File name:

1.zip

Full analysis: https://app.any.run/tasks/aa95d7c8-87c3-4258-a536-5198afffdb27
Verdict: Malicious activity
Analysis date: December 15, 2024, 16:30:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

524EDD4772D001414D30EB2EF049FDE9

SHA1:

DAEA083E881ECC3D121C7EC54D8A32ADF4A77AE7

SHA256:

E5B183B6C0D24EC946602F68903D9DE2B8073ECE1BF88618758A8B76BE783AF5

SSDEEP:

24576:9pOtxZ0vT/jREc0Rz1WZvhv3iDj13ZyEEgbCcOKVigrSc9dcPa:9pOtxKvT/jREc0Rz1WZvhv3iDj14EEgZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • fontview.exe (PID: 2100)
      • WFS.exe (PID: 6408)
    • Reads Microsoft Outlook installation path

      • WFS.exe (PID: 6408)
    • Executes as Windows Service

      • FXSSVC.exe (PID: 6152)
    • Write to the desktop.ini file (may be used to cloak folders)

      • WFS.exe (PID: 6408)
    • Reads Internet Explorer settings

      • WFS.exe (PID: 6408)
  • INFO

    • Manual execution by a user

      • fontview.exe (PID: 6920)
      • fontview.exe (PID: 6880)
      • fontview.exe (PID: 6992)
      • fontview.exe (PID: 7032)
      • fontview.exe (PID: 2100)
      • fontview.exe (PID: 1296)
      • fontview.exe (PID: 5572)
      • fontview.exe (PID: 2088)
      • mspaint.exe (PID: 2928)
      • fontview.exe (PID: 6720)
      • fontview.exe (PID: 6808)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 1876)
      • fontview.exe (PID: 2100)
    • Creates files or folders in the user directory

      • fontview.exe (PID: 2100)
      • WFS.exe (PID: 6408)
      • fontview.exe (PID: 6808)
    • Reads security settings of Internet Explorer

      • fontview.exe (PID: 2100)
      • WFS.exe (PID: 6408)
    • Disables trace logs

      • FXSSVC.exe (PID: 6152)
      • WFS.exe (PID: 6408)
    • Create files in a temporary directory

      • WFS.exe (PID: 6408)
      • fontview.exe (PID: 2100)
    • Sends debugging messages

      • fontview.exe (PID: 2100)
    • Creates files in the program directory

      • FXSSVC.exe (PID: 6152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:12:15 19:28:26
ZipCRC: 0x383e945f
ZipCompressedSize: 50860
ZipUncompressedSize: 110148
ZipFileName: 1/comfortaa.ttf
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
15
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs fontview.exe no specs fontview.exe no specs fontview.exe no specs fontview.exe no specs fontview.exe no specs fontview.exe no specs fontview.exe no specs mspaint.exe no specs fontview.exe wfs.exe no specs fxssvc.exe no specs fontview.exe no specs fontview.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1296"C:\WINDOWS\System32\fontview.exe" C:\Users\admin\Desktop\1\sf_medium.ttfC:\Windows\System32\fontview.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Font Viewer
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fontview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1876"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\1.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2088"C:\WINDOWS\System32\fontview.exe" C:\Users\admin\Desktop\1\profont.ttfC:\Windows\System32\fontview.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Font Viewer
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fontview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2100"C:\WINDOWS\System32\fontview.exe" C:\Users\admin\Desktop\1\glitched.ttfC:\Windows\System32\fontview.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Font Viewer
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fontview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2928"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\opentopic.jpg"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5572"C:\WINDOWS\System32\fontview.exe" C:\Users\admin\Desktop\1\sf_bold.ttfC:\Windows\System32\fontview.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Font Viewer
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fontview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6152C:\WINDOWS\system32\fxssvc.exeC:\Windows\System32\FXSSVC.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Fax Service
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fxssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shlwapi.dll
6408"C:\Windows\System32\WFS.exe" /Delete /Account . /SendTo C:\Users\admin\AppData\Local\Temp\1DB4F0ECFE32D.tifC:\Windows\System32\WFS.exefontview.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Windows Fax and Scan
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wfs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
6720"C:\WINDOWS\System32\fontview.exe" C:\Users\admin\Desktop\1\icons.ttfC:\Windows\System32\fontview.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Font Viewer
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fontview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6808"C:\WINDOWS\System32\fontview.exe" C:\Users\admin\Desktop\1\icons.ttfC:\Windows\System32\fontview.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Font Viewer
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fontview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
5 079
Read events
4 992
Write events
77
Delete events
10

