File name:

lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.7z

Full analysis: https://app.any.run/tasks/da960839-3bcb-4924-84fa-0b5f280e8c65
Verdict: Malicious activity
Analysis date: May 15, 2025, 19:14:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

21993974CFE180F61BBBDF3A675A2BF8

SHA1:

ECF42A046B0E298D6CD5522C974299E7D661C32A

SHA256:

E94E4CA697EA0A52DC294B398CB35DB69F2E0A2E3B5FD99E193863C29EB42F38

SSDEEP:

3072:nSZjgxxfg1ZhRwdygQBg/XL3MBnBaMoaaf+fEAiP:Sp8xiZDw0OL3MBnCac+fYP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 2848)
    • Changes the autorun value in the registry

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
  • SUSPICIOUS

    • Reads the Internet Settings

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
      • dllhsts.exe (PID: 1396)
    • Executable content was dropped or overwritten

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
    • Application launched itself

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 988)
      • dllhsts.exe (PID: 2872)
    • Starts CMD.EXE for commands execution

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
    • Executing commands from a ".bat" file

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
    • Starts itself from another location

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
    • Reads security settings of Internet Explorer

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
      • dllhsts.exe (PID: 1396)
    • There is functionality for taking screenshot (YARA)

      • dllhsts.exe (PID: 1396)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 2848)
      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
    • Checks supported languages

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 988)
      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
      • dllhsts.exe (PID: 2872)
      • dllhsts.exe (PID: 1396)
    • Reads the computer name

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
      • dllhsts.exe (PID: 1396)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2848)
    • Manual execution by a user

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 988)
    • Creates files or folders in the user directory

      • lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe (PID: 2412)
    • Checks proxy server information

      • dllhsts.exe (PID: 1396)
    • Reads the machine GUID from the registry

      • dllhsts.exe (PID: 1396)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2011:02:25 05:19:32+00:00
ArchivedFileName: lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe cmd.exe no specs dllhsts.exe no specs dllhsts.exe

Process information

PID
CMD
Path
Indicators
Parent process
988"C:\Users\admin\Desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe" C:\Users\admin\Desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
explorer.exe
User:
admin
Company:
Auslogics
Integrity Level:
HIGH
Description:
Duplicate File Finder
Exit code:
0
Version:
1.5.2.55
Modules
Images
c:\users\admin\desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1268C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\clean.bat" "C:\Windows\System32\cmd.exelockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1396C:\Users\admin\AppData\Roaming\Microsoft\dllhsts.exeC:\Users\admin\AppData\Roaming\Microsoft\dllhsts.exe
dllhsts.exe
User:
admin
Company:
Auslogics
Integrity Level:
HIGH
Description:
Duplicate File Finder
Version:
1.5.2.55
Modules
Images
c:\users\admin\appdata\roaming\microsoft\dllhsts.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2412C:\Users\admin\Desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exeC:\Users\admin\Desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
User:
admin
Company:
Auslogics
Integrity Level:
HIGH
Description:
Duplicate File Finder
Exit code:
0
Version:
1.5.2.55
Modules
Images
c:\users\admin\desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2848"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2872"C:\Users\admin\AppData\Roaming\Microsoft\dllhsts.exe" C:\Users\admin\AppData\Roaming\Microsoft\dllhsts.exelockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exe
User:
admin
Company:
Auslogics
Integrity Level:
HIGH
Description:
Duplicate File Finder
Exit code:
0
Version:
1.5.2.55
Modules
Images
c:\users\admin\appdata\roaming\microsoft\dllhsts.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
4 713
Read events
4 655
Write events
52
Delete events
6

Modification events

(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2848) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.7z
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2848) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
2
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2412lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exeC:\Users\admin\Desktop\clean.battext
MD5:22B4F50881AA281EC654771C43387C88
SHA256:A574B7958F7253585EC31ED9480262775AB5ED2465DDC3032EA1D8C86C6AEBDC
2848WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2848.27244\lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exeexecutable
MD5:4FD38E149AD2339A1067FF0CB35618D3
SHA256:BA769D1C7BE7F9DEC618970A0DE722907E29FBC7CA775EA1EEC528B43A2BB023
2412lockscreen_69d92958062c6b23b6b18dada27775a1693c0404.exeC:\Users\admin\AppData\Roaming\Microsoft\dllhsts.exeexecutable
MD5:4FD38E149AD2339A1067FF0CB35618D3
SHA256:BA769D1C7BE7F9DEC618970A0DE722907E29FBC7CA775EA1EEC528B43A2BB023
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1396
dllhsts.exe
POST
404
49.13.77.253:80
http://feyana.jino.ru/index.php
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1396
dllhsts.exe
49.13.77.253:80
feyana.jino.ru
Hetzner Online GmbH
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
feyana.jino.ru
  • 49.13.77.253
whitelisted
feyana22.ru
  • 49.13.77.253
unknown
feyana44.ru
  • 49.13.77.253
unknown

Threats

No threats detected
No debug info