analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

testtt.zip

Full analysis: https://app.any.run/tasks/de039655-bd98-4520-b49e-b4c9b019db94
Verdict: Malicious activity
Analysis date: June 27, 2022, 08:36:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

20D6C8DE4B8D592FAF18E460B38ABEEC

SHA1:

08C93DBCEE18ACC77ED882DB07D3B189834B45A3

SHA256:

E453EF93937739A4B84D4BEE23D05074B0271F0C344220B09D737CA39935979B

SSDEEP:

768:QLftW+tu3poETFz5EnuoEECA8j5m873V5DZUOOuZJJC55zCvsWA5TGcNLz:oftW+tu3FnnoOZzLbDZUOVriCvSTbP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • msiexec.exe (PID: 2300)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2444)
      • msiexec.exe (PID: 2300)
      • MsiExec.exe (PID: 1556)
      • MsiExec.exe (PID: 1120)
    • Reads the computer name

      • WinRAR.exe (PID: 2444)
      • msiexec.exe (PID: 2300)
      • MsiExec.exe (PID: 1556)
      • MsiExec.exe (PID: 1120)
    • Starts Microsoft Installer

      • WinRAR.exe (PID: 2444)
    • Executed as Windows Service

      • vssvc.exe (PID: 2828)
    • Reads Windows owner or organization settings

      • msiexec.exe (PID: 708)
      • msiexec.exe (PID: 2300)
      • msiexec.exe (PID: 296)
    • Reads the Windows organization settings

      • msiexec.exe (PID: 708)
      • msiexec.exe (PID: 2300)
      • msiexec.exe (PID: 296)
    • Reads Environment values

      • vssvc.exe (PID: 2828)
    • Drops a file with a compile date too recent

      • msiexec.exe (PID: 2300)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2300)
  • INFO

    • Reads settings of System Certificates

      • msiexec.exe (PID: 708)
      • msiexec.exe (PID: 2300)
      • msiexec.exe (PID: 296)
    • Checks supported languages

      • msiexec.exe (PID: 708)
      • vssvc.exe (PID: 2828)
      • msiexec.exe (PID: 296)
    • Reads the computer name

      • msiexec.exe (PID: 708)
      • vssvc.exe (PID: 2828)
      • msiexec.exe (PID: 296)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 708)
      • msiexec.exe (PID: 2300)
      • msiexec.exe (PID: 296)
    • Application launched itself

      • msiexec.exe (PID: 2300)
    • Manual execution by user

      • msiexec.exe (PID: 296)
    • Searches for installed software

      • msiexec.exe (PID: 2300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs msiexec.exe no specs msiexec.exe vssvc.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2444"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\testtt.zip.7z"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
708"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\Rar$EXb2444.14401\MS.Upgrade.Database.Cloud.msi" C:\Windows\System32\msiexec.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
1603
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2300C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2828C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1556C:\Windows\system32\MsiExec.exe -Embedding 74FC99A7E1DB38AAC4178E4EF552D912C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
296"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\Desktop\MS.Upgrade.Database.Cloud.msi" C:\Windows\System32\msiexec.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
1603
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
1120C:\Windows\system32\MsiExec.exe -Embedding A1C0291B52F9316E8515C09803C1A323C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Total events
15 189
Read events
14 823
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb2444.14401\MS.Upgrade.Database.Cloud.msi
MD5:
SHA256:
2300msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
2300msiexec.exeC:\Windows\Installer\10d4b7.msi
MD5:
SHA256:
2444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2444.19430\MS.Upgrade.Database.Cloud.msi
MD5:
SHA256:
2300msiexec.exeC:\Windows\Installer\10d4b8.msi
MD5:
SHA256:
2300msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:96CE327DF709A4B7FE1E9B474726A18A
SHA256:B5F3DFFEAD21F00960A53FB4C994A09AFD199D0DEF298F5229661419AB35CC2A
2300msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{3685bc02-b0a2-41fe-95d5-bf7a62929edf}_OnDiskSnapshotPropbinary
MD5:96CE327DF709A4B7FE1E9B474726A18A
SHA256:B5F3DFFEAD21F00960A53FB4C994A09AFD199D0DEF298F5229661419AB35CC2A
2300msiexec.exeC:\Windows\Installer\MSID6F9.tmpexecutable
MD5:A2F39E2C1769D54B808D890D49BCB759
SHA256:4972DD502836165A116084C6911AC3FE95218380B4BEE5148EBC1FFFE977FB57
2300msiexec.exeC:\Windows\Installer\MSI5A6D.tmpexecutable
MD5:A2F39E2C1769D54B808D890D49BCB759
SHA256:4972DD502836165A116084C6911AC3FE95218380B4BEE5148EBC1FFFE977FB57
2300msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{b3c8a12d-9720-4c4b-a235-a2f4b4372aa9}_OnDiskSnapshotPropbinary
MD5:BEAB21E22032E655EDE37F1642239586
SHA256:FDAC159782F8243F7B58757FFF9E95FA9814814BA55D09166862D3E7EB608D52
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info