analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

winzip25-p003.exe

Full analysis: https://app.any.run/tasks/98288e3e-40d3-44b0-8d55-98e72e076b43
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: October 24, 2021, 08:57:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

506300784305E516C9508816DC9070E2

SHA1:

895F5E2A525F97DE9BB25336D1B390E29FAA2401

SHA256:

E50920CD91D37A54A4418191FB72D622F0B4C7D270E7DDF9B3E7710DD4F13D04

SSDEEP:

12288:J6DH+bZ1XTQvLqvz+8bfCUDmVg+JkCBdcrWSOzYAVNyXu+QDxChCzCmXKVB+E5WJ:J6D+Qqv/baUDmVg+OGfY9maz0i8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • winzip25-p003.exe (PID: 3904)
    • Connects to CnC server

      • winzip25-p003.exe (PID: 456)
  • SUSPICIOUS

    • Checks supported languages

      • winzip25-p003.exe (PID: 3904)
      • winzip25-p003.exe (PID: 456)
    • Reads the computer name

      • winzip25-p003.exe (PID: 456)
    • Executable content was dropped or overwritten

      • winzip25-p003.exe (PID: 3904)
    • Creates files in the program directory

      • winzip25-p003.exe (PID: 456)
    • Starts itself from another location

      • winzip25-p003.exe (PID: 3904)
    • Reads Microsoft Outlook installation path

      • winzip25-p003.exe (PID: 456)
    • Reads internet explorer settings

      • winzip25-p003.exe (PID: 456)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

ProductVersion: 25.0.14273.0
ProductName: WinZipStub
LegalCopyright: (c) 2015-2020 Corel Corporation All rights reserved.
InternalName: WinZipStubInstaller.exe
FileVersion: 25.0.14273.0
FileDescription: WinZipStub Installer
CompanyName: WinZip Computing
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 25.0.14273.0
FileVersionNumber: 25.0.14273.0
Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x53eca
UninitializedDataSize: -
InitializedDataSize: 198144
CodeSize: 545280
LinkerVersion: 14.27
PEType: PE32
TimeStamp: 2020:09:29 22:00:57+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 29-Sep-2020 20:00:57
Detected languages:
  • English - United States
CompanyName: WinZip Computing
FileDescription: WinZipStub Installer
FileVersion: 25.0.14273.0
InternalName: WinZipStubInstaller.exe
LegalCopyright: (c) 2015-2020 Corel Corporation All rights reserved.
ProductName: WinZipStub
ProductVersion: 25.0.14273.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 29-Sep-2020 20:00:57
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000850EC
0x00085200
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.62583
.rdata
0x00087000
0x0002123A
0x00021400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.92297
.data
0x000A9000
0x00003B3C
0x00002E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.69496
.rsrc
0x000AD000
0x00004E58
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.53875
.reloc
0x000B2000
0x00006480
0x00006600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.58783

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.16947
2013
UNKNOWN
English - United States
RT_MANIFEST
101
1.91924
20
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
KERNEL32.dll
RPCRT4.dll
USER32.dll (delay-loaded)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winzip25-p003.exe no specs winzip25-p003.exe winzip25-p003.exe

Process information

PID
CMD
Path
Indicators
Parent process
332"C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe" C:\Users\admin\AppData\Local\Temp\winzip25-p003.exeExplorer.EXE
User:
admin
Company:
WinZip Computing
Integrity Level:
MEDIUM
Description:
WinZipStub Installer
Exit code:
3221226540
Version:
25.0.14273.0
3904"C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe" C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe
Explorer.EXE
User:
admin
Company:
WinZip Computing
Integrity Level:
HIGH
Description:
WinZipStub Installer
Version:
25.0.14273.0
456 run=1 shortcut="C:\Users\admin\AppData\Local\Temp\winzip25-p003.exe"C:\Users\admin\AppData\Local\Temp\101dbb\winzip25-p003.exe
winzip25-p003.exe
User:
admin
Company:
WinZip Computing
Integrity Level:
HIGH
Description:
WinZipStub Installer
Version:
25.0.14273.0
Total events
501
Read events
484
Write events
17
Delete events
0

Modification events

(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Corel\stubframework\WNZP\25
Operation:writeName:install_language
Value:
English
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Corel\stubframework\WNZP\25
Operation:writeName:status
Value:
0
(PID) Process:(456) winzip25-p003.exeKey:HKEY_CURRENT_USER\Software\Corel\stubframework\WNZP\25
Operation:writeName:channel
Value:
softonic-ppi-p003
Executable files
1
Suspicious files
1
Text files
50
Unknown types
0

Dropped files

PID
Process
Filename
Type
3904winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101dbb\winzip25-p003.exeexecutable
MD5:506300784305E516C9508816DC9070E2
SHA256:E50920CD91D37A54A4418191FB72D622F0B4C7D270E7DDF9B3E7710DD4F13D04
456winzip25-p003.exeC:\ProgramData\UniqueId\databinary
MD5:6F8951CF8DDAB08F43D609B17D139644
SHA256:8A6AE2EEBD6F65323F32FA7718B387E5A1944919F73DA72F5CDD5C93E94A768C
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\arrow.pngimage
MD5:407F46749E54353D1EDA4E776A7AE505
SHA256:56F5FCC00CD244C8D7EEA8A03F627DB1DBC74CBF48553CCC0F10AB33FC09AA05
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\js\jquery-ui.min.jstext
MD5:97753710DC6FC2F47616D0578E991EB5
SHA256:2E5F9B159BE16A83D09C1DC654C73737E10D2A6F8372B51BE480B1BA42B7273C
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\css\jquery-ui.csstext
MD5:1CE4EB3E5153F4C9B93A3CFDF3EF2E77
SHA256:95F4C300D84EEDD0C43A30A1B6F0DFBBF7B8C47725511981E4CFE12DFAEB0E93
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\footerImg.pngimage
MD5:F766FA02DECAFCBDC7B54311436E5931
SHA256:D334FB1C34872899D08183154C14151D2D2A65E99F37C41B5B23E320FD340F94
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\header_logo.pngimage
MD5:C39AB022F332191E16A7D2C8AB02B705
SHA256:E16A74049803E3268117D1948D4E34A949099AA9499881398F36320A52C52CE5
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\button-normal.pngimage
MD5:7C7DBDEE45987EADA0D0DC0D126B4239
SHA256:0A649E9E86D9379792B44DC80D9C9C9A7F134DA4DA03F7B422C51CDCF7849A5C
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\img\centerImg.pngimage
MD5:F1F71117A2C77649963C8B4CCF4B5CF8
SHA256:44C4E7A6E7293B855830F94496D7ADDC6916BFE62E36AC8142CDA1919745950E
456winzip25-p003.exeC:\Users\admin\AppData\Local\Temp\101ed4\common\css\common.csstext
MD5:59D687B8DFA4E3169F5D15BF6F835AD3
SHA256:B6B15AC44F1E07FBB46CBAE0BD2B34293BAA5766DD8263E4AC58993CD9F71304
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
456
winzip25-p003.exe
POST
200
35.160.9.210:80
http://i.installportal.com/v1/logAnalytics
US
xml
204 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
456
winzip25-p003.exe
35.160.9.210:80
i.installportal.com
Amazon.com, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
i.installportal.com
  • 35.160.9.210
  • 34.209.134.56
unknown

Threats

PID
Process
Class
Message
456
winzip25-p003.exe
A Network Trojan was detected
AV TROJAN InstallPortal Glority Adware CnC Request
1 ETPRO signatures available at the full report
No debug info