File name:

HiCOS_Client.zip

Full analysis: https://app.any.run/tasks/be4394d1-849e-4c25-9943-c587877b8664
Verdict: Malicious activity
Analysis date: April 14, 2020, 12:47:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B8CA4A7408B9FECA26D77DC470D3201C

SHA1:

2B6512D62E92C9B613A69F23642B7D8A2C3BF699

SHA256:

F43FA28C2FBEE4379DFEC1E36CF604DCFEB8330F797D8B5B08DE95A29B40DB1A

SSDEEP:

393216:iTx9MYqeymyA7+RVg2HLt9MCSPAFeTDwOkyxDJySxcS:6x9Fq1mytRq6Lt+PaMDwXgs47

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • HiCOS_Client.exe (PID: 1604)
      • HiCOS_Client.exe (PID: 3692)
    • Application was dropped or rewritten from another process

      • HiCOS_Client.exe (PID: 1604)
      • HiCOS_Client.exe (PID: 2836)
      • HiCOS_Client.exe (PID: 2572)
      • HiCOS_Client.exe (PID: 3112)
      • HiCOS_Client.exe (PID: 3692)
      • HiCOS_Client.exe (PID: 2368)
    • Changes the autorun value in the registry

      • HiCOS_Client.exe (PID: 2572)
  • SUSPICIOUS

    • Starts itself from another location

      • HiCOS_Client.exe (PID: 1604)
      • HiCOS_Client.exe (PID: 3112)
      • HiCOS_Client.exe (PID: 3692)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2104)
      • HiCOS_Client.exe (PID: 2836)
      • HiCOS_Client.exe (PID: 1604)
      • HiCOS_Client.exe (PID: 3112)
      • HiCOS_Client.exe (PID: 2572)
      • HiCOS_Client.exe (PID: 3692)
    • Executed as Windows Service

      • vssvc.exe (PID: 2668)
    • Searches for installed software

      • HiCOS_Client.exe (PID: 2572)
      • HiCOS_Client.exe (PID: 2368)
    • Creates files in the program directory

