Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 01:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.win-rar.com/postdownload.html?&L=0&Version=32bit
Resource
win10v2004-20230220-en
General
-
Target
https://www.win-rar.com/postdownload.html?&L=0&Version=32bit
Malware Config
Extracted
C:\Users\Admin\Downloads\Rar.txt
Extracted
C:\Users\Admin\Downloads\WhatsNew.txt
https
http
http://weirdsgn.com
http://icondesignlab.com
https://rarlab.com/themes/WinRAR_Classic_48x36.theme.rar
https://technet.microsoft.com/en-us/library/security/ms14-064.aspx
http://rarlab.com/vuln_sfx_html2.htm
https://blake2.net
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2252 WinRAR.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ WinRAR.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Users\\Admin\\Downloads\\rarext64.dll" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" WinRAR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch WinRAR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" WinRAR.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\IESettingSync WinRAR.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" WinRAR.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133249655634400874" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32 WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR archive" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Users\\Admin\\Downloads\\WinRAR.exe,0" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open WinRAR.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command\ = "\"C:\\Users\\Admin\\Downloads\\WinRAR.exe\" \"%1\"" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Users\\Admin\\Downloads\\WinRAR.exe\" \"%1\"" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ = "WinRAR" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ = "WinRAR" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Users\\Admin\\Downloads\\WinRAR.exe\" \"%1\"" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA} WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP archive" WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR recovery volume" WinRAR.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 1568 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2252 WinRAR.exe 2252 WinRAR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 396 3368 chrome.exe 83 PID 3368 wrote to memory of 396 3368 chrome.exe 83 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2932 3368 chrome.exe 84 PID 3368 wrote to memory of 2808 3368 chrome.exe 85 PID 3368 wrote to memory of 2808 3368 chrome.exe 85 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86 PID 3368 wrote to memory of 1036 3368 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.win-rar.com/postdownload.html?&L=0&Version=32bit1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdd959758,0x7ffcdd959768,0x7ffcdd9597782⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:22⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:12⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5144 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5516 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5504 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2772 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4604 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=904 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2792 --field-trial-handle=1820,i,17598381433588757994,1808788035461625449,131072 /prefetch:82⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1812
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap17184:90:7zEvent216081⤵
- Suspicious use of FindShellTrayWindow
PID:1568
-
C:\Users\Admin\Downloads\WinRAR.exe"C:\Users\Admin\Downloads\WinRAR.exe"1⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD553dce872ccfeac11c41acb6b895e9b4b
SHA19f4f5e9cb9bdc31beefa625627667ac1b5211cc9
SHA2564504eb596e0736e0189743e0f0bf291b293d1fee29114bc19c16f84ab2c84220
SHA512235da1d9e4f31e4215b424b4e45c0c992e685edde7f5d28ab9fd1c1148f9729d4eeb748d887c7c17f8887a991e26640ec0a0314fcbb9235382afdc9ca9554599
-
Filesize
1KB
MD533a81acf93d646ccf82cd106ff54981a
SHA1d3bf9362e25a61562848ec2d903a4947f33799e9
SHA2566411f5014344e4222050171902c4ed169d73de2c23325c0f0c77d91124b7dda8
SHA512ae4c6e62b8febffb2d9f0f36fca23a6cd8d4fc4fdc49356d8a3f1fe99275a9c63b7cd12b4fd033e348adf3b522b2c1fb5ac1eaf375e24caaac25229c2a521ac6
-
Filesize
872B
MD502e4584a0401b610d008780e193bc9e3
SHA1791e3ec96eb383627aa61bb19d5f37e31526aef2
