File name:

Now-E-3-P-I-O-T.zip

Full analysis: https://app.any.run/tasks/3b7e8148-d67d-495b-b250-9ee55bd9d88b
Verdict: Malicious activity
Analysis date: March 11, 2025, 16:13:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

C431D2C0B13B2D104ED9A9B040D8BAB6

SHA1:

C7A54E17213C8FE7D9271074838156E17AC57A4A

SHA256:

D43AE989CCB100CC431FFFE775068FD2514A51683FE94355837314B9D276885B

SSDEEP:

786432:iRmPIjwGBQT/Q6djNP7pByIvEphPRQrbp:bPIjHBQrQ6djN7Py9ip

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7780)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7780)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 7780)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 7780)
  • INFO

    • Manual execution by a user

      • notepad.exe (PID: 8012)
      • notepad.exe (PID: 8052)
      • notepad.exe (PID: 8092)
      • notepad.exe (PID: 8136)
      • OpenWith.exe (PID: 7336)
      • OpenWith.exe (PID: 7236)
      • notepad.exe (PID: 8180)
      • notepad.exe (PID: 7268)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 7780)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 8012)
      • notepad.exe (PID: 8052)
      • notepad.exe (PID: 8092)
      • notepad.exe (PID: 8136)
      • notepad.exe (PID: 8180)
      • notepad.exe (PID: 7268)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7780)
    • Checks supported languages

      • MpCmdRun.exe (PID: 2236)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 2236)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 7336)
      • OpenWith.exe (PID: 7236)
    • Reads the computer name

      • MpCmdRun.exe (PID: 2236)
    • Checks proxy server information

      • slui.exe (PID: 7196)
    • Reads the software policy settings

      • slui.exe (PID: 7196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:03:08 16:22:46
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Now-E-3-P-I-O-T/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
13
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs openwith.exe no specs openwith.exe no specs slui.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2236"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
4244C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Rar$Scan55519.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
7196C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7204\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7236"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\vk_swiftshader_icd.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7268"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\test_2.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7336"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\ProtectionManagement.mflC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7780"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Now-E-3-P-I-O-T.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8012"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\LICENSE.electron.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
8052"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\loadfile.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
7 018
Read events
7 008
Write events
10
Delete events
0

Modification events

(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Now-E-3-P-I-O-T.zip
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
(PID) Process:(7780) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
32
Executable files
33
Suspicious files
192
Text files
19
Unknown types
0

Dropped files

PID
Process
Filename
Type
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\AMMonitoringProvider.dllexecutable
MD5:F2AE2445AC7ECA1EE8480321B03241FA
SHA256:8DA3D256EF7DF249138D8E934FBD74FDA8F31C5B5758F26A757F2C686E1DEBDF
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\en-US\MpEvMsg.dll.muiexecutable
MD5:0F7456FBB76D25BB366A6FA9A9D4D7CE
SHA256:3C18C85F5C5C96DB16A83FEB576F41857B664B9FEB026E6E7859AAB428FBF9D4
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\ClientWMIInstall.moftext
MD5:6FE3967E8035358D369C83FA72400006
SHA256:29EFFB537FBC7C0CF869E61BFA5262CF7A7301604298E44373A637585C3504C7
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\AmStatusInstall.moftext
MD5:EAA6FC46125F59D04BCBB6122817B41E
SHA256:67191020D74AE8400F875238E494AAF5D28EEFEC7EFE1D1D20D2DB068D5E35D6
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\en-US\MpAsDesc.dll.muiexecutable
MD5:EDE95C8AA6DF53157AF7CF7C7AC7875D
SHA256:2F8D7E52AA8284DF93B02A8C7514E7A6440B61A3305EE735326DADE033FD5D68
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\en-US\ProtectionManagement.dll.muiexecutable
MD5:752AD6B6FFA3A5CC25E1EF6CFAC6E826
SHA256:115C3FDD3374332BB063793ACF7D0F4DF94E9F4B5A25D4E28D6A783AE0275234
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\en-US\EppManifest.dll.muiexecutable
MD5:1F9E87B6393FAD0794FF9CA470A5FC54
SHA256:AF826EA80A404AA017E2C2FA91076D962B40E4D0D2A27D292EDB8BF7ADC19AE4
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\AmMonitoringInstall.moftext
MD5:1FC6F870588FEF1B38BA900026BE8828
SHA256:A24DD47738189CA55A5137A49FD1246418BC1C589A4294B79DFCC4D2A79C9098
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\EppManifest.dllexecutable
MD5:E1414283B5FB25E3A0AA034104E187D3
SHA256:5768486507CE07E7C387E409714244FE2A96B33D1666D24825AA181AC3CEF5BC
7780WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR7780.49172\Now-E-3-P-I-O-T.zip\Now-E-3-P-I-O-T\en-US\ProtectionManagement_Uninstall.mfltext
MD5:AFE6664D26D5D05B4568E329BE37D7DE
SHA256:B6BAC201F1586B4C357521C46421086557A0DF86A022B120B723EB047E450D43
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
21
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
7412
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
7196
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
unknown
google.com
  • 142.250.186.174
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info