File name:

lcFGnjYe2QlfWRaCZBbTzO.zip

Full analysis: https://app.any.run/tasks/20827437-0e35-4db7-926b-c4c808ba4121
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: December 18, 2018, 15:14:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
addrop
pup
installcore
trojan
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

37170BFF36921D8A5BA44CDFF4E52729

SHA1:

614B85A7D72851DA289F95AA16BB19C191497F1B

SHA256:

153D21F86ADD500EE0D5581EB7B4D7B2280DAFA327377013B744AEB79D407173

SSDEEP:

24576:UMd0/VEUYT4ym7PiwT6tgCLxttEARCFYRqRvxJFgVFEADkVSDd3cMld:UMK9EUQ477PiC6GCL3K8qRvxjmbDkuhH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2816)
      • avgSetup.exe (PID: 1904)
      • uninstaller.exe (PID: 3720)
      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3884)
      • instup.exe (PID: 3656)
      • Update.exe (PID: 3168)
      • sbr.exe (PID: 2808)
      • Update.exe (PID: 2560)
      • SetupInf.exe (PID: 3508)
      • SetupInf.exe (PID: 2172)
      • SetupInf.exe (PID: 3688)
      • AvEmUpdate.exe (PID: 2372)
      • SetupInf.exe (PID: 3800)
      • AvEmUpdate.exe (PID: 2512)
      • AvEmUpdate.exe (PID: 3400)
      • aswRunDll.exe (PID: 3484)
      • Update.exe (PID: 3144)
      • Update.exe (PID: 3728)
      • Squirrel.exe (PID: 3536)
      • Update.exe (PID: 1784)
      • AvEmUpdate.exe (PID: 624)
      • overseer.exe (PID: 2856)
      • Update.exe (PID: 3948)
      • Update.exe (PID: 3028)
      • instup.exe (PID: 2432)
      • instup.exe (PID: 3636)
      • Update.exe (PID: 2324)
      • AVGSvc.exe (PID: 2828)
      • AvEmUpdate.exe (PID: 3608)
      • aswOfferTool.exe (PID: 2768)
      • instup.exe (PID: 3668)
      • AVGUI.exe (PID: 3156)
      • wsc_proxy.exe (PID: 2688)
      • aswidsagent.exe (PID: 556)
      • Squirrel.exe (PID: 4036)
      • Update.exe (PID: 1248)
      • Update.exe (PID: 1976)
      • Update.exe (PID: 3160)
      • WhatsApp_ExecutionStub.exe (PID: 3812)
      • RegSvr.exe (PID: 928)
      • RegSvr.exe (PID: 3200)
      • RegSvr.exe (PID: 3888)
      • Update.exe (PID: 3940)
      • Update.exe (PID: 648)
      • Update.exe (PID: 1744)
    • ADDROP was detected

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
    • Connects to CnC server

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • uninstaller.exe (PID: 3720)
    • INSTALLCORE was detected

      • uninstaller.exe (PID: 3720)
    • Loads dropped or rewritten executable

      • instup.exe (PID: 3656)
      • instup.exe (PID: 3884)
      • WhatsApp.exe (PID: 920)
      • WhatsApp.exe (PID: 2168)
      • WhatsApp.exe (PID: 3312)
      • WhatsApp.exe (PID: 3588)
      • WhatsApp.exe (PID: 3916)
      • AvEmUpdate.exe (PID: 2372)
      • WhatsApp.exe (PID: 2268)
      • AvEmUpdate.exe (PID: 2512)
      • AvEmUpdate.exe (PID: 3400)
      • RegSvr.exe (PID: 3200)
      • RegSvr.exe (PID: 928)
      • AvEmUpdate.exe (PID: 624)
      • aswRunDll.exe (PID: 3484)
      • AVGSvc.exe (PID: 2828)
      • instup.exe (PID: 3636)
      • AvEmUpdate.exe (PID: 3608)
      • AVGUI.exe (PID: 3156)
      • WhatsApp.exe (PID: 1752)
      • WhatsApp.exe (PID: 2652)
      • aswOfferTool.exe (PID: 2768)
      • aswidsagent.exe (PID: 556)
      • WhatsApp.exe (PID: 3604)
      • instup.exe (PID: 2432)
      • instup.exe (PID: 3668)
      • WhatsApp.exe (PID: 1676)
      • WhatsApp.exe (PID: 2840)
      • WhatsApp_ExecutionStub.exe (PID: 3812)
      • WhatsApp.exe (PID: 3264)
      • WhatsApp.exe (PID: 4032)
      • WhatsApp.exe (PID: 4064)
      • WhatsApp.exe (PID: 2300)
      • WhatsApp.exe (PID: 3512)
    • Downloads executable files from the Internet