SHA256f592c6450e99d0737b1faa32473b87510460e9678fe36222f730fdb9a56c8dd5
SHA5124ba45eca96cf62bad89df34dd21b67ce13e78876b05457c943d5f10a1f82b2ce3996a124ba7baf9a94f60e906b897f067f37be029c978cf535244d2a9d281bbb
-
Filesize
6KB
MD5d41c03ab7b4bd9ff665c335c366b494f
SHA1de5ddffdb17a488ea0f068f8903004eb44bbeea3
SHA2567fcdd0c04679769bddabafd34cd000fde16c30813d3825f2b68f6c9262234858
SHA512cb9c38b57cf4d10b9d79961ea13766656d60eb3b08108883384591385cb71ab40401e7d0e9036e27a951235ccaf0e6048a531777884ea73c808971f4d569d59f
-
Filesize
6KB
MD556aa9b125b2bf76563423e046b93ae29
SHA1e421665e29a08580483be73d6b83e420fcbd344d
SHA25638e698510419a5715e019cb11095ab872d839d9e3424b4bd9d3bda78b52dd0bd
SHA512581fbe40006e112cf3fc80cfad7832f202b6a3bd6018a55e2db66dae5e7442d50e39bb139f1435da25740a1125bc8becdb1a94579bb8c0a92fa9efb7d593308a
-
Filesize
15KB
MD532903a1008ba9e1ace6256093ad9110d
SHA1756cf6d233e7f4e2216d988f62312bc10a6c25a7
SHA256ba52551d0244b7943d98223cc69af048b5c6f751700d1acade53f51b2018350a
SHA5121f21fbc880eeb8fe9a124caebd47bb2e393eb2cc13cddd9aee65d987eb5a499730d5397df4ab5182ed91a47be5fe13c1f23579f3e241052ae3f2887f92aaef05
-
Filesize
173KB
MD5a0c6f07efcebbb1be5e376314a354193
SHA1bf1d93735070556f12727ff406e5c6f0e53cf549
SHA25637dc5cde93fc9107d29c83e158e6a0bc84040f72f323c5dd180a9ac09adbbef9
SHA5121b7b63e93f0a44d4fa175b244a7fc4701fc03d1d5cd970ae0b191c331fa0abebb99a0bf709b85080e9487e66044b5d1698001b1f46d70b7e482817acd5126294
-
Filesize
110KB
MD5768eaf7790805733938b54be1161e6ee
SHA1d072bfc96e267d8e939aa72a2bef8d2435d0d2a7
SHA2565d082c453771adaf706bb21f93f6a3faf459fa4a2b254b90f0331cd2761345b8
SHA51235b41ca8dc9dc5725591845e2d6f8a9dc627e8928ed5e6fc861cd3c07083c6f3338cf114e9f2b378f0473844c3a83c7bcbaae4fd2eec6ef15fe5cdd6376b5a25
-
Filesize
106KB
MD57e04bbe92c795a99d8f784dcbb59e094
SHA1915339b60e12eff25adced598f4e65bc5a38c9a0
SHA256cf58fdc71048364bf492767bd655d41c11eba22b25a3429dd74a52cb073a6233
SHA512a8d6b6a53871a6d3cd1d3826f467762f45c7dc9df4863aa1394a265afec50b3901baebd1fb5ed07c91c679b22e52d5ddbd6aa2fd66b5197c3a76e53ee2b89c4b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
109KB
MD5e51d9ff73c65b76ccd7cd09aeea99c3c
SHA1d4789310e9b7a4628154f21af9803e88e89e9b1b
SHA2567456f489100ec876062d68d152081167ac00d45194b17af4a8dd53680acfc9bd
SHA51257ab82d4a95d3b5d181c0ec1a1a1de56a4d6c83af5644032ff3af71e9bd8e13051ae274609bda8b336d70a99f2fba17331773694d7e98d4a7635f7b59651b77c
-
Filesize
3.2MB
MD5f57cd05bbf6ba2c32994887e7a305413
SHA1cab32cf3b89790284dcb084d9ac6048c21c69c5a
SHA25652aae540cd3fd4053a4580a0e1919b0acc2a21277eca20d2d467d9e1907bd09d
SHA512f6b2e63c687fe5c9833293c8eb0eb066eb87d8dc4c8720308596dc867e8e3d8430c3e92092d1b9820a8fdddd1bd931b2804d270cbd517af8f61abf8d9bccfed5
-
Filesize
103KB
MD54c88a040b31c4d144b44b0dc68fb2cc8
SHA1bf473f5a5d3d8be6e5870a398212450580f8b37b
SHA2566f1a005a0e5c765fcc68fe15f7ccd18667a6e583980e001ba7181aaaeed442b8
SHA512e7f224a21d7c111b83775c778e6d9fa447e53809e0efd4f3ba99c7d6206036aa3dde9484248b244fb26789467559a40516c8e163d379e84dcf31ac84b4c5d2a8
-
Filesize
317KB
MD5381eae01a2241b8a4738b3c64649fbc0
SHA1cc5944fde68ed622ebee2da9412534e5a44a7c9a
SHA256ad58f39f5d429b5a3726c4a8ee5ccada86d24273eebf2f6072ad1fb61ea82d6e
SHA512f7a8903ea38f2b62d6fa2cc755e0d972a14d00a2e1047e6e983902eff1d3a6bca98327c2b8ed47e46435d1156816e4b0d494726fce87b6cbe7722f5249889b88
-
Filesize
2.5MB
MD596ca98c71de9e98c68259873407bd4fd
SHA103650d918cbdd886364eb28e3b1750042de1b537
SHA25692c84c7a2ad6ce298d0f73913838c034b9a2bc9265c27ad5da9593f865240721
SHA5123e2925525a0899d2e6a97b7512e13dcad8960bbdc7e1d03f0925dec776b75a02f3d7f21c02bae17656166a76f2a19abd7c380125add7370958d1f744de3244d7
-
Filesize
2.5MB
MD596ca98c71de9e98c68259873407bd4fd
SHA103650d918cbdd886364eb28e3b1750042de1b537
SHA25692c84c7a2ad6ce298d0f73913838c034b9a2bc9265c27ad5da9593f865240721
SHA5123e2925525a0899d2e6a97b7512e13dcad8960bbdc7e1d03f0925dec776b75a02f3d7f21c02bae17656166a76f2a19abd7c380125add7370958d1f744de3244d7
-
Filesize
566KB
MD50764048a1f48e948adb1c06c24fc9975
SHA12e16cf63062135b4b3daa25d4bd056d63e6316c6
SHA256999e1fd43d96307a717a15ecf2acab0ad66f5cd355290499337935cdcb9ccf8e
SHA51216d403197475459e8ee4879338a7c6ce3982b3e5bcbf089eb059cf6760e611f25656fa2c8c1313c4a7427d90bea1d951d28f210f71dcea8027d80ac9c64338c9
-
Filesize
3.2MB
MD5f57cd05bbf6ba2c32994887e7a305413
SHA1cab32cf3b89790284dcb084d9ac6048c21c69c5a
SHA25652aae540cd3fd4053a4580a0e1919b0acc2a21277eca20d2d467d9e1907bd09d
SHA512f6b2e63c687fe5c9833293c8eb0eb066eb87d8dc4c8720308596dc867e8e3d8430c3e92092d1b9820a8fdddd1bd931b2804d270cbd517af8f61abf8d9bccfed5