Analysis
-
max time kernel
125s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
winrar-x64-701.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
winrar-x64-701.exe
Resource
win10v2004-20241007-en
General
-
Target
winrar-x64-701.exe
-
Size
3.8MB
-
MD5
46c17c999744470b689331f41eab7df1
-
SHA1
b8a63127df6a87d333061c622220d6d70ed80f7c
-
SHA256
c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
-
SHA512
4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
SSDEEP
98304:6NRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:sR/gmeOqv7Ac9F0kB
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 60 IoCs
description ioc Process File opened for modification C:\Program Files\WinRAR\RarExt.dll winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Resources.pri winrar-x64-701.exe File created C:\Program Files\WinRAR\Default32.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-701.exe File created C:\Program Files\WinRAR\WinRAR.chm winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Descript.ion winrar-x64-701.exe File created C:\Program Files\WinRAR\ReadMe.txt winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Rar.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\Resources.pri winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\License.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\Order.htm winrar-x64-701.exe File created C:\Program Files\WinRAR\WinRAR.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-701.exe File created C:\Program Files\WinRAR\Uninstall.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\7zxa.dll winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-701.exe File created C:\Program Files\WinRAR\WinCon32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\ReadMe.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExt32.dll winrar-x64-701.exe File created C:\Program Files\WinRAR\Zip32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Uninstall.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExt32.dll winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Default32.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExt.dll winrar-x64-701.exe File created C:\Program Files\WinRAR\zipnew.dat uninstall.exe File created C:\Program Files\WinRAR\License.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Order.htm winrar-x64-701.exe File created C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinCon32.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\Zip.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\Rar.txt winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Rar.txt winrar-x64-701.exe File created C:\Program Files\WinRAR\UnRAR.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\RarFiles.lst winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinRAR.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Default.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\Rar.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\UnRAR.exe winrar-x64-701.exe File created C:\Program Files\WinRAR\Default.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Zip.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-701.exe File created C:\Program Files\WinRAR\rarnew.dat uninstall.exe File opened for modification C:\Program Files\WinRAR\RarFiles.lst winrar-x64-701.exe File created C:\Program Files\WinRAR\Uninstall.lst winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Uninstall.lst winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\7zxa.dll winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinCon.SFX winrar-x64-701.exe File created C:\Program Files\WinRAR\__tmp_rar_sfx_access_check_259440567 winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\WinRAR.chm winrar-x64-701.exe File created C:\Program Files\WinRAR\Descript.ion winrar-x64-701.exe File created C:\Program Files\WinRAR\WinCon.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\Zip32.SFX winrar-x64-701.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-701.exe -
