File name:

7-zip-23.01-x64.exe

Full analysis: https://app.any.run/tasks/d3f7f19b-cfa5-448f-9498-986df51448b6
Verdict: Malicious activity
Analysis date: February 29, 2024, 19:47:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

32ACD68BB81B9B19A462D8615C68EBA0

SHA1:

6A36B159DCA84D04E39A992A1F5FCA87994B66D5

SHA256:

D300F2D67026BD348D49559F4F7F07C3677F3C2034BA6FF2A0E616BF414441C4

SSDEEP:

49152:bANChsry7gOjuqcwOYMSRbfvLhr7mHQBBFK5ywld+659Oho9ti9cXd7LlFC5rl7P:bOragOI9bSRbvlCHQBSgwL5KoaaBLTi/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 7-zip-23.01-x64.exe (PID: 2844)
  • SUSPICIOUS

    • Searches for installed software

      • 7-zip-23.01-x64.exe (PID: 2844)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • 7-zip-23.01-x64.exe (PID: 2844)
    • Drops 7-zip archiver for unpacking

      • 7-zip-23.01-x64.exe (PID: 2844)
    • The process creates files with name similar to system file names

      • 7-zip-23.01-x64.exe (PID: 2844)
    • Starts application with an unusual extension

      • 7-zip-23.01-x64.exe (PID: 2844)
    • Executable content was dropped or overwritten

      • 7-zip-23.01-x64.exe (PID: 2844)
  • INFO

    • Create files in a temporary directory

      • 7-zip-23.01-x64.exe (PID: 2844)
    • Checks supported languages

      • nsF9D3.tmp (PID: 3944)
      • 7-zip-23.01-x64.exe (PID: 2844)
      • 7z2301-x64.exe (PID: 3932)
    • Reads the computer name

      • 7-zip-23.01-x64.exe (PID: 2844)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:12:27 05:38:55+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24576
InitializedDataSize: 164864
UninitializedDataSize: 1024
EntryPoint: 0x310d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 7-zip-23.01-x64.exe nsf9d3.tmp no specs 7z2301-x64.exe no specs 7-zip-23.01-x64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2844"C:\Users\admin\Desktop\7-zip-23.01-x64.exe" C:\Users\admin\Desktop\7-zip-23.01-x64.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\7-zip-23.01-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3672"C:\Users\admin\Desktop\7-zip-23.01-x64.exe" C:\Users\admin\Desktop\7-zip-23.01-x64.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\7-zip-23.01-x64.exe
c:\windows\system32\ntdll.dll
3932"C:\Users\admin\AppData\Local\Temp\7zip\Install\7z2301-x64.exe" /S /D=""C:\Users\admin\AppData\Local\Temp\7zip\Install\7z2301-x64.exensF9D3.tmp
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Installer
Exit code:
1
Version:
23.01
Modules
Images
c:\users\admin\appdata\local\temp\7zip\install\7z2301-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3944"C:\Users\admin\AppData\Local\Temp\nsrF964.tmp\nsF9D3.tmp" "C:\Users\admin\AppData\Local\Temp\7zip\Install\7z2301-x64.exe" /S /D=""C:\Users\admin\AppData\Local\Temp\nsrF964.tmp\nsF9D3.tmp7-zip-23.01-x64.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\nsrf964.tmp\nsf9d3.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
644
Read events
642
Write events
2
Delete events
0

Modification events

(PID) Process:(2844) 7-zip-23.01-x64.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\nsrF964.tmp\NSISpcre.dll
Executable files
6
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
28447-zip-23.01-x64.exeC:\Users\admin\AppData\Local\Temp\nsrF964.tmp\NSISpcre.dllexecutable
MD5:BFE060C22B44914E05D3F5367DE6C9FE
SHA256:43041F8540DCCBC33268BFBEF53037D17170B037F6393E77C21429F303AE828F
28447-zip-23.01-x64.exeC:\Users\admin\AppData\Local\Temp\nsrF964.tmp\nsProcess.dllexecutable
MD5:FAA7F034B38E729A983965C04CC70FC1
SHA256:579A034FF5AB9B732A318B1636C2902840F604E8E664F5B93C07A99253B3C9CF
28447-zip-23.01-x64.exeC:\Users\admin\AppData\Local\Temp\nsrF964.tmp\System.dllexecutable
MD5:0FF5120F1AFD0F295C2BAA0F7192D3F8
SHA256:4CA5BF1BEB4B802914C4D3E2F37861F6BA5ECF969CFEADF5855EDF58F647A721
28447-zip-23.01-x64.exeC:\Users\admin\AppData\Local\Temp\7zip\Install\7z2301-x64.exeexecutable
MD5:E5788B13546156281BF0A4B38BDD0901
SHA256:26CB6E9F56333682122FAFE79DBCDFD51E9F47CC7217DCCD29AC6FC33B5598CD
28447-zip-23.01-x64.exeC:\Users\admin\AppData\Local\Temp\nsrF964.tmp\nsExec.dllexecutable
MD5:F9BE9E9ED447E7650434A7E46431BAEA
SHA256:5797BA15A18B8C713DF62D4A630DDD81FEFEEB01A87D65D486D829991A1EDC83
28447-zip-23.01-x64.exeC:\Users\admin\AppData\Local\Temp\nsrF964.tmp\nsF9D3.tmpexecutable
MD5:F9BE9E9ED447E7650434A7E46431BAEA
SHA256:5797BA15A18B8C713DF62D4A630DDD81FEFEEB01A87D65D486D829991A1EDC83
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info