Analysis
-
max time kernel
56s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
winrar-x64-701.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
winrar-x64-701.exe
Resource
win10v2004-20240226-en
General
-
Target
winrar-x64-701.exe
-
Size
3.8MB
-
MD5
46c17c999744470b689331f41eab7df1
-
SHA1
b8a63127df6a87d333061c622220d6d70ed80f7c
-
SHA256
c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
-
SHA512
4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
SSDEEP
98304:6NRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:sR/gmeOqv7Ac9F0kB
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 60 IoCs
description ioc Process File opened for modification C:\Program Files\WinRAR\Uninstall.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinCon32.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\zipnew.dat uninstall.exe File created C:\Program Files\WinRAR\Rar.txt winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExt32.dll winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\Uninstall.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\Default.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\ReadMe.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinRAR.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Zip.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\License.txt winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Default.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\Zip32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\UnRAR.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\UnRAR.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-701.exe File created C:\Program Files\WinRAR\License.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\WinRAR.chm winrar-x64-701.exe File created C:\Program Files\WinRAR\Default32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Uninstall.lst winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Rar.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\Order.htm winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Order.htm winrar-x64-701.exe File created C:\Program Files\WinRAR\Rar.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExt32.dll winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinCon.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\Zip.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Descript.ion winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinRAR.chm winrar-x64-701.exe File created C:\Program Files\WinRAR\rarnew.dat uninstall.exe File opened for modification C:\Program Files\WinRAR\Resources.pri winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExt.dll winrar-x64-701.exe File created C:\Program Files\WinRAR\WinCon32.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\ReadMe.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\WinRAR.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\7zxa.dll winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-701.exe File created C:\Program Files\WinRAR\__tmp_rar_sfx_access_check_259400022 winrar-x64-701.exe File created C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\7zxa.dll winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExt.dll winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Default32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Zip32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-701.exe File created C:\Program Files\WinRAR\Descript.ion winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarFiles.lst winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-701.exe File created C:\Program Files\WinRAR\Resources.pri winrar-x64-701.exe File created C:\Program Files\WinRAR\WinCon.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\Uninstall.lst winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Rar.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\RarFiles.lst winrar-x64-701.exe -
Executes dropped EXE 1 IoCs
pid Process 2576 uninstall.exe -
Loads dropped DLL 8 IoCs
pid Process 2968 winrar-x64-701.exe 1188 Process not Found 2576 uninstall.exe 2576 uninstall.exe 1188 Process not Found 1188 Process not Found 2784 chrome.exe 2784 chrome.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main winrar-x64-701.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xz uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Program Files\\WinRAR\\WinRAR.exe,0" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tzst uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.taz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7z uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP archive" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.arj uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tlz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext32.