File name:

MangaMeeya.zip

Full analysis: https://app.any.run/tasks/339e5f69-fd24-48b4-975b-b778de697931
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: March 20, 2025, 07:04:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
arch-doc
arch-html
stealer
aspack
backdoor
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

A3EE98FB7645EA4D9B83924CE3868D40

SHA1:

39DE0771194F9AEA893AC14B5E0F98FF9603008E

SHA256:

D6DAD53093A9DA729A3BABE9589FCDDA02BD58544F76EECD052EB1076285FF66

SSDEEP:

98304:k79D6G7aRXhfIxqkt2iX2xODdvmmphhHAq3nE8HLRzRHfjAmTlkHRCBaW4lRT4+s:x726kUOvYC5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • upTVSr.exe (PID: 312)
    • Generic archive extractor

      • WinRAR.exe (PID: 2624)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • ntvdm.exe (PID: 3116)
    • Reads security settings of Internet Explorer

      • upTVSr.exe (PID: 312)
    • Drops 7-zip archiver for unpacking

      • WinRAR.exe (PID: 2624)
    • Executable content was dropped or overwritten

      • MangaMeeya.exe (PID: 1748)
      • upTVSr.exe (PID: 312)
    • Reads the Internet Settings

      • upTVSr.exe (PID: 312)
    • Connects to unusual port

      • upTVSr.exe (PID: 312)
    • There is functionality for taking screenshot (YARA)

      • MangaMeeya.exe (PID: 1748)
    • Starts CMD.EXE for commands execution

      • upTVSr.exe (PID: 312)
    • Executing commands from a ".bat" file

      • upTVSr.exe (PID: 312)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2624)
    • Create files in a temporary directory

      • MangaMeeya.exe (PID: 1748)
      • upTVSr.exe (PID: 312)
    • Manual execution by a user

      • MangaMeeya.exe (PID: 1748)
      • notepad.exe (PID: 1936)
    • Checks supported languages

      • MangaMeeya.exe (PID: 1748)
      • upTVSr.exe (PID: 312)
    • Reads the computer name

      • upTVSr.exe (PID: 312)
      • MangaMeeya.exe (PID: 1748)
    • Checks proxy server information

      • upTVSr.exe (PID: 312)
    • Reads the machine GUID from the registry

      • upTVSr.exe (PID: 312)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 2624)
      • upTVSr.exe (PID: 312)
    • Creates files or folders in the user directory

      • upTVSr.exe (PID: 312)
    • Aspack has been detected

      • MangaMeeya.exe (PID: 1748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2022:10:10 22:24:00
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: MangaMeeya/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
11
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe mangameeya.exe uptvsr.exe ntvdm.exe no specs ntvdm.exe no specs ntvdm.exe ntvdm.exe ntvdm.exe cmd.exe no specs notepad.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
312C:\Users\admin\AppData\Local\Temp\upTVSr.exeC:\Users\admin\AppData\Local\Temp\upTVSr.exe
MangaMeeya.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\uptvsr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
948C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\0b557761.bat" "C:\Windows\System32\cmd.exeupTVSr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1028"C:\Windows\system32\ntvdm.exe" -i4 C:\Windows\System32\ntvdm.exe
upTVSr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1500"C:\Windows\system32\ntvdm.exe" -i3 C:\Windows\System32\ntvdm.exe
upTVSr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1748"C:\Users\admin\Desktop\MangaMeeya\MangaMeeya.exe" C:\Users\admin\Desktop\MangaMeeya\MangaMeeya.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\mangameeya\mangameeya.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
1936"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\dd_SetupUtility.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2016"C:\Windows\system32\ntvdm.exe" -i2 C:\Windows\System32\ntvdm.exeupTVSr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2624"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\MangaMeeya.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2748"C:\Windows\system32\ntvdm.exe" -i5 C:\Windows\System32\ntvdm.exe
upTVSr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
2 134
Read events
2 079
Write events
36
Delete events
19

Modification events

(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2624) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\MangaMeeya.zip
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2624) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
36
Suspicious files
6
Text files
56
Unknown types
0

