHA256:034BC2ABC3782C19C24CAE8AD3994F5B866289529497A08295A1465A0DF5F929
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BIN_FW\b2319_bank.binbinary
MD5:B7839824DD9F062FC44980233030FE51
SHA256:F16AB0129139EE2D912502C76634487320374DA3304AC797224B9A9FFB167003
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\8GB_BinColor.initext
MD5:F5E147145DD0854DEE974E6EFA667BD5
SHA256:603C592F1742F526EA57A3CDB047D03071691BF35885FF150D3EFEDCBFB9F131
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BIN_FW\b2267_bank.binbinary
MD5:8B2C688BF9F93AF0B0B039F91BDC912D
SHA256:5B6D217234D869597A037115FC3F179E985E437A99551EBC38CA94964AD08CEA
7096WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\BinColor\96GB_BinColor.initext
MD5:1F5BC8F9211CF4671ED3091600CB315D
SHA256:3BCE675BCF8F7B0DC76867F37B7E2CD2F6177F105B8D2948D009D73992D68D46
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2288
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3608
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3608
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5576
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2288
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2288
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.78
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.66
  • 40.126.32.133
  • 20.190.160.130
  • 20.190.160.14
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
Process
Message
STTOOL_F1_90_v200_00_SZ.exe
Init criticalSection
STTOOL_F1_90_v200_00_SZ.exe
MyFlashInfo : filename
STTOOL_F1_90_v200_00_SZ.exe
flashInfo.csv
STTOOL_F1_90_v200_00_SZ.exe
PortSetting
STTOOL_F1_90_v200_00_SZ.exe
C:\Users\admin\AppData\Local\Temp\Rar$EXa7096.12141\STTOOL_F1_90_v200_00_SZ.exe
STTOOL_F1_90_v200_00_SZ.exe
****CMPProgramDlg::GetVarFromIni
STTOOL_F1_90_v200_00_SZ.exe
W7 GetMACaddress start
STTOOL_F1_90_v200_00_SZ.exe
blEraseKeepEarly = 0
STTOOL_F1_90_v200_00_SZ.exe
blEraseKeepEarly = 0
STTOOL_F1_90_v200_00_SZ.exe
IgnoreHWSerNum13fe3100