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Program Files\\WinRAR\\WinRAR.exe,0" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lzh\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz2\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew\FileName = "C:\\Program Files\\WinRAR\\zipnew.dat" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.uue\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rar\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lha\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.uu\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tzst\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Program Files\\WinRAR\\WinRAR.exe\" \"%1\"" uninstall.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 348 chrome.exe 348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2968 winrar-x64-701.exe 2968 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2576 2968 winrar-x64-701.exe 28 PID 2968 wrote to memory of 2576 2968 winrar-x64-701.exe 28 PID 2968 wrote to memory of 2576 2968 winrar-x64-701.exe 28 PID 348 wrote to memory of 2012 348 chrome.exe 31 PID 348 wrote to memory of 2012 348 chrome.exe 31 PID 348 wrote to memory of 2012 348 chrome.exe 31 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1352 348 chrome.exe 33 PID 348 wrote to memory of 1124 348 chrome.exe 34 PID 348 wrote to memory of 1124 348 chrome.exe 34 PID 348 wrote to memory of 1124 348 chrome.exe 34 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35 PID 348 wrote to memory of 2268 348 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies registry class
PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5c39758,0x7fef5c39768,0x7fef5c397782⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:22⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1548 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:22⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1332 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3468 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1384,i,9697019552988426827,7109902408675970582,131072 /prefetch:82⤵
- Loads dropped DLL
PID:2784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5b954981a253f5e1ee25585037a0c5fee
SHA196566e5c591df1c740519371ee6953ac1dc6a13f
SHA25659e40b34b09be2654b793576035639c459ad6e962f9f9cd000d556fa21b1c7cd
SHA5126a7772c6b404cd7fee50110b894ff0c470e5813264e605852b8dcc06bfaeb62b8cc79adcb695b3da149e42d5372a0d730cc7e8ed893c0bd0edb015fc088b7531
-
Filesize
45KB
MD51c44c85fdab8e9c663405cd8e4c3dbbd
SHA174d44e9cb2bf6f4c152aadb61b2ffc6b6ccd1c88
SHA25633108dd40b4e07d60e96e1bcfa4ad877eb4906de2cc55844e40360e5d4dafb5d
SHA51246d3fb4f2d084d51b6fd01845823100abc81913ebd1b0bcfeb52ef18e8222199d282aa45cae452f0716e0e2bf5520f7a6a254363d22b65f7ab6c10f11292ee2d
-
Filesize
316KB
MD56ca1bc8bfe8b929f448e1742dacb8e7f
SHA1eca3e637db230fa179dcd6c6499bd7d616f211e8
SHA256997184b6f08d36dedc2cd12ee8dc5afb5e6e4bf77f7ab10f7ade9eefdb163344
SHA512d823f2c960a4d92129b9bda0f4f9195d32e64b929082b5efb9149546b5053021255d1dd03cb443f0a03106314554f76b94173e280a553a81e4ac2ac282877973
-
Filesize
3.1MB
MD553cf9bacc49c034e9e947d75ffab9224
SHA17db940c68d5d351e4948f26425cd9aee09b49b3f
SHA2563b214fd9774c6d96332e50a501c5e467671b8b504070bbb17e497083b7e282c3
SHA51244c9154b1fdbcf27ab7faee6be5b563a18b2baead3e68b3ea788c6c76cf582f52f3f87bd447a4f6e25ec7d4690761332211659d754fb4e0630c22a372e470bda
-
Filesize
636KB
MD51e86c3bfcc0688bdbe629ed007b184b0
SHA1793fada637d0d462e3511af3ffaec26c33248fac
SHA2567b08daee81a32f72dbc10c5163b4d10eb48da8bb7920e9253be296774029f4ef
SHA5124f8ae58bbf55acb13600217ed0eef09fa5f124682cedd2bfc489d83d921f609b66b0294d8450acb1a85d838adb0e8394dadf5282817dba576571e730704f43ac
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5927271732524d7b92702690ae59f60a3
SHA1c9dbb662e9adecf869d916dd69fbcbd7638fb4bf
SHA256a4dca02eca832ac8079c9ebc190430e2484743e6255230b1a3b665a9001a3837
SHA5124c388f4a4a4a60e5cbe8745d69e749404ef150f4084a4603c160f963c193c9011286257642588afd5ee5305eb1dd39d0b5fe194760251ab25ec4b102465396a5
-
Filesize
5KB
MD541bf802f7fa236cd41298fc48acbd014
SHA1a4057b58c1231ad6ce9208cab549ea7730dd7c29
SHA256bbd017d3bec75cb26d50d798464f643c825a8ad2ba1c91cc67101dae9e25948e
SHA512d7060237cd81006a4f83a39cf5072c38160c6dd89a9c462c51386f1e091d33f851aefe67c40c5e0d19680ed29825320d570a4ba3ed0256cdb3f90e0143d5bd08
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
477KB
MD54783f1a5f0bba7a6a40cb74bc8c41217
SHA1a22b9dc8074296841a5a78ea41f0e2270f7b7ad7
SHA256f376aaa0d4444d0727db5598e8377f9f1606400adbbb4772d39d1e4937d5f28c
SHA512463dff17f06eca41ae76e3c0b2efc4ef36529aa2eaed5163eec0a912fe7802c9fb38c37acfe94b82972861aaf1acf02823a5948fbb3292bb4743641acb99841e