File name:

ProgramData.zip

Full analysis: https://app.any.run/tasks/a04c79b8-19cb-4e18-8c1d-05b6d58c5d46
Verdict: Malicious activity
Analysis date: August 13, 2024, 13:07:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

8215BE6CC9CD232DE0DF99D188DD0ADE

SHA1:

6127400FA93F3652C8786E4E8B4F7F18DA4D060C

SHA256:

D180170D4EC50E90688C0034B81CBEE8DF4ACA18A8FC332FF5969CD2062F60E8

SSDEEP:

98304:OXdLTXlETf0S1eHFKCr2TN5k3eGXd3XdabwmFGhO85x4XveH4D9xD0yYJ7+hyC7P:s/6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the login/logoff helper path in the registry

      • svcr.exe (PID: 6364)
    • Disables the Shutdown in the Start menu

      • svcr.exe (PID: 6364)
    • Creates or modifies Windows services

      • svcr.exe (PID: 6364)
    • Changes the autorun value in the registry

      • svcr.exe (PID: 6364)
    • Starts NET.EXE for service management

      • net.exe (PID: 5104)
      • cmd.exe (PID: 1488)
      • cmd.exe (PID: 1692)
      • net.exe (PID: 4824)
      • net.exe (PID: 6792)
      • cmd.exe (PID: 6080)
      • cmd.exe (PID: 2152)
      • net.exe (PID: 1060)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 6404)
    • Reads security settings of Internet Explorer

      • svcr.exe (PID: 6180)
      • alternateshell.exe (PID: 5880)
      • logonsession.exe (PID: 5292)
      • removelastfolders.exe (PID: 6176)
      • uninst.exe (PID: 5656)
      • svcr.exe (PID: 7052)
      • svcr.exe (PID: 1432)
    • Reads the date of Windows installation

      • removelastfolders.exe (PID: 6176)
      • alternateshell.exe (PID: 5880)
      • uninst.exe (PID: 5656)
      • logonsession.exe (PID: 5292)
      • svcr.exe (PID: 7052)
    • Starts CMD.EXE for commands execution

      • svcr.exe (PID: 6364)
    • Application launched itself

      • svcr.exe (PID: 7052)
    • Executable content was dropped or overwritten

      • svcr.exe (PID: 6364)
    • Drops the executable file immediately after the start

      • svcr.exe (PID: 6364)
  • INFO

    • Checks supported languages

      • svcr.exe (PID: 6180)
      • svcr.exe (PID: 7072)
      • alternateshell.exe (PID: 5880)
      • svcr.exe (PID: 6228)
      • logonsession.exe (PID: 5292)
      • uninst.exe (PID: 5656)
      • svcr.exe (PID: 7052)
      • svcr.exe (PID: 1432)
      • svcr.exe (PID: 6364)
      • removelastfolders.exe (PID: 6176)
    • Manual execution by a user

      • removelastfolders.exe (PID: 6176)
      • mspaint.exe (PID: 2268)
      • svcr.exe (PID: 6180)
      • alternateshell.exe (PID: 5880)
      • logonsession.exe (PID: 5292)
      • uninst.exe (PID: 5656)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6404)
    • Reads mouse settings

      • svcr.exe (PID: 6180)
      • svcr.exe (PID: 6228)
      • svcr.exe (PID: 1432)
      • svcr.exe (PID: 7052)
      • svcr.exe (PID: 6364)
      • svcr.exe (PID: 7072)
    • Reads the computer name

      • alternateshell.exe (PID: 5880)
      • logonsession.exe (PID: 5292)
      • uninst.exe (PID: 5656)
      • svcr.exe (PID: 7052)
      • svcr.exe (PID: 1432)
      • svcr.exe (PID: 6364)
      • removelastfolders.exe (PID: 6176)
      • svcr.exe (PID: 6180)
    • Process checks computer location settings

      • alternateshell.exe (PID: 5880)
      • logonsession.exe (PID: 5292)
      • removelastfolders.exe (PID: 6176)
      • uninst.exe (PID: 5656)
      • svcr.exe (PID: 7052)
    • Creates files or folders in the user directory