      • avgSetup.exe (PID: 1904)
      • AvEmUpdate.exe (PID: 2512)
    • Changes the autorun value in the registry

      • instup.exe (PID: 3656)
      • instup.exe (PID: 3636)
    • Loads the Task Scheduler COM API

      • AvEmUpdate.exe (PID: 2372)
      • AvEmUpdate.exe (PID: 2512)
      • overseer.exe (PID: 2856)
      • AvEmUpdate.exe (PID: 3608)
      • aswidsagent.exe (PID: 556)
      • AVGSvc.exe (PID: 2828)
    • Changes settings of System certificates

      • AVGSvc.exe (PID: 2828)
  • SUSPICIOUS

    • Application launched itself

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2816)
      • cmd.exe (PID: 1420)
      • cmd.exe (PID: 3016)
      • WhatsApp.exe (PID: 3588)
      • WhatsApp.exe (PID: 3312)
      • AvEmUpdate.exe (PID: 2512)
      • WhatsApp.exe (PID: 1752)
      • WhatsApp.exe (PID: 1676)
      • WhatsApp.exe (PID: 4064)
    • Reads the machine GUID from the registry

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
    • Reads Windows Product ID

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
    • Creates files in the user directory

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • uninstaller.exe (PID: 3720)
      • WhatsApp.exe (PID: 2168)
      • Update.exe (PID: 2560)
      • WhatsApp.exe (PID: 3588)
      • Update.exe (PID: 1248)
      • WhatsApp.exe (PID: 1676)
    • Reads CPU info

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • AVGSvc.exe (PID: 2828)
      • AVGUI.exe (PID: 3156)
    • Reads Environment values

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • Update.exe (PID: 3168)
      • Update.exe (PID: 1784)
      • Update.exe (PID: 3144)
      • AVGUI.exe (PID: 3156)
    • Reads internet explorer settings

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • uninstaller.exe (PID: 3720)
    • Reads the date of Windows installation

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • AVGSvc.exe (PID: 2828)
    • Starts CMD.EXE for commands execution

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • cmd.exe (PID: 3016)
      • cmd.exe (PID: 1420)
    • Executable content was dropped or overwritten

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • cmd.exe (PID: 2888)
      • cmd.exe (PID: 2808)
      • uninstaller.exe (PID: 3720)
      • avgSetup.exe (PID: 1904)
      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3884)
      • 228656-691348-whatsapp-for-pc.exe (PID: 2804)
      • Update.exe (PID: 3168)
      • Squirrel.exe (PID: 3536)
      • instup.exe (PID: 3656)
      • WhatsApp.exe (PID: 3312)
      • AvEmUpdate.exe (PID: 2512)
      • AVGSvc.exe (PID: 2828)
      • instup.exe (PID: 3636)
      • AvEmUpdate.exe (PID: 3608)
      • aswOfferTool.exe (PID: 2768)
      • WhatsApp.exe (PID: 1752)
      • Update.exe (PID: 3144)
      • WhatsApp.exe (PID: 4064)
      • WhatsApp.exe (PID: 1676)
    • Creates files in the Windows directory

      • avgSetup.exe (PID: 1904)
      • instup.exe (PID: 3656)
      • AVGSvc.exe (PID: 2828)
      • keytool.exe (PID: 3216)
      • keytool.exe (PID: 2824)
    • Low-level read access rights to disk partition