Executes dropped EXE 17 IoCs
pid Process 2716 uninstall.exe 808 WinRAR.exe 2532 WinRAR.exe 1408 WinRAR.exe 2212 WinRAR.exe 1136 WinRAR.exe 1076 WinRAR.exe 2968 WinRAR.exe 2564 WinRAR.exe 3064 WinRAR.exe 2052 WinRAR.exe 1452 WinRAR.exe 3016 WinRAR.exe 2908 WinRAR.exe 2656 WinRAR.exe 1828 WinRAR.exe 2448 WinRAR.exe -
Loads dropped DLL 64 IoCs
pid Process 1996 winrar-x64-701.exe 1244 Process not Found 2716 uninstall.exe 2716 uninstall.exe 2716 uninstall.exe 1244 Process not Found 2716 uninstall.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 808 WinRAR.exe 808 WinRAR.exe 808 WinRAR.exe 808 WinRAR.exe 2532 WinRAR.exe 2532 WinRAR.exe 2532 WinRAR.exe 2532 WinRAR.exe 1408 WinRAR.exe 1408 WinRAR.exe 1408 WinRAR.exe 1408 WinRAR.exe 2212 WinRAR.exe 2212 WinRAR.exe 2212 WinRAR.exe 2212 WinRAR.exe 1136 WinRAR.exe 1136 WinRAR.exe 1136 WinRAR.exe 1136 WinRAR.exe 1076 WinRAR.exe 1076 WinRAR.exe 1076 WinRAR.exe 1076 WinRAR.exe 2968 WinRAR.exe 2968 WinRAR.exe 2968 WinRAR.exe 2968 WinRAR.exe 2564 WinRAR.exe 2564 WinRAR.exe 2564 WinRAR.exe 2564 WinRAR.exe 3064 WinRAR.exe 3064 WinRAR.exe 3064 WinRAR.exe 3064 WinRAR.exe 2052 WinRAR.exe 2052 WinRAR.exe 2052 WinRAR.exe 2052 WinRAR.exe 1452 WinRAR.exe 1452 WinRAR.exe 1452 WinRAR.exe 1452 WinRAR.exe 3016 WinRAR.exe 3016 WinRAR.exe 3016 WinRAR.exe 3016 WinRAR.exe 2908 WinRAR.exe 2908 WinRAR.exe 2908 WinRAR.exe 2908 WinRAR.exe 2656 WinRAR.exe 2656 WinRAR.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main WinRAR.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch WinRAR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" WinRAR.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main winrar-x64-701.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lzh uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz2\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Program Files\\WinRAR\\WinRAR.exe,0" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz2 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zipx uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zst uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR archive" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon\ = "C:\\Program Files\\WinRAR\\WinRAR.exe,1" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7z uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.001\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.arj uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.7z\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tzst uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lzh\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rev\ = "WinRAR.REV" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zst\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xxe\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.taz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xxe uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.uue uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext32.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ = "WinRAR.ZIP" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rar uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open uninstall.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 WinRAR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WinRAR.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2716 uninstall.exe 2448 WinRAR.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1996 winrar-x64-701.exe 1996 winrar-x64-701.exe 808 WinRAR.exe 808 WinRAR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2716 1996 winrar-x64-701.exe 30 PID 1996 wrote to memory of 2716 1996 winrar-x64-701.exe 30 PID 1996 wrote to memory of 2716 1996 winrar-x64-701.exe 30 PID 2716 wrote to memory of 1276 2716 uninstall.exe 33 PID 2716 wrote to memory of 1276 2716 uninstall.exe 33 PID 2716 wrote to memory of 1276 2716 uninstall.exe 33 PID 2716 wrote to memory of 808 2716 uninstall.exe 34 PID 2716 wrote to memory of 808 2716 uninstall.exe 34 PID 2716 wrote to memory of 808 2716 uninstall.exe 34 PID 2716 wrote to memory of 2532 2716 uninstall.exe 36 PID 2716 wrote to memory of 2532 2716 uninstall.exe 36 PID 2716 wrote to memory of 2532 2716 uninstall.exe 36 PID 2716 wrote to memory of 2688 2716 uninstall.exe 37 PID 2716 wrote to memory of 2688 2716 uninstall.exe 37 PID 2716 wrote to memory of 2688 2716 uninstall.exe 37 PID 2716 wrote to memory of 1408 2716 uninstall.exe 38 PID 2716 wrote to memory of 1408 2716 uninstall.exe 38 PID 2716 wrote to memory of 1408 2716 uninstall.exe 38 PID 2716 wrote to memory of 1412 2716 uninstall.exe 39 PID 2716 wrote to memory of 1412 2716 uninstall.exe 39 PID 2716 wrote to memory of 1412 2716 uninstall.exe 39 PID 2716 wrote to memory of 2212 2716 uninstall.exe 40 PID 2716 wrote to memory of 2212 2716 uninstall.exe 40 PID 2716 wrote to memory of 2212 2716 uninstall.exe 40 PID 2716 wrote to memory of 2400 2716 uninstall.exe 41 PID 2716 wrote to memory of 2400 2716 uninstall.exe 41 PID 2716 wrote to memory of 2400 2716 uninstall.exe 41 PID 2716 wrote to memory of 1136 2716 uninstall.exe 42 PID 2716 wrote to memory of 1136 2716 uninstall.exe 42 PID 2716 wrote to memory of 1136 2716 uninstall.exe 42 PID 2716 wrote to memory of 1640 2716 uninstall.exe 43 PID 2716 wrote to memory of 1640 2716 uninstall.exe 43 PID 2716 wrote to memory of 1640 2716 uninstall.exe 43 PID 2716 wrote to memory of 1076 2716 uninstall.exe 44 PID 2716 wrote to memory of 1076 2716 uninstall.exe 44 PID 2716 wrote to memory of 1076 2716 uninstall.exe 44 PID 2716 wrote to memory of 1688 2716 uninstall.exe 45 PID 2716 wrote to memory of 1688 2716 uninstall.exe 45 PID 2716 wrote to memory of 1688 2716 uninstall.exe 45 PID 2716 wrote to memory of 2796 2716 uninstall.exe 46 PID 2716 wrote to memory of 2796 2716 uninstall.exe 46 PID 2716 wrote to memory of 2796 2716 uninstall.exe 46 PID 2716 wrote to memory of 2968 2716 uninstall.exe 47 PID 2716 wrote to memory of 2968 2716 uninstall.exe 47 PID 2716 wrote to memory of 2968 2716 uninstall.exe 47 PID 2716 wrote to memory of 2564 2716 uninstall.exe 48 PID 2716 wrote to memory of 2564 2716 uninstall.exe 48 PID 2716 wrote to memory of 2564 2716 uninstall.exe 48 PID 2716 wrote to memory of 2864 2716 uninstall.exe 49 PID 2716 wrote to memory of 2864 2716 uninstall.exe 49 PID 2716 wrote to memory of 2864 2716 uninstall.exe 49 PID 2716 wrote to memory of 2752 2716 uninstall.exe 50 PID 2716 wrote to memory of 2752 2716 uninstall.exe 50 PID 2716 wrote to memory of 2752 2716 uninstall.exe 50 PID 2716 wrote to memory of 3064 2716 uninstall.exe 51 PID 2716 wrote to memory of 3064 2716 uninstall.exe 51 PID 2716 wrote to memory of 3064 2716 uninstall.exe 51 PID 2716 wrote to memory of 2052 2716 uninstall.exe 52 PID 2716 wrote to memory of 2052 2716 uninstall.exe 52 PID 2716 wrote to memory of 2052 2716 uninstall.exe 52 PID 2716 wrote to memory of 2700 2716 uninstall.exe 53 PID 2716 wrote to memory of 2700 2716 uninstall.exe 53 PID 2716 wrote to memory of 2700 2716 uninstall.exe 53 PID 2716 wrote to memory of 1452 2716 uninstall.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:1276
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:808
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2688
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:1412
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2400
