File name:

SetupFile_665285.7z

Full analysis: https://app.any.run/tasks/43364f14-3146-4a5c-b57b-18866b3acb62
Verdict: Malicious activity
Analysis date: December 12, 2024, 22:05:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

097A0038BB3ECDB6A43CCDAEF3C88123

SHA1:

D7E1A3F66D321AAFAF0292C9ADD74D37CA11A083

SHA256:

EAE6DCF39F681DD2800D4C14CCEB6C5E6B55769A6C7711FC3C7B5BA4CBBCB2F9

SSDEEP:

196608:aP+bvtqdwFLxNI/v5+guO+5itl6Uroy2vMGHh4ROAp:mw1GwFLxMvJVRrovXKkAp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6292)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SetupFile_665285.exe (PID: 7100)
      • TeXworks0.6.2.exe (PID: 2216)
      • TeXworks0.6.2.tmp (PID: 3080)
    • Searches for installed software

      • SetupFile_665285.exe (PID: 7100)
    • Reads the Windows owner or organization settings

      • TeXworks0.6.2.tmp (PID: 3080)
  • INFO

    • Manual execution by a user

      • SetupFile_665285.exe (PID: 7100)
      • TeXworks0.6.2.exe (PID: 2216)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6292)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6292)
      • TeXworks0.6.2.tmp (PID: 3080)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6292)
    • Checks supported languages

      • SetupFile_665285.exe (PID: 7100)
      • TeXworks0.6.2.exe (PID: 2216)
      • TeXworks0.6.2.tmp (PID: 3080)
      • TeXworks.exe (PID: 6552)
    • Create files in a temporary directory

      • TeXworks0.6.2.exe (PID: 2216)
      • TeXworks0.6.2.tmp (PID: 3080)
    • Reads the computer name

      • SetupFile_665285.exe (PID: 7100)
      • TeXworks0.6.2.tmp (PID: 3080)
      • TeXworks.exe (PID: 6552)
    • Creates files in the program directory

      • TeXworks0.6.2.tmp (PID: 3080)
    • Creates a software uninstall entry

      • TeXworks0.6.2.tmp (PID: 3080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2024:12:12 16:46:23+00:00
ArchivedFileName: SetupFile_665285.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe setupfile_665285.exe texworks0.6.2.exe texworks0.6.2.tmp texworks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2216"C:\Users\admin\Desktop\TeXworks0.6.2.exe" C:\Users\admin\Desktop\TeXworks0.6.2.exe
explorer.exe
User:
admin
Company:
TeX Users Group
Integrity Level:
HIGH
Description:
TeXworks Setup
Exit code:
0
Version:
0.6.2.0
Modules
Images
c:\users\admin\desktop\texworks0.6.2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
3080"C:\Users\admin\AppData\Local\Temp\is-SO4S6.tmp\TeXworks0.6.2.tmp" /SL5="$902BA,15119424,227840,C:\Users\admin\Desktop\TeXworks0.6.2.exe" C:\Users\admin\AppData\Local\Temp\is-SO4S6.tmp\TeXworks0.6.2.tmp
TeXworks0.6.2.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-so4s6.tmp\texworks0.6.2.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6292"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\SetupFile_665285.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6552"C:\Program Files (x86)\TeXworks\TeXworks.exe"C:\Program Files (x86)\TeXworks\TeXworks.exeTeXworks0.6.2.tmp
User:
admin
Company:
TeX Users Group
Integrity Level:
HIGH
Description:
TeXworks editor & previewer
Version:
0.6.2-r.7ecce17
Modules
Images
c:\program files (x86)\texworks\texworks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7100"C:\Users\admin\Desktop\SetupFile_665285.exe" C:\Users\admin\Desktop\SetupFile_665285.exe
explorer.exe
User:
admin
Company:
Love Software Studios
Integrity Level:
HIGH
Description:
TeX work Love Software Studios
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\setupfile_665285.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
2 108
Read events
2 063
Write events
44
Delete events
1

Modification events

(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\SetupFile_665285.7z
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
8
Suspicious files
216
Text files
457
Unknown types
249

Dropped files

PID
Process
Filename
Type
6292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb6292.45939\SetupFile_665285.exeexecutable
MD5:DA2D62BC02181E9FEEFF8749C1E9746C
SHA256:B5B0018542AA69F156A8D147F73B2BE719608E618F5890B555258E6B31330453
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\is-2QB9J.tmpexecutable
MD5:3925E61E1F5A16CF9AA5E3F0981B2F46
SHA256:8E76D071DE97C42D6715A31EF6705958EF497C484FFC8D83F181B9CD1554CA7B
3080TeXworks0.6.2.tmpC:\Users\admin\AppData\Local\Temp\is-MN9FR.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\share\fonts\is-3H9A6.tmppfb
MD5:B09D2E140B7E807D3A97058263AB6693
SHA256:2038021A7B6330936FEA8562232B48796968FC913C1FD952D29E23BB1FDC891E
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\TeXworks.exeexecutable
MD5:3925E61E1F5A16CF9AA5E3F0981B2F46
SHA256:8E76D071DE97C42D6715A31EF6705958EF497C484FFC8D83F181B9CD1554CA7B
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\share\poppler\CMakeLists.txttext
MD5:78972F602E05CF6358A9DC9D1DEC14AE
SHA256:09C8747E102DB88A5C7EDE8C6E7A1BF653040BB02CF0E9C5EEAD4081DEA57E94
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\share\fonts\is-043OS.tmppfb
MD5:6DFCB282CF470CEB18D57D017B7898D6
SHA256:1ED716566691399AAEE420B07FB18CE0AFFBD883091862C68184997A8D6F1A7A
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\share\fonts\d050000l.pfbpfb
MD5:6DFCB282CF470CEB18D57D017B7898D6
SHA256:1ED716566691399AAEE420B07FB18CE0AFFBD883091862C68184997A8D6F1A7A
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\unins000.exeexecutable
MD5:264E63F2DD7A323A884D004DD3F9D263
SHA256:5E966F7CD63CB15A989BEBB4FC5A24DABE07CEFD4F288E0F59D9F6643EA38DB1
3080TeXworks0.6.2.tmpC:\Program Files (x86)\TeXworks\is-QVI9J.tmptext
MD5:BC3F46D5C147A18EB25404D15C500F89
SHA256:97613F18BB8FE1C815131F1D4795BD6C45B13FB881FDBDFA5C981E926AD93641
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
33
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
448
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
448
svchost.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2136
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1344
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
448
svchost.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
448
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.133:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.209.133
  • 2.23.209.182
  • 2.23.209.140
  • 2.23.209.130
  • 2.23.209.149
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.4
  • 40.126.31.69
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
appstalation.com
  • 104.26.13.137
  • 172.67.71.182
  • 104.26.12.137
unknown
arc.msn.com
  • 20.103.156.88
whitelisted

Threats

No threats detected
No debug info