File name:

RC7.zip

Full analysis: https://app.any.run/tasks/c46a1633-4bf5-49c4-a765-9ca4c3fa877c
Verdict: Malicious activity
Analysis date: September 18, 2023, 13:41:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

969E35B7E89E91FC8FE43AAF37522BF1

SHA1:

3DB5217B148790102F8BD5DC78055042CF81650D

SHA256:

E3DDD5E0BE260F532C9FB7EEB5315B377859E5164943BB1577A2477C97D750EF

SSDEEP:

196608:cKi6ANPUJ9Xyvy7CUq1+akdzD3z67EEI2l4NZZm/5fJYwqm:u5NspyvFgpzP64EIJN7m/5RYw9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • RC7.exe (PID: 2012)
      • Memcheck.exe (PID: 3576)
      • Project Daylight.exe (PID: 2772)
      • Memcheck.exe (PID: 2084)
      • Memcheck.exe (PID: 2480)
      • Elysian.exe (PID: 540)
      • ExtremeInjector.exe (PID: 2560)
      • ExtremeInjector.exe (PID: 2724)
      • accountchange.exe (PID: 4068)
      • Halycon.exe (PID: 1788)
      • RC7.exe (PID: 1848)
    • Loads dropped or rewritten executable

      • RC7.exe (PID: 2012)
      • Memcheck.exe (PID: 2480)
      • RC7.exe (PID: 1848)
  • SUSPICIOUS

    • Reads the Internet Settings

      • RC7.exe (PID: 2012)
      • Project Daylight.exe (PID: 2772)
      • ExtremeInjector.exe (PID: 2560)
      • ExtremeInjector.exe (PID: 2724)
    • Application launched itself

      • ExtremeInjector.exe (PID: 2560)
  • INFO

    • Reads the machine GUID from the registry

      • RC7.exe (PID: 2012)
      • ExtremeInjector.exe (PID: 2560)
      • ExtremeInjector.exe (PID: 2724)
    • Manual execution by a user

      • RC7.exe (PID: 2012)
      • Project Daylight.exe (PID: 2772)
      • accountchange.exe (PID: 4068)
    • Reads the computer name

      • RC7.exe (PID: 2012)
      • Project Daylight.exe (PID: 2772)
      • Memcheck.exe (PID: 2084)
      • Memcheck.exe (PID: 2480)
      • ExtremeInjector.exe (PID: 2724)
      • ExtremeInjector.exe (PID: 2560)
      • RC7.exe (PID: 1848)
      • accountchange.exe (PID: 4068)
    • Checks supported languages

      • RC7.exe (PID: 2012)
      • Project Daylight.exe (PID: 2772)
      • Memcheck.exe (PID: 2608)
      • Memcheck.exe (PID: 2084)
      • Memcheck.exe (PID: 2480)
      • ExtremeInjector.exe (PID: 2560)
      • ExtremeInjector.exe (PID: 2724)
      • accountchange.exe (PID: 4068)
      • RC7.exe (PID: 1848)
    • Application launched itself

      • msedge.exe (PID: 2768)
    • Create files in a temporary directory

      • Memcheck.exe (PID: 2084)
      • Memcheck.exe (PID: 2608)
      • ExtremeInjector.exe (PID: 2724)
    • Reads Environment values

      • ExtremeInjector.exe (PID: 2724)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: RC7/accountchange.exe
ZipUncompressedSize: 642048
ZipCompressedSize: 236083
ZipCRC: 0x10375708
ZipModifyDate: 2016:07:04 02:14:28
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
70
Monitored processes
26
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs searchprotocolhost.exe no specs rc7.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs project daylight.exe no specs memcheck.exe no specs memcheck.exe memcheck.exe no specs memcheck.exe elysian.exe no specs extremeinjector.exe no specs extremeinjector.exe halycon.exe no specs msedge.exe no specs msedge.exe no specs rc7.exe no specs accountchange.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540"C:\Users\admin\Desktop\RC7\Elysian.exe" C:\Users\admin\Desktop\RC7\Elysian.exeProject Daylight.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225781
Modules
Images
c:\users\admin\desktop\rc7\elysian.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1528"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1412 --field-trial-handle=1328,i,9972145990188867017,2262720744741652140,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1584"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=1492 --field-trial-handle=1328,i,9972145990188867017,2262720744741652140,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1788"C:\Users\admin\Desktop\RC7\Halycon.exe" C:\Users\admin\Desktop\RC7\Halycon.exeProject Daylight.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225781
Modules
Images
c:\users\admin\desktop\rc7\halycon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1848"C:\Users\admin\Desktop\RC7\RC7.exe" C:\Users\admin\Desktop\RC7\RC7.exeProject Daylight.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\rc7\rc7.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\winmm.dll
2012"C:\Users\admin\Desktop\RC7\RC7.exe" C:\Users\admin\Desktop\RC7\RC7.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\rc7\rc7.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\psapi.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2040"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 --field-trial-handle=1328,i,9972145990188867017,2262720744741652140,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft\edge\application\msedge.exe
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2084"C:\Users\admin\Desktop\RC7\Memcheck.exe" C:\Users\admin\Desktop\RC7\Memcheck.exe
Project Daylight.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\rc7\memcheck.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\usp10.dll
c:\windows\system32\user32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2480C:\Users\admin\AppData\Local\Temp\cetrainers\CET76B8.tmp\extracted\Memcheck.exe "C:\Users\admin\AppData\Local\Temp\cetrainers\CET76B8.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\admin\Desktop\RC7\"C:\Users\admin\AppData\Local\Temp\cetrainers\CET76B8.tmp\extracted\Memcheck.exe
Memcheck.exe
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Cheat Engine
Exit code:
0
Version:
6.5.0.4590
Modules
Images
c:\users\admin\appdata\local\temp\cetrainers\cet76b8.tmp\extracted\memcheck.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2560"C:\Users\admin\Desktop\RC7\ExtremeInjector.exe" C:\Users\admin\Desktop\RC7\ExtremeInjector.exeProject Daylight.exe
User:
admin
Company:
master131
Integrity Level:
MEDIUM
Description:
Extreme Injector
Exit code:
0
Version:
3.6.1.0
Modules
Images
c:\users\admin\desktop\rc7\extremeinjector.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
9 402
Read events
9 268
Write events
130
Delete events
4

