analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ParasiteHTTP-VNC-main.zip

Full analysis: https://app.any.run/tasks/12c803c3-fee5-4357-be69-a7b930f6d105
Verdict: Malicious activity
Analysis date: January 14, 2022, 22:11:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

00B36AD1BE9D4CC7E89A3BD8DA8EFC1B

SHA1:

619F53F8B3E25E71145607326A1BF2AF3378F267

SHA256:

F7BD006D823D3C8B753A7005BFBD6E238DFBB2B603E9B8AADA78095E9EA31EF3

SSDEEP:

3072:6X3VBNRPg7ZWP9TDiP2PRYwx2fHmkw0bvXu4Irc+QJw+:61SFWF/ieaq2vmk/ve4Irc+8w+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3836)
      • Explorer.EXE (PID: 1656)
    • Application was dropped or rewritten from another process

      • ParasiteHTTPServer.exe (PID: 2516)
    • Runs app for hidden code execution

      • Explorer.EXE (PID: 1656)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 872)
      • ParasiteHTTPServer.exe (PID: 2516)
      • cmd.exe (PID: 1524)
    • Reads the computer name

      • WinRAR.exe (PID: 872)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 872)
    • Uses RUNDLL32.EXE to load library

      • Explorer.EXE (PID: 1656)
    • Starts CMD.EXE for commands execution

      • Explorer.EXE (PID: 1656)
  • INFO

    • Manual execution by user

      • ParasiteHTTPServer.exe (PID: 2516)
      • rundll32.exe (PID: 2124)
    • Checks supported languages

      • rundll32.exe (PID: 2124)
    • Reads the computer name

      • rundll32.exe (PID: 2124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2021:12:25 09:58:11
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: ParasiteHTTP-VNC-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs parasitehttpserver.exe no specs explorer.exe no specs rundll32.exe no specs cmd.exe

Process information

PID
CMD
Path
Indicators
Parent process
872"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\ParasiteHTTP-VNC-main.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
3836"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
2516"C:\Users\admin\Desktop\ParasiteHTTP-VNC-main\ParasiteHTTPServer.exe" C:\Users\admin\Desktop\ParasiteHTTP-VNC-main\ParasiteHTTPServer.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
1656C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2124"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\ParasiteHTTP-VNC-main\ParasiteHVNC.dllC:\Windows\system32\rundll32.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1524"C:\Windows\system32\cmd.exe" C:\Windows\system32\cmd.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
5 550
Read events
5 223
Write events
327
Delete events
0

Modification events

(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(872) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\ParasiteHTTP-VNC-main.zip
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(872) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
2
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
872WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa872.42685\ParasiteHTTP-VNC-main\README.mdtext
MD5:093AE552A83BE904C4F13820820C4848
SHA256:BF8A70453595A8CB08E26DF8FB009ADBB057614AE1952638EB6F9F82624C798B
872WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa872.42685\ParasiteHTTP-VNC-main\ParasiteHVNC.dllexecutable
MD5:75D1BC89075E6D3B747DD59953AD34ED
SHA256:261F9A1644620019BC41F9BFCB69A38D5C9292C85BED277BB2EF714AE30FB928
872WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa872.42685\ParasiteHTTP-VNC-main\ParasiteHTTPServer.exeexecutable
MD5:DA2DAFD4DF2657096DE21B8436802155
SHA256:ADE816F8BD4E64BF3689E1829184453414819FCE18DBC3B036F4DC3C64519EF3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info