File name:

RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP ).zip

Full analysis: https://app.any.run/tasks/2e32ad11-8c6e-4161-b648-568ef203b178
Verdict: Suspicious activity
Analysis date: July 05, 2019, 17:53:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

9E39ED5AD6A4A396067ED3B9AB80C4B0

SHA1:

C5EF1A584B2D03CA8A07318A0ED5D093B3693215

SHA256:

EC9763EEAA93B1AB20386993C7F5664C756569B02E7DF4EAD4C810C5184F7F07

SSDEEP:

98304:OYlmstO3y5tZUWspFZstJSkhahVIsRTvs+qWyIRai0MvpVK:qsCMUzka1TvpqiRa3WpVK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3064)
    • Creates executable files which already exist in Windows

      • WinRAR.exe (PID: 3268)
    • Application launched itself

      • cmd.exe (PID: 3064)
    • Creates files in the Windows directory

      • wusa.exe (PID: 4024)
  • INFO

    • Manual execution by user

      • svchost.exe (PID: 3176)
      • cmd.exe (PID: 3064)
      • masscan.exe (PID: 3456)
      • cmd.exe (PID: 3724)
      • NOTEPAD.EXE (PID: 2648)
      • NOTEPAD.EXE (PID: 3580)
      • NOTEPAD.EXE (PID: 2580)
      • svchost.exe (PID: 2868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2016:11:28 16:18:26
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: RDP Solid Scanner v2.1 ( ??? ???⠭??????? ???⮢ RDP )/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
15
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs svchost.exe masscan.exe no specs cmd.exe no specs timeout.exe no specs cmd.exe no specs bcdedit.exe no specs cmd.exe no specs wusa.exe no specs wusa.exe no specs wusa.exe notepad.exe no specs notepad.exe no specs notepad.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2020"C:\Windows\system32\wusa.exe" /uninstall /KB:2592687C:\Windows\system32\wusa.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wusa.exe
c:\systemroot\system32\ntdll.dll
2264bcdeditC:\Windows\system32\bcdedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Boot Configuration Data Editor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2580"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Your ID.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2648"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Readme.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2868"C:\Users\admin\Desktop\RDPSS\svchost.exe" C:\Users\admin\Desktop\RDPSS\svchost.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\rdpss\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3064cmd /c ""C:\Users\admin\Desktop\Del_Log.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3092wusa.exe /uninstall /KB:2592687C:\Windows\system32\wusa.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wusa.exe
c:\systemroot\system32\ntdll.dll
3176"C:\Users\admin\Desktop\RDPSS\svchost.exe" C:\Users\admin\Desktop\RDPSS\svchost.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\rdpss\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3268"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP ).zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3456"C:\Users\admin\Desktop\RDPSS\masscan.exe" C:\Users\admin\Desktop\RDPSS\masscan.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\rdpss\masscan.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\rdpss\msvcr100.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
Total events
545
Read events
515
Write events
30
Delete events
0

Modification events

(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3268) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP ).zip
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3268) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(3268) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\RDPSS\masscan.exe
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\RDPSS\msvcr100.dll
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\RDPSS\Packet.dll
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\RDPSS\svchost.exe
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\RDPSS\WinPcap_4_1_3.exe
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\RDPSS\wpcap.dll
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\Readme.txt
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\uninstall_KB2592687.bat
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\Your ID.txt
MD5:
SHA256:
3268WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3268.27516\RDP Solid Scanner v2.1 ( Чек нестандартных портов RDP )\Scanner RDP\пароль для сканера.txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
svchost.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2007 Oreans Technologies --- ------------------------------------------------
svchost.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2007 Oreans Technologies --- ------------------------------------------------