| File name: | W32.Nimda.A.zip |
| Full analysis: | https://app.any.run/tasks/37eacba8-348a-43e6-b73f-1a4cf1482d7d |
| Verdict: | Malicious activity |
| Analysis date: | June 19, 2025, 14:24:06 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | B62632C8E6AAFA05A07CAD52B2E25AA5 |
| SHA1: | 35C626A3513F8866095F891F69C593DE6D87EBD2 |
| SHA256: | E56E79F9DC8752E11B66C3DEA5282E835EF280A46A2B5D98AF19222D11B72767 |
| SSDEEP: | 6144:F5+YTd3QOMgyjGyrQb+MU5opgJcvd7JEZ:F5+YhogyjGK4ZqWgZ |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 788 |
|---|---|
| ZipBitFlag: | 0x0001 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2019:01:09 16:45:30 |
| ZipCRC: | 0xda64013f |
| ZipCompressedSize: | 284 |
| ZipUncompressedSize: | 6148 |
| ZipFileName: | .DS_Store |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1452 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 255 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2784 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\W32.Nimda.A.zip | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 2816 | C:\Users\admin\AppData\Local\Temp\mepBFC1.tmp.exe -dontrunold | C:\Users\admin\AppData\Local\Temp\mepBFC1.tmp.exe | readme.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3184 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\I-Worm.Nimda.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 3464 | "C:\Users\admin\Desktop\readme.exe" | C:\Users\admin\Desktop\readme.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1452) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\W32.Nimda.A.zip | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2784) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2784 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2784.37415\I-Worm.Nimda.zip | compressed | |
MD5:844855B2EC58F20718CFF30D874AB43E | SHA256:70E37EA05B1D89E37E04B1C2CE98731E65B6C37CF718DC72A109D862CA36CC2A | |||
| 1452 | explorer.exe | C:\Users\admin\Desktop\I-Worm.Nimda.zip | compressed | |
MD5:844855B2EC58F20718CFF30D874AB43E | SHA256:70E37EA05B1D89E37E04B1C2CE98731E65B6C37CF718DC72A109D862CA36CC2A | |||
| 1452 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-ms | automaticdestinations-ms | |
MD5:AC72932B9CA09087C1448B04B35287AC | SHA256:7A5B6BFDFE0CF3E5771E6EE853AB6358E8C2766B2484DDDCB0925CE2E1A32AF8 | |||
| 3464 | readme.exe | C:\Users\admin\AppData\Local\Temp\mepBFC1.tmp.exe | executable | |
MD5:7A9527AFDDA4179B10E5465E93D0F3AA | SHA256:C4A60096AD81F6E4CE7412F4873465DE408EAB69D7AC35B9AF9B0B1A4CCD3EEA | |||
| 1452 | explorer.exe | C:\Users\admin\Desktop\readme.exe | executable | |
MD5:7A9527AFDDA4179B10E5465E93D0F3AA | SHA256:C4A60096AD81F6E4CE7412F4873465DE408EAB69D7AC35B9AF9B0B1A4CCD3EEA | |||
| 2816 | mepBFC1.tmp.exe | C:\Users\admin\AppData\Local\Temp\mepC051.tmp | text | |
MD5:46587BC0DBA53442F164F7A1190AE4A3 | SHA256:64FDAA7002C8410512BD2A7E4DEF3120FF000A2093B92AD919992B2B8FE0138D | |||
| 2816 | mepBFC1.tmp.exe | C:\Users\admin\AppData\Local\Temp\mepBFF0.tmp.exe | executable | |
MD5:7A9527AFDDA4179B10E5465E93D0F3AA | SHA256:C4A60096AD81F6E4CE7412F4873465DE408EAB69D7AC35B9AF9B0B1A4CCD3EEA | |||
| 3464 | readme.exe | C:\Users\admin\AppData\Local\Temp\mepBFC1.tmp.exe:OECustomProperty | binary | |
MD5:8243E382810CB1DF88D17BB47C998B8E | SHA256:7DFD2BAAA67EE5473604683461E100D6EAD5702581728D211516CD95CC17345B | |||
| 2816 | mepBFC1.tmp.exe | C:\Users\admin\AppData\Local\Temp\mepC030.tmp:OECustomProperty | binary | |
MD5:8243E382810CB1DF88D17BB47C998B8E | SHA256:7DFD2BAAA67EE5473604683461E100D6EAD5702581728D211516CD95CC17345B | |||
| 2816 | mepBFC1.tmp.exe | C:\Users\admin\AppData\Local\Temp\mepC030.tmp | executable | |
MD5:7A9527AFDDA4179B10E5465E93D0F3AA | SHA256:C4A60096AD81F6E4CE7412F4873465DE408EAB69D7AC35B9AF9B0B1A4CCD3EEA | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |