File name:

Brute All in One WP(2.12).zip

Full analysis: https://app.any.run/tasks/5465a711-8b29-4e48-a9a1-e56cdab24281
Verdict: Malicious activity
Analysis date: April 17, 2021, 12:51:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

0A5DACE7D173FC7EDA18298E91F8DAC6

SHA1:

6B02DD45E9604AD2639BD5980DE60851E885AA17

SHA256:

FBA2A569710A329D7D1DE082BC8394C8F04DB4B09013D1B58CC0287922B3FB13

SSDEEP:

196608:qkgJR6KTbwOryk26d85vbdyPqLizdKrvZlsv9Ss2kZe8IKqCOiHl3/AG1/2U21Xz:/4zwwYw8hB4qL0dKrvkJCKN5FPAGtb2p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops a file with too old compile date

      • WinRAR.exe (PID: 332)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 332)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 332)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 332)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Brute All in One WP(2.12)/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2021:04:13 14:04:28
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe

Process information

PID
CMD
Path
Indicators
Parent process
332"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Brute All in One WP(2.12).zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
447
Read events
430
Write events
17
Delete events
0

Modification events

(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(332) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(332) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Brute All in One WP(2.12).zip
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(332) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(332) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13C\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
10
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb332.23824\Brute All in One WP(2.12)\SSL_x64\libcrypto-x64.dll
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb332.23824\Brute All in One WP(2.12)\SSL_x64\libeay32.dll
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb332.23824\Brute All in One WP(2.12)\SSL_x64\ssleay32.dll
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb332.23824\Brute All in One WP(2.12)\SSL_x64\vcredist_x64.exe
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb332.23824\Brute All in One WP(2.12)\top-255.txt
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb332.23824\Brute All in One WP(2.12)\top-830_MCR.txt
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb332.22553\Brute All in One WP(2.12)\README-RUS.txttext
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb332.22553\Brute All in One WP(2.12)\revshow_x64 (2.12).exeexecutable
MD5:
SHA256:
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb332.22553\Brute All in One WP(2.12)\top-830_MCR.txttext
MD5:84ED69555D298C4CB1C2B5689D0A977D
SHA256:4F55B144271A6269506B75C39672F16B63D21C2457A420DD2DD89996239DCBC8
332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb332.22553\Brute All in One WP(2.12)\SSL_x64\vcredist_x64.exeexecutable
MD5:630D75210B325A280C3352F879297ED5
SHA256:B06546DDC8CA1E3D532F3F2593E88A6F49E81B66A9C2051D58508CC97B6A2023
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info