Modification events

(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\1.zip
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(1876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
4
Suspicious files
16
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
6408WFS.exeC:\Users\admin\Documents\Scanned Documents\Welcome Scan.jpg:3or4kl4x13tuuug3Byamue2s4b
MD5:
SHA256:
1876WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1876.4721\1\comfortaa.ttfttf
MD5:BA7A464DC19E86479A1FCF8225684D5A
SHA256:8D3385492E07AD739F31F491CF53AEBDA10B9CD17E2BD2A0A434AD44DC158A30
1876WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1876.4721\1\monsterrat.ttfpi2
MD5:B3BA703C591EDD4AAD57F8F4561A287B
SHA256:20EBFD658F55A256D60B4F84849E0026E4B599926493738ED3952C7200218D33
1876WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1876.4721\1\profont.ttfttf
MD5:59DDF0E072B3FF7D8FC6EF6F6EDE98B0
SHA256:41E6896EC873F3ECACEE8482C01BF7F8A365860588A7D855A65C748458A5F21D
1876WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1876.4721\1\glitched.ttfttf
MD5:2F48ABC8C45DE9ADD264C5BE432E878E
SHA256:DD46B841694E345D5C0C904F33B52E55585E35658B1111CAFCD34D5F18B19678
2100fontview.exeC:\Users\admin\AppData\Local\Temp\1DB4F0ECFE32D.tifbinary
MD5:38E73074B0CFD8CEAA3E78E4D9D195BD
SHA256:5023A3702AAC7DD3A5B4D0D8B7359850B7548946B6E61E847E6E0A9781138260
2100fontview.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Fonts\glitched.ttfttf
MD5:2F48ABC8C45DE9ADD264C5BE432E878E
SHA256:DD46B841694E345D5C0C904F33B52E55585E35658B1111CAFCD34D5F18B19678
1876WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1876.4721\1\sf_medium.ttfttf
MD5:C5A8E1F150A5B6D6D37E0F95220ED5F6
SHA256:5D1423C958CA2ECFE2815BC663132B6E6C4680DA56922E072940872F864E12A7
1876WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1876.4721\1\sf_bold.ttfotf
MD5:644563F48AB5FE8E9082B64B2729B068
SHA256:A981001F6D4E70292FD26FA8E05437C4A9F0F8C5981027FF0CEEAD01BB30311F
2100fontview.exeC:\Users\admin\AppData\Local\Temp\1DB4F0ECFCDD0.tifbinary
MD5:38E73074B0CFD8CEAA3E78E4D9D195BD
SHA256:5023A3702AAC7DD3A5B4D0D8B7359850B7548946B6E61E847E6E0A9781138260
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
32
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
440
svchost.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
440
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6196
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6196
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7052
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7052
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
440
svchost.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
440
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.171:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.171
  • 104.126.37.154
  • 104.126.37.123
  • 104.126.37.177
  • 104.126.37.178
  • 104.126.37.179
  • 104.126.37.162
  • 104.126.37.163
  • 104.126.37.170
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.72
  • 20.190.160.20
  • 40.126.32.136
  • 20.190.160.14
  • 40.126.32.133
  • 20.190.160.22
  • 40.126.32.74
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
Process
Message
fontview.exe
Invalid parameter passed to C runtime function.