File name:

winzip25-p003.exe

Full analysis: https://app.any.run/tasks/98288e3e-40d3-44b0-8d55-98e72e076b43
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: October 24, 2021, 08:57:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

506300784305E516C9508816DC9070E2

SHA1:

895F5E2A525F97DE9BB25336D1B390E29FAA2401

SHA256:

E50920CD91D37A54A4418191FB72D622F0B4C7D270E7DDF9B3E7710DD4F13D04

SSDEEP:

12288:J6DH+bZ1XTQvLqvz+8bfCUDmVg+JkCBdcrWSOzYAVNyXu+QDxChCzCmXKVB+E5WJ:J6D+Qqv/baUDmVg+OGfY9maz0i8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • winzip25-p003.exe (PID: 3904)
    • Connects to CnC server

      • winzip25-p003.exe (PID: 456)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • winzip25-p003.exe (PID: 3904)
    • Starts itself from another location

      • winzip25-p003.exe (PID: 3904)
    • Reads Microsoft Outlook installation path

      • winzip25-p003.exe (PID: 456)
    • Checks supported languages

      • winzip25-p003.exe (PID: 456)
      • winzip25-p003.exe (PID: 3904)
    • Reads the computer name

      • winzip25-p003.exe (PID: 456)
    • Creates files in the program directory

      • winzip25-p003.exe (PID: 456)
    • Reads internet explorer settings

      • winzip25-p003.exe (PID: 456)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:09:29 22:00:57+02:00
PEType: PE32
LinkerVersion: 14.27
CodeSize: 545280
InitializedDataSize: 198144
UninitializedDataSize: -
EntryPoint: 0x53eca
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 25.0.14273.0
ProductVersionNumber: 25.0.14273.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: WinZip Computing
FileDescription: WinZipStub Installer
FileVersion: 25.0.14273.0
InternalName: WinZipStubInstaller.exe
LegalCopyright: (c) 2015-2020 Corel Corporation All rights reserved.
ProductName: WinZipStub
ProductVersion: 25.0.14273.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 29-Sep-2020 20:00:57
Detected languages:
  • English - United States
CompanyName: WinZip Computing
FileDescription: WinZipStub Installer
FileVersion: 25.0.14273.0
InternalName: WinZipStubInstaller.exe
LegalCopyright: (c) 2015-2020 Corel Corporation All rights reserved.
ProductName: WinZipStub
ProductVersion: 25.0.14273.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 29-Sep-2020 20:00:57
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000850EC
0x00085200
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.62583
.rdata
0x00087000
0x0002123A
0x00021400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.92297
.data
0x000A9000
0x00003B3C
0x00002E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.69496
.rsrc
0x000AD000
0x00004E58
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.53875
.reloc
0x000B2000
0x00006480
0x00006600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.58783

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.16947
2013
UNKNOWN
English - United States
RT_MANIFEST
101
1.91924
20
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
KERNEL32.dll
RPCRT4.dll
USER32.dll (delay-loaded)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winzip25-p003.exe winzip25-p003.exe winzip25-p003.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
332"C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe" C:\Users\admin\AppData\Local\Temp\winzip25-p003.exeExplorer.EXE
User:
admin
Company:
WinZip Computing
Integrity Level:
MEDIUM
Description:
WinZipStub Installer
Exit code:
3221226540
Version:
25.0.14273.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\winzip25-p003.exe
456 run=1 shortcut="C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe"C:\Users\admin\AppData\Local\Temp\101dbb\winzip25-p003.exe
winzip25-p003.exe
User:
admin
Company:
WinZip Computing
Integrity Level:
HIGH
Description:
WinZipStub Installer
Exit code:
0
Version:
25.0.14273.0
Modules
Images
c:\users\admin\appdata\local\temp\101dbb\winzip25-p003.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\gdi32.dll
3904"C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe" C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe
Explorer.EXE
User:
admin
Company:
WinZip Computing
Integrity Level:
HIGH
Description:
WinZipStub Installer
Exit code:
0
Version:
25.0.14273.0
Modules
Images
c:\users\admin\appdata\local\temp\winzip25-p003.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\lpk.dll
Total events
501
Read events
484
Write events
17
Delete events
0

Modification events

(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Corel\stubframework\WNZP\25
Operation:writeName:install_language
Value:
English
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Corel\stubframework\WNZP\25
Operation:writeName:status
Value:
0
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Corel\stubframework\WNZP\25
Operation:writeName:channel
Value:
softonic-ppi-p003
Executable files
1
Suspicious files
1
Text files
50
Unknown types
0

Dropped files

PID
Process
Filename
Type
456winzip25-p003.exeC:\ProgramData\UniqueId\databinary
MD5:
SHA256:
3904winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101dbb\winzip25-p003.exeexecutable
MD5:
SHA256:
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\css\jquery-ui.csstext
MD5:1CE4EB3E5153F4C9B93A3CFDF3EF2E77
SHA256:95F4C300D84EEDD0C43A30A1B6F0DFBBF7B8C47725511981E4CFE12DFAEB0E93
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\centerImg.pngimage
MD5:F1F71117A2C77649963C8B4CCF4B5CF8
SHA256:44C4E7A6E7293B855830F94496D7ADDC6916BFE62E36AC8142CDA1919745950E
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\headerImg.pngimage
MD5:EA07C82C382D670FCCAC91863B5EE0AD
SHA256:19416D915F430E0223E5F342487FC90E978F275104A15DC56238A9FC09381722
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\js\jquery-ui.min.jstext
MD5:97753710DC6FC2F47616D0578E991EB5
SHA256:2E5F9B159BE16A83D09C1DC654C73737E10D2A6F8372B51BE480B1BA42B7273C
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\progress_value.pngimage
MD5:37FFEA558CCD74932778CFFD5BBAB974
SHA256:E9B73D55379ABB474E251A44386D4B28922F30C3D135C92996A6310AF59BFDFE
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\config\config.jstext
MD5:B83AC079CFDF3EC94A9449F532B01DC5
SHA256:1B935AEB2D5694BAD98F525AF8E471091A20817273CFCDBF17DC5E857B0DE530
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\js\common.jstext
MD5:BCC0E36682468D62634CDFA5864E1707
SHA256:FD475166CAA2045B7FA0991B06B5731788F3E111A0D81AD6598FBB44B5293B30
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\js\external.jstext
MD5:140918FEDED87FE0A5563A4080071258
SHA256:25DF7AB9509D4E8760F1FDC99684E0E72AAC6E885CBDD3396FEBC405EA77E7F6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
456
winzip25-p003.exe
POST
200
35.160.9.210:80
http://i.installportal.com/v1/logAnalytics
US
xml
204 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
456
winzip25-p003.exe
35.160.9.210:80
i.installportal.com
Amazon.com, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
i.installportal.com
  • 35.160.9.210
  • 34.209.134.56
unknown

Threats

PID
Process
Class
Message
456
winzip25-p003.exe
A Network Trojan was detected
AV TROJAN InstallPortal Glority Adware CnC Request
1 ETPRO signatures available at the full report
No debug info