      • svcr.exe (PID: 1432)
    • Create files in a temporary directory

      • svcr.exe (PID: 6364)
    • Creates files in the program directory

      • svcr.exe (PID: 6364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:08:13 15:06:18
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: ProgramData/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
32
Malicious processes
3
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs svcr.exe no specs removelastfolders.exe no specs svcr.exe no specs mspaint.exe no specs alternateshell.exe no specs svcr.exe no specs logonsession.exe no specs svcr.exe no specs uninst.exe no specs svcr.exe no specs svcr.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs net.exe no specs net.exe no specs net1.exe no specs net.exe no specs net.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
400C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
400sc config TermService depend= RPCSSC:\Windows\SysWOW64\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
936C:\WINDOWS\system32\net1 STOP APSCC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Version:
10.0.19041.3636 (WinBuild.160101.0800)
1060NET STOP APSCC:\Windows\SysWOW64\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Version:
10.0.19041.1 (WinBuild.160101.0800)
1432"C:\Users\admin\Desktop\ProgramData\ProgramData\svcr.exe" "logonsession.bin" "C:\Users\admin\Desktop\ProgramData\ProgramData\logonsession.exe" C:\Users\admin\Desktop\ProgramData\ProgramData\svcr.exelogonsession.exe
User:
admin
Company:
JWTS
Integrity Level:
MEDIUM
Description:
Application Runtime
Exit code:
0
Version:
3, 3, 16, 1
1488C:\WINDOWS\system32\cmd.exe /c NET STOP APSCC:\Windows\SysWOW64\cmd.exesvcr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
1692C:\WINDOWS\system32\cmd.exe /c NET STOP SVCEC:\Windows\SysWOW64\cmd.exesvcr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
2044C:\WINDOWS\system32\cmd.exe /c sc config TermService depend= RPCSSC:\Windows\SysWOW64\cmd.exesvcr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
2152C:\WINDOWS\system32\cmd.exe /c NET STOP SVCMC:\Windows\SysWOW64\cmd.exesvcr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
2268"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\ProgramData\ProgramData\icon.ico"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\combase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\mpr.dll
Total events
12 389
Read events
12 260
Write events
125
Delete events
4

Modification events

(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\ProgramData.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop\ProgramData
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
7
Suspicious files
2
Text files
2
Unknown types
6

Dropped files

PID
Process
Filename
Type
6404WinRAR.exeC:\Users\admin\Desktop\ProgramData\ProgramData\alternateshell.exeexecutable
MD5:9EC3D89978C9A2EA2A7454D2913D79D2
SHA256:7ACD2E8F32235743D25B48D9B679B553E60A6348E13EDD4F7EAB6AEE79FEFE2C
6364svcr.exeC:\wsession\sendtoclient\uninstalledtext
MD5:B326B5062B2F0E69046810717534CB09
SHA256:B5BEA41B6C623F7C09F1BF24DCAE58EBAB3C0CDD90AD966BC43A45B44867E12B
6364svcr.exeC:\Users\admin\AppData\Local\Temp\aut501C.tmpbinary
MD5:5B6C1E8CB03D6FB0931907BEAB132959
SHA256:B7A3A1D961CA2DCCA8C404FC58DDD842B2BA7E845BFCAB1E5575DAFE897F2695
6404WinRAR.exeC:\Users\admin\Desktop\ProgramData\ProgramData\svcr.exeexecutable
MD5:0843004FB6F474DD6C69761BF1833DD4
SHA256:7214D046DEE3CFBB7F4063F2D5F54ED453104602636A73625B5D5DEC385C5187
6404WinRAR.exeC:\Users\admin\Desktop\ProgramData\ProgramData\removelastfolders.exeexecutable
MD5:9EC3D89978C9A2EA2A7454D2913D79D2
SHA256:7ACD2E8F32235743D25B48D9B679B553E60A6348E13EDD4F7EAB6AEE79FEFE2C
6364svcr.exeC:\Users\admin\AppData\Local\Temp\aut4FDC.tmpa3x
MD5:E84169A715E34C4067940ED332361C7D
SHA256:1342E0E6019F6671E5C62F5295A99DFFAAE696C3DE2DC43719F960FE33A961F2
6404WinRAR.exeC:\Users\admin\Desktop\ProgramData\ProgramData\removelastfolders.bina3x
MD5:E84169A715E34C4067940ED332361C7D
SHA256:1342E0E6019F6671E5C62F5295A99DFFAAE696C3DE2DC43719F960FE33A961F2
6404WinRAR.exeC:\Users\admin\Desktop\ProgramData\ProgramData\uninst.bina3x
MD5:7C339102759F647E5D6EA64605D873B9
SHA256:F38CF49346590609AE16DE51EAA73FECD798AB00B763683590BEF04EEDB29033
6404WinRAR.exeC:\Users\admin\Desktop\ProgramData\ProgramData\uninst.exeexecutable
MD5:9EC3D89978C9A2EA2A7454D2913D79D2
SHA256:7ACD2E8F32235743D25B48D9B679B553E60A6348E13EDD4F7EAB6AEE79FEFE2C
6364svcr.exeC:\ProgramData\removelastfolders.bina3x
MD5:E84169A715E34C4067940ED332361C7D
SHA256:1342E0E6019F6671E5C62F5295A99DFFAAE696C3DE2DC43719F960FE33A961F2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
42
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4544
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6724
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6768
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3520
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3476
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:137
whitelisted
3476
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5336
SearchApp.exe
2.23.209.130:443
www.bing.com
Akamai International B.V.
GB
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.23.209.130
  • 2.23.209.191
  • 2.23.209.140
  • 2.23.209.131
  • 2.23.209.135
  • 2.23.209.141
  • 2.23.209.189
  • 2.23.209.133
  • 2.23.209.192
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.75
  • 20.190.159.0
  • 20.190.159.4
  • 40.126.31.73
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.23
whitelisted
th.bing.com
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.150
  • 2.23.209.162
  • 2.23.209.167
  • 2.23.209.149
  • 2.23.209.156
  • 2.23.209.161
  • 2.23.209.166
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

No threats detected
No debug info