Modification events

(PID) Process:(3748) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3748) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2564) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2012) RC7.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
Executable files
20
Suspicious files
21
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\changelog.txttext
MD5:398E942C79BDB2590E08FB023EB76EE7
SHA256:0B5513EA4E05042A2844EEEE760B8E0A7C72363DEB1EE713503D7A9C3C38E15E
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\ExtremeInjector.exeexecutable
MD5:03E95431DDC771FF719A5D5FF3D46136
SHA256:FDA70123008180F3DCDFC6ED3C74F5EB1FA2B9E7DC76C4D149AD351B158E4376
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\Halycon.dllexecutable
MD5:681F38EE66E5DC9566FEB9B306AE8FD8
SHA256:4F098ECEE5BD2D92B167434FAC56D55AD51A2582AD24CE17A7B3DF92624487E1
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\Halycon.exeexecutable
MD5:60AD7C5084375C0DD19B1ECC43EEE3B2
SHA256:BA9083A3732C0EA3B8A3141B89C999BAB6074FF7F1E81C838AD820787EE7AF6F
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\Memcheck(1).dllexecutable
MD5:8D2EBBC526125E43A6203983F7C71E61
SHA256:43AE9D049DE8287160475A1288AD7ACAADCE278B088279EAEA869886E9A43FAB
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\accountchange.exeexecutable
MD5:C4F8790EC53D25C9271BCA94D3E7553A
SHA256:56066AE5481C334937483DD0EE1874D44C97B87263BD7D81E6AFC414AFB6363A
3748WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3748.984\RC7\Elysian.exeexecutable
MD5:80D85AE9C0B8ECBDF20AA9FC6185273C
SHA256:7EAF50D65994FA43937CCE8F030094E199F84AED76A3D4B6EBDBA178663DFF17
2768msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF1037cb.TMP
MD5:
SHA256:
2768msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:6BBE1BFA3A9FEDA71E860D7BEE338526
SHA256:A7D313A5230EA1B2C67C3ACDC75D66F87D214E760AEBD7B2228A9EEBBAB5C897
2768msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
31
DNS requests
28
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2768
msedge.exe
239.255.255.250:1900
whitelisted
1528
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1528
msedge.exe
142.250.184.206:443
drive.google.com
GOOGLE
US
whitelisted
1528
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1528
msedge.exe
20.105.73.143:443
nav-edge.smartscreen.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1528
msedge.exe
104.126.37.160:443
www.bing.com
Akamai International B.V.
DE
unknown
1528
msedge.exe
152.199.21.175:443
msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com
EDGECAST
DE
whitelisted
1528
msedge.exe
13.107.21.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
drive.google.com
  • 142.250.184.206
shared
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
nav-edge.smartscreen.microsoft.com
  • 20.105.73.143
whitelisted
www.bing.com
  • 104.126.37.160
  • 104.126.37.177
  • 104.126.37.153
  • 104.126.37.155
  • 104.126.37.170
  • 104.126.37.162
  • 104.126.37.168
  • 104.126.37.171
  • 104.126.37.161
whitelisted
msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com
  • 152.199.21.175
whitelisted
self.events.data.microsoft.com
  • 20.189.173.9
whitelisted
fonts.googleapis.com
  • 142.250.186.42
whitelisted
fonts.gstatic.com
  • 216.58.206.35
whitelisted
ssl.gstatic.com
  • 216.58.206.35
whitelisted

Threats

No threats detected
Process
Message
Memcheck.exe
sizeof fxstate = 512
Memcheck.exe
Offset of LBR_Count=760
Memcheck.exe
TSymhandler.create 3
Memcheck.exe
TSymhandler.create 1
Memcheck.exe
TSymhandler.create 2
Memcheck.exe
TSymhandler.create exit
Memcheck.exe
TSymhandler.create 2
Memcheck.exe
TSymhandler.create 1
Memcheck.exe
TSymhandler.create
Memcheck.exe
TSymbolListHandler.create exit