File name:

20231122.zip

Full analysis: https://app.any.run/tasks/911de5ab-ea99-411c-9072-ee11d9ab4b71
Verdict: Malicious activity
Analysis date: November 23, 2023, 07:46:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

711007DB8F902975293253D744DF98F7

SHA1:

17DB540A9AED855BA1373679DA6B06980C4004AE

SHA256:

DA43762A54FAC350A838C73041AAE1EE185E72D2E31949CBE0DA18DCC98ED22C

SSDEEP:

6144:4f2gPpVVcGnLuPHRsbZskQjLgk0a3OM4ERKDAqxBVuTpErA:/gRVhnLuObZskQ3gm3cE5qSpEc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 3932)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • hh.exe (PID: 3512)
    • Reads the Internet Settings

      • hh.exe (PID: 3512)
      • wscript.exe (PID: 3932)
    • Reads Internet Explorer settings

      • hh.exe (PID: 3512)
    • Changes internet zones settings

      • hh.exe (PID: 3512)
    • Reads settings of System Certificates

      • hh.exe (PID: 3512)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 3932)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3932)
    • The process executes VB scripts

      • wscript.exe (PID: 3932)
    • Application launched itself

      • wscript.exe (PID: 3932)
    • Creates an object to access WMI (SCRIPT)

      • wscript.exe (PID: 4056)
  • INFO

    • Reads the machine GUID from the registry

      • hh.exe (PID: 3512)
      • wmpnscfg.exe (PID: 3668)
    • Checks proxy server information

      • hh.exe (PID: 3512)
    • Manual execution by a user

      • hh.exe (PID: 3512)
      • wmpnscfg.exe (PID: 3668)
      • notepad.exe (PID: 3876)
      • wscript.exe (PID: 3932)
    • Create files in a temporary directory

      • hh.exe (PID: 3512)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3668)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:11:22 09:28:42
ZipCRC: 0xe53b8e34
ZipCompressedSize: 1350
ZipUncompressedSize: 4873
ZipFileName: ??-??-??-Ʊ.vbs
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs hh.exe wmpnscfg.exe no specs notepad.exe no specs wscript.exe no specs wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
3308"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\20231122.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3512"C:\Windows\hh.exe" C:\Users\admin\Desktop\20231122\12.chmC:\Windows\hh.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® HTML Help Executable
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\hh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\hhctrl.ocx
c:\windows\system32\user32.dll
3668"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3876"C:\Windows\System32\Notepad.exe" C:\Users\admin\Desktop\20231122\12.vbsC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3932"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\20231122\12.vbs" C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4056"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\20231122\12.vbs" "/admin"C:\Windows\System32\wscript.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
4 784
Read events
4 723
Write events
58
Delete events
3

Modification events

(PID) Process:(3308) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(3308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3308WinRAR.exeC:\Users\admin\Desktop\20231122\电-子-发-票.vbstext
MD5:17297001A11C319E06EBBE810A02DD96
SHA256:3841432CB813F20E532A90224F630B0D345D71D3BC9D634A6C1689B42B8DA87A
3308WinRAR.exeC:\Users\admin\Desktop\20231122\打不开请点击.chmbinary
MD5:4644BEA5642C50BE952BB91BBA12FA43
SHA256:E992008EBF38431288CAE2A3B53A68298677A35F4F4EA02EA99E3E1588682A85
3512hh.exeC:\Users\admin\AppData\Local\Temp\35153515351535153515351535153515351535153515.logtext
MD5:1143CB15ACF08D7E11D65F5DDCD29713
SHA256:829D1E83319E80CDA388ACC6E0B09946254799474F5FA21FD9293DD2FF16A37F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
3512
hh.exe
47.75.19.100:443
variety.oss-cn-hongkong.aliyuncs.com
Alibaba US Technology Co., Ltd.
HK
unknown

DNS requests

Domain
IP
Reputation
variety.oss-cn-hongkong.aliyuncs.com
  • 47.75.19.100
unknown

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
Process
Message
hh.exe
HideHH begin
hh.exe
GetRemoteList begin
hh.exe
HideHH end
hh.exe
https://valuer.oss-cn-hongkong.aliyuncs.com/Foolish.dat=Foolish.dat
hh.exe
https://sb360qunimade.oss-cn-hongkong.aliyuncs.com/XubeiLocalServer.dll=XubeiLocalServer.dll
hh.exe
https://dlltemasil.oss-cn-hongkong.aliyuncs.com/libcef.dll=libcef.dll
hh.exe
C:\Users\%USERNAME%\AppData\Local\Microsoft
hh.exe
Foolish.png=Foolish.png
hh.exe
GetRemoteList end
hh.exe
https://sb360qunimade.oss-cn-hongkong.aliyuncs.com/wps.txt=svchost.exe