analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

$R2KFKFE.zip.7z

Full analysis: https://app.any.run/tasks/590d47d3-e9cf-41b1-9572-fcf7d3b1ae62
Verdict: Malicious activity
Analysis date: May 20, 2022, 16:13:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

80114163DFD386AC3CA5F26915FC7C85

SHA1:

CF58D91B6FC990D5F771DBB2ECE24B34EC8B7A92

SHA256:

E2D6D34E8F639EF470CF326673B70626FED6AF4EBF1FD0A226A024CFFBA11773

SSDEEP:

1536:gpZsjkG8QIvYZNHHv4bd1djVWUVrXWDeOMaji7LUHfKaGrLIR1MS79JfHbeD:WQkG8mnvijV/VrXieOLzHSjIRd79J/bI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes settings of System certificates

      • WScript.exe (PID: 2608)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2380)
      • WinRAR.exe (PID: 924)
      • WScript.exe (PID: 2608)
      • WScript.exe (PID: 1684)
      • notepad++.exe (PID: 1380)
    • Reads the computer name

      • WinRAR.exe (PID: 924)
      • WinRAR.exe (PID: 2380)
      • WScript.exe (PID: 1684)
      • WScript.exe (PID: 2608)
    • Adds / modifies Windows certificates

      • WScript.exe (PID: 2608)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 2380)
      • WScript.exe (PID: 2608)
      • WScript.exe (PID: 1684)
      • notepad++.exe (PID: 1380)
    • Checks Windows Trust Settings

      • WScript.exe (PID: 2608)
      • WScript.exe (PID: 1684)
    • Reads settings of System Certificates

      • WScript.exe (PID: 2608)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs wscript.exe wscript.exe no specs notepad++.exe

Process information

PID
CMD
Path
Indicators
Parent process
924"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\$R2KFKFE.zip.7z"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2380"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\$R2KFKFE.zip"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
2608"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\free_trade_agreement_australia_uk_lawyers 81532.js" C:\Windows\System32\WScript.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1684"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\free_trade_agreement_australia_uk_lawyers 81532.js" C:\Windows\System32\WScript.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
1380"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\free_trade_agreement_australia_uk_lawyers 81532.js"C:\Program Files\Notepad++\notepad++.exe
Explorer.EXE
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
5 822
Read events
5 760
Write events
59
Delete events
3

Modification events

(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(924) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\$R2KFKFE.zip.7z
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(924) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
0
Suspicious files
4
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
924WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb924.34556\$R2KFKFE.zipcompressed
MD5:EEF11C8538924CAA34D18481FD33D62B
SHA256:A055730E8B8FE5E6C0A134BFE8F5522D4630B216F696B77FCBA7FBD209EF9878
2380WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2380.35637\free_trade_agreement_australia_uk_lawyers 81532.jstext
MD5:F0831DF06B606827CE6BEFA0EE0FAC2B
SHA256:430571978386771D2A11A7D012B4808990F4F64CF9EF01557182CCBD818C525E
2608WScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:B9F21D8DB36E88831E5352BB82C438B3
SHA256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
2608WScript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:0DC39F6E3346B0935884A58E307A3615
SHA256:37F7E6419E02E6D3D4B2618EA433B7C73BB42CB35FE81AECA4D04F75A03CC794
2608WScript.exeC:\Users\admin\AppData\Local\Temp\Tar7023.tmpcat
MD5:E721613517543768F0DE47A6EEEE3475
SHA256:3163B82D1289693122EF99ED6C3C1911F68AA2A7296907CEBF84C897141CED4E
2608WScript.exeC:\Users\admin\AppData\Local\Temp\Cab7022.tmpcompressed
MD5:B9F21D8DB36E88831E5352BB82C438B3
SHA256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2608
WScript.exe
GET
200
23.216.77.69:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?412beb2394654c8f
US
compressed
60.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2608
WScript.exe
23.216.77.69:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
suspicious
2608
WScript.exe
195.113.57.133:443
www.labbunnies.eu
CESNET z.s.p.o.
CZ
unknown
2608
WScript.exe
93.114.184.91:443
www.lenovob2bportal.com
NetConnex Broadband Ltd.
GB
unknown

DNS requests

Domain
IP
Reputation
www.labbunnies.eu
  • 195.113.57.133
unknown
ctldl.windowsupdate.com
  • 23.216.77.69
  • 23.216.77.80
whitelisted
www.lenovob2bportal.com
  • 93.114.184.91
unknown

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\plugins\Config\nppPluginList.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe