Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 21:54

General

  • Target

    winrar-x64.exe

  • Size

    3.6MB

  • MD5

    517023aad9ad2f3200057ce0b704e196

  • SHA1

    7612058b5f0f87327b2957d5da63a2c6e65b0ea1

  • SHA256

    de1d9040786c80f3f40f41c98aa1f6b14fc7b6f2d3db09eceadd340327164f8e

  • SHA512

    bef1b7268d8c2c1f6c900fe392ecf11d2cd518dfa9944fb77c29c2306d20d89052a39c45d689054173ce866be1e93d4b3097131a120cd7567092527e1f50b3e1

  • SSDEEP

    98304:vABAG9dn8V6e3yfnjvg6Tuq1LA28xv12m2ERCHo:va9dXh6q1Lf8xv5tCI

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 60 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winrar-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\winrar-x64.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Program Files\WinRAR\uninstall.exe
      "C:\Program Files\WinRAR\uninstall.exe" /setup
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Modifies registry class
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\WinRAR\Rar.txt

    Filesize

    109KB

    MD5

    2132aceded754d35ab911823a9b41cb4

    SHA1

    e1f549ae718257f55b61bedfd0e7b9c06dc3f533

    SHA256

    6805c8b3fa7d4f19dbd2439e2cdbf2cf7c6e538484d800266798575a58571b70

    SHA512

    464142af80cd292f2558af5d1d133b27df611999322772bc4e442eb4f7bb6b7b3e7fa8dd26cc050abcbcc6d205e4298f81ea948bbe1ca12c3e126cc960cf3478

  • C:\Program Files\WinRAR\Uninstall.exe

    Filesize

    383KB

    MD5

    33cecf93517f305d54609584a7d9e6bc

    SHA1

    5d816ed1ec543865646b78361b6f14fb0dafe33e

    SHA256

    288ec8500f2661a42ac531d5d7a9dc3d11d77885b3dc63ef2d3a7b75a210b5d1

    SHA512

    319ed031867f64c9312d8263ff5cdbd7e4c3ff77573224a4963b6ed5a1eac6ce52e607812742895ab996fb0d216daee34b00841b92f0bf6a5d56ff7efbe8a91c

  • C:\Program Files\WinRAR\WhatsNew.txt

    Filesize

    50KB

    MD5

    35bd214434c43c5d02b2be9d59a6a496

    SHA1

    8751490f7159ccce1a37b337824b35378c7ede63

    SHA256

    3458c5f059146fd519e95b01397bc063c02c618b962d1ea1034989983f4d6317

    SHA512

    565fe00206b80fe9ff59a89e9f7b373e93454eb2a1e80b9a02e75a6575f04915d359f54654e172bdcf0351544b1c02f87dc6e2f1e69a0d769866aeade2630086

  • C:\Program Files\WinRAR\WinRAR.chm

    Filesize

    323KB

    MD5

    53ad0a4d91e4382adfbb7a32586b0268

    SHA1

    d66cf7e028ef6c7b4361cd58bd6ce73bc62557aa

    SHA256

    af036a8fc3d84838ad5dab142a5f4dd6e939a083d1af9371af3ef3ae5428fd31

    SHA512

    352bb33a00d19f0310d31cfc26f66cfdb4bcdb24127f28384e1eaf9ac0b02a06d403a86e519894054e42bd6a9167536b1cff77ea27c6cced275860021e0ba943

  • C:\Program Files\WinRAR\WinRAR.exe

    Filesize

    3.2MB

    MD5

    d0b13a4155900291fffc4199d7a00173

    SHA1

    e238bc74de42670c3bbe9d0d317d07647d9389d0

    SHA256

    72a2899a23ee78bc8059ecbf81cfdc1003a401e460ece5bbf54a47a3cd392b8c

    SHA512

    41973232528fc09407aba3000fb433c7f9855b63ee83f4a20faf9bfb7554e2f0cf894f9350b7531d620bca67856728c6e39c7ad4b2bff2b0357d14991e3e448e