      • HiCOS_Client.exe (PID: 2572)
    • Creates a software uninstall entry

      • HiCOS_Client.exe (PID: 2572)
  • INFO

    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:12:31 09:41:06
ZipCRC: 0xcef85e7d
ZipCompressedSize: 15786949
ZipUncompressedSize: 16044624
ZipFileName: HiCOS_Client.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
8
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start winrar.exe hicos_client.exe hicos_client.exe hicos_client.exe vssvc.exe no specs hicos_client.exe hicos_client.exe hicos_client.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1604"C:\Users\admin\AppData\Local\Temp\{23493D56-EE2D-4E7F-9F9B-73E545EA4057}\.cr\HiCOS_Client.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\Rar$EXa2104.32574\HiCOS_Client.exe" -burn.filehandle.attached=148 -burn.filehandle.self=156 C:\Users\admin\AppData\Local\Temp\{23493D56-EE2D-4E7F-9F9B-73E545EA4057}\.cr\HiCOS_Client.exe
HiCOS_Client.exe
User:
admin
Company:
Chunghwa Telecom
Integrity Level:
MEDIUM
Description:
HiCOS PKI Smart Card
Exit code:
0
Version:
3.0.3.61092
Modules
Images
c:\users\admin\appdata\local\temp\{23493d56-ee2d-4e7f-9f9b-73e545ea4057}\.cr\hicos_client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2104"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\HiCOS_Client.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2368"C:\Users\admin\AppData\Local\Temp\{D9F3D60B-618F-4777-936E-E6A0AEE8EBA6}\.be\HiCOS_Client.exe" -q -burn.elevated BurnPipe.{4EE9FCCE-E5D2-4779-B1D1-E5DD5AC55798} {85F93B0E-55A9-4B89-A264-86583D57954E} 3692C:\Users\admin\AppData\Local\Temp\{D9F3D60B-618F-4777-936E-E6A0AEE8EBA6}\.be\HiCOS_Client.exeHiCOS_Client.exe
User:
admin
Company:
Chunghwa Telecom
Integrity Level:
HIGH
Description:
HiCOS PKI Smart Card
Exit code:
0
Version:
3.0.3.40716
Modules
Images
c:\users\admin\appdata\local\temp\{d9f3d60b-618f-4777-936e-e6a0aee8eba6}\.be\hicos_client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2572"C:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.be\HiCOS_Client.exe" -q -burn.elevated BurnPipe.{9DAF0BC3-8E98-4C46-9BA5-43B4C6672416} {6E15EE34-E353-4FB1-B58F-FABAD22570D4} 1604C:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.be\HiCOS_Client.exe
HiCOS_Client.exe
User:
admin
Company:
Chunghwa Telecom
Integrity Level:
HIGH
Description:
HiCOS PKI Smart Card
Exit code:
0
Version:
3.0.3.61092
Modules
Images
c:\users\admin\appdata\local\temp\{3185ceba-5dfd-4fbd-b620-310a517bc9ea}\.be\hicos_client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2668C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2836"C:\Users\admin\AppData\Local\Temp\Rar$EXa2104.32574\HiCOS_Client.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2104.32574\HiCOS_Client.exe
WinRAR.exe
User:
admin
Company:
Chunghwa Telecom
Integrity Level:
MEDIUM
Description:
HiCOS PKI Smart Card
Exit code:
0
Version:
3.0.3.61092
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2104.32574\hicos_client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3112"C:\ProgramData\Package Cache\B93A21009F4149B82073F4A2AB35FF7113FC31DF\HiCOS_Client.exe" /uninstall /norestart /quietC:\ProgramData\Package Cache\B93A21009F4149B82073F4A2AB35FF7113FC31DF\HiCOS_Client.exe
HiCOS_Client.exe
User:
admin
Company:
Chunghwa Telecom
Integrity Level:
HIGH
Description:
HiCOS PKI Smart Card
Exit code:
0
Version:
3.0.3.40716
Modules
Images
c:\programdata\package cache\b93a21009f4149b82073f4a2ab35ff7113fc31df\hicos_client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3692"C:\Users\admin\AppData\Local\Temp\{D293BC13-DA98-439D-8DBC-0668F19B0B14}\.cr\HiCOS_Client.exe" -burn.clean.room="C:\ProgramData\Package Cache\B93A21009F4149B82073F4A2AB35FF7113FC31DF\HiCOS_Client.exe" -burn.filehandle.attached=148 -burn.filehandle.self=156 /uninstall /norestart /quietC:\Users\admin\AppData\Local\Temp\{D293BC13-DA98-439D-8DBC-0668F19B0B14}\.cr\HiCOS_Client.exe
HiCOS_Client.exe
User:
admin
Company:
Chunghwa Telecom
Integrity Level:
HIGH
Description:
HiCOS PKI Smart Card
Exit code:
0
Version:
3.0.3.40716
Modules
Images
c:\users\admin\appdata\local\temp\{d293bc13-da98-439d-8dbc-0668f19b0b14}\.cr\hicos_client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 501
Read events
1 301
Write events
200
Delete events
0

Modification events

(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2104) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HiCOS_Client.zip
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
16
Suspicious files
2
Text files
12
Unknown types
1

Dropped files

PID
Process
Filename
Type
2572HiCOS_Client.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
2572HiCOS_Client.exeC:\ProgramData\Package Cache\.unverified\HiCOS_Client.exe
MD5:
SHA256:
1604HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.ba\thm.xmlxml
MD5:
SHA256:
2104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2104.32574\HiCOS_Client.exeexecutable
MD5:
SHA256:
2836HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{23493D56-EE2D-4E7F-9F9B-73E545EA4057}\.cr\HiCOS_Client.exeexecutable
MD5:
SHA256:
1604HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.ba\1033\thm.wxlxml
MD5:
SHA256:
1604HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.ba\1028\thm.wxlxml
MD5:
SHA256:
1604HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.ba\logo.pngimage
MD5:28A07E19BF975467C019A2C3E9EA42EB
SHA256:BE59D01C996B92ECC886034DA74C38F7C2E6C6416EF3494520E2EDC4EF1705E9
1604HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\.ba\thm.wxlxml
MD5:702E8B2C2D030B875C174F5054144396
SHA256:73C7D5B719CBB1C15EBB1DB3B81BB0F18B0E60B136ACD4DBA23A0BDBE7A8D1D9
1604HiCOS_Client.exeC:\Users\admin\AppData\Local\Temp\{3185CEBA-5DFD-4FBD-B620-310A517BC9EA}\HiCOS_Client.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info