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1136
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:1640
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1076
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:1688
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2796
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2864
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2752
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2700
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1452
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:572
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2264
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:3008
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2076
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
PID:1828
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2520
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2448
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\WinRAR\WhatsNew.txt3⤵PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55c336de3b3d794322ad9e5915e3a509f
SHA15256262a417e9a29fe23e8cca09782c7a3532fc9
SHA256bce29ef3b95306cb7b304fb8c3039be7157356d9f9d4e7e1c6bfbf02a117f48f
SHA5127243c9b8eb39fc8aa10ec8b5c290e27d44fa1c245f0478b75ae77964c178d41e9c1f651f987316f1153c1a7176eecebc269ffb0c42ced5bd0b12e5cc1b95da04
-
Filesize
744KB
MD516659ae52ce03889ad19db1f5710c6aa
SHA166b814fe3be64229e2cc19f0a4460e123ba74971
SHA2560b1866b627d8078d296e7d39583c9f856117be79c1d226b8c9378fe075369118
SHA512f9dd360c3a230131c08c4d5f838457f690ed4094ec166acd9f141b7603f649cfa71a47ea80e9ff41b8296246bdc1c72a75288f9a836c18431e06c2e8e3fc8398
-
Filesize
105KB
MD5b954981a253f5e1ee25585037a0c5fee
SHA196566e5c591df1c740519371ee6953ac1dc6a13f
SHA25659e40b34b09be2654b793576035639c459ad6e962f9f9cd000d556fa21b1c7cd
SHA5126a7772c6b404cd7fee50110b894ff0c470e5813264e605852b8dcc06bfaeb62b8cc79adcb695b3da149e42d5372a0d730cc7e8ed893c0bd0edb015fc088b7531
-
Filesize
477KB
MD54783f1a5f0bba7a6a40cb74bc8c41217
SHA1a22b9dc8074296841a5a78ea41f0e2270f7b7ad7
SHA256f376aaa0d4444d0727db5598e8377f9f1606400adbbb4772d39d1e4937d5f28c
SHA512463dff17f06eca41ae76e3c0b2efc4ef36529aa2eaed5163eec0a912fe7802c9fb38c37acfe94b82972861aaf1acf02823a5948fbb3292bb4743641acb99841e
-
Filesize
45KB
MD51c44c85fdab8e9c663405cd8e4c3dbbd
SHA174d44e9cb2bf6f4c152aadb61b2ffc6b6ccd1c88
SHA25633108dd40b4e07d60e96e1bcfa4ad877eb4906de2cc55844e40360e5d4dafb5d
SHA51246d3fb4f2d084d51b6fd01845823100abc81913ebd1b0bcfeb52ef18e8222199d282aa45cae452f0716e0e2bf5520f7a6a254363d22b65f7ab6c10f11292ee2d
-
Filesize
316KB
MD56ca1bc8bfe8b929f448e1742dacb8e7f
SHA1eca3e637db230fa179dcd6c6499bd7d616f211e8
SHA256997184b6f08d36dedc2cd12ee8dc5afb5e6e4bf77f7ab10f7ade9eefdb163344
SHA512d823f2c960a4d92129b9bda0f4f9195d32e64b929082b5efb9149546b5053021255d1dd03cb443f0a03106314554f76b94173e280a553a81e4ac2ac282877973
-
Filesize
3.1MB
MD553cf9bacc49c034e9e947d75ffab9224
SHA17db940c68d5d351e4948f26425cd9aee09b49b3f
SHA2563b214fd9774c6d96332e50a501c5e467671b8b504070bbb17e497083b7e282c3
SHA51244c9154b1fdbcf27ab7faee6be5b563a18b2baead3e68b3ea788c6c76cf582f52f3f87bd447a4f6e25ec7d4690761332211659d754fb4e0630c22a372e470bda
-
Filesize
12B
MD5f9713659ba185bf7666d4f98c75c1efd
SHA1b7491da52bf623cf3c6bdaf70c27829b4b1efefe
SHA25608a0de025a638af6487664aeecaa128890bfaa38be35b19b0ea596eb5e555416
SHA512ab602c5dacbcd8e1c5d2f374ffd5909227439583b34c8fb09c47281c25ebe92851a770f7a30a6653432df855da8b63ffbd77bcf38e32425173da54ea0b991388
-
Filesize
181KB
MD5f5b54d16610a819bbc6099bdc92add2c
SHA17c680a87233ff7e75866657e9c1acf97d69f6579
SHA25646f533007fb231d0b0af058a0997ab5e6b44a1b02ae327621f04fdc4b2e18964
SHA512a120a2ee6c926cd6f6b8d1be68ff471294552b049baa637a474d1210fe3ca83e66d0834217d1a5eea0491d080cea1795ee328fdd4cb54f6a132be2dc2e58e4a8