Dropped files

PID
Process
Filename
Type
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\altermeeya.initext
MD5:6BF26321ACB882858D7FB2C21F797F24
SHA256:814BEBB5A2C587A4CC904B6FA5E3871CB10F830872DFA6C6B657079A7BA79DEE
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\AdjustColor.deftext
MD5:CC1D797BD7ACC9C922F84F8A06CCC600
SHA256:3A13DCF96272FF72061659B457427902F9E638D3DEAA4D15677AE9F2FB8581CB
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\warpsharp.dllexecutable
MD5:09DA81827ACEE2807DE0A452DDA899F3
SHA256:65F1D5B1030F3181EAE0B53D06F232BC37735B8E87513833D79D1CD69BEEA5FD
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\ColorYUV2.txttext
MD5:5407015F54FB849802E764AF18B359AE
SHA256:C97531EAB6468321DD8958A19ED373E85478528CDCA479A42F354598A492B65D
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\ColorYUY2_for_25.dllexecutable
MD5:29A858896917F387D51AA355886CB746
SHA256:66BACF4B214BB7E9EE36A412CC5D8E9F1EBB8FFF7C048684B047B3F6EB49C75A
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\arc.dllexecutable
MD5:670487110964B5E5F0EDB79F5FDB7C81
SHA256:4CD042F6864430D7B28E109F94496CBDBE5E3FDA293407D79ECFC5D3FD975647
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\waveletReducer.deftext
MD5:4DE39DD936816A69FAD73841E962A4B2
SHA256:3B1FAFA8EE6E244E18736465D805081EBB72C371DA4606536576A26D726E99C8
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\altermeeya.exeexecutable
MD5:3648FDB36B1278C4B78B8DE9DB5162BF
SHA256:444D9962E548A6364BBE99F482D0462F3A6D33499660A787683997ABD4860792
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\warpsharp.defini
MD5:B1250D57E1D91874133BB5E7BAA438B8
SHA256:09C209E2C94F56240B8FCAB75E99A3CBF9D63D6B194BD24AD3FDA611CBE790AE
2624WinRAR.exeC:\Users\admin\Desktop\MangaMeeya\AvisynthPlugin\MangaMeeya.dllexecutable
MD5:3B3714F5FECF2F9566710F83F75611BB
SHA256:10ED23D786FBE108B9307511F8575D163C899CFE811A6B856EEA3B78210DBBD3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
11
DNS requests
2
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
312
upTVSr.exe
GET
3.229.117.57:799
http://ddos.dnsnb8.net:799/cj//k1.rar
unknown
malicious
312
upTVSr.exe
GET
3.229.117.57:799
http://ddos.dnsnb8.net:799/cj//k2.rar
unknown
malicious
312
upTVSr.exe
GET
3.229.117.57:799
http://ddos.dnsnb8.net:799/cj//k2.rar
unknown
malicious
312
upTVSr.exe
GET
3.229.117.57:799
http://ddos.dnsnb8.net:799/cj//k3.rar
unknown
malicious
312
upTVSr.exe
GET
3.229.117.57:799
http://ddos.dnsnb8.net:799/cj//k5.rar
unknown
malicious
312
upTVSr.exe
GET
3.229.117.57:799
http://ddos.dnsnb8.net:799/cj//k4.rar
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
312
upTVSr.exe
3.229.117.57:799
ddos.dnsnb8.net
AMAZON-AES
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
whitelisted
ddos.dnsnb8.net
  • 3.229.117.57
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
SUSPICIOUS [ANY.RUN] Domain previously seen in multiple payload deliveries (ddos .dnsnb8 .net)
312
upTVSr.exe
A Network Trojan was detected
BACKDOOR [ANY.RUN] Bdaejec Backdoor (download .rar)
312
upTVSr.exe
A Network Trojan was detected
BACKDOOR [ANY.RUN] Bdaejec Backdoor (download .rar)
312
upTVSr.exe
A Network Trojan was detected
BACKDOOR [ANY.RUN] Bdaejec Backdoor (download .rar)
312
upTVSr.exe
A Network Trojan was detected
BACKDOOR [ANY.RUN] Bdaejec Backdoor (download .rar)
312
upTVSr.exe
A Network Trojan was detected
BACKDOOR [ANY.RUN] Bdaejec Backdoor (download .rar)
312
upTVSr.exe
A Network Trojan was detected
BACKDOOR [ANY.RUN] Bdaejec Backdoor (download .rar)
No debug info