      • avgSetup.exe (PID: 1904)
      • instup.exe (PID: 3884)
      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3656)
      • AvEmUpdate.exe (PID: 2512)
      • AvEmUpdate.exe (PID: 624)
      • AvEmUpdate.exe (PID: 3400)
      • AVGSvc.exe (PID: 2828)
      • wsc_proxy.exe (PID: 2688)
      • overseer.exe (PID: 2856)
      • instup.exe (PID: 3636)
      • AvEmUpdate.exe (PID: 3608)
      • AVGUI.exe (PID: 3156)
      • instup.exe (PID: 3668)
      • aswidsagent.exe (PID: 556)
      • instup.exe (PID: 2432)
    • Creates files in the program directory

      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3884)
      • AvEmUpdate.exe (PID: 2512)
      • instup.exe (PID: 3656)
      • wsc_proxy.exe (PID: 2688)
      • instup.exe (PID: 2432)
      • AvEmUpdate.exe (PID: 3608)
      • AVGUI.exe (PID: 3156)
      • aswOfferTool.exe (PID: 2768)
      • AVGSvc.exe (PID: 2828)
      • aswidsagent.exe (PID: 556)
      • instup.exe (PID: 3636)
      • instup.exe (PID: 3668)
    • Creates a software uninstall entry

      • uninstaller.exe (PID: 3720)
      • instup.exe (PID: 3656)
      • Update.exe (PID: 3168)
      • Update.exe (PID: 3144)
    • Starts itself from another location

      • instup.exe (PID: 3884)
    • Uses REG.EXE to modify Windows registry

      • WhatsApp.exe (PID: 2168)
      • WhatsApp.exe (PID: 3588)
      • WhatsApp.exe (PID: 1752)
    • Modifies the open verb of a shell class

      • reg.exe (PID: 4040)
      • reg.exe (PID: 2568)
      • instup.exe (PID: 3656)
    • Creates COM task schedule object

      • instup.exe (PID: 3656)
      • RegSvr.exe (PID: 3200)
      • RegSvr.exe (PID: 3888)
      • RegSvr.exe (PID: 928)
    • Creates or modifies windows services

      • instup.exe (PID: 3656)
    • Creates files in the driver directory

      • instup.exe (PID: 3656)
    • Reads the cookies of Google Chrome

      • instup.exe (PID: 3656)
      • AVGUI.exe (PID: 3156)
    • Reads the cookies of Mozilla Firefox

      • instup.exe (PID: 3656)
      • AVGUI.exe (PID: 3156)
    • Reads Internet Cache Settings

      • instup.exe (PID: 3656)
      • AVGUI.exe (PID: 3156)
    • Removes files from Windows directory

      • AVGSvc.exe (PID: 2828)
    • Searches for installed software

      • AVGSvc.exe (PID: 2828)
      • Update.exe (PID: 3144)
      • AVGUI.exe (PID: 3156)
    • Reads Microsoft Outlook installation path

      • AVGSvc.exe (PID: 2828)
    • Reads the computer name

      • AVGSvc.exe (PID: 2828)
  • INFO

    • Changes settings of System certificates

      • chrome.exe (PID: 4088)
    • Application launched itself

      • chrome.exe (PID: 4088)
    • Reads settings of System Certificates

      • chrome.exe (PID: 4088)
      • Update.exe (PID: 3168)
      • Update.exe (PID: 3144)
      • AVGSvc.exe (PID: 2828)
      • WhatsApp.exe (PID: 1676)
    • Adds / modifies Windows certificates

      • chrome.exe (PID: 4088)
    • Dropped object may contain Bitcoin addresses

      • instup.exe (PID: 3656)
      • instup.exe (PID: 3636)
    • Reads Microsoft Office registry keys

      • AVGUI.exe (PID: 3156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2018:12:18 11:07:04
ZipCRC: 0xbec0bee9
ZipCompressedSize: 1303498
ZipUncompressedSize: 1332968
ZipFileName: installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
96
Malicious processes
39
Suspicious processes
5

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe no specs installer_whatsapp_para_pc_0_2_2732__32_bit_.exe no specs #ADDROP installer_whatsapp_para_pc_0_2_2732__32_bit_.exe cmd.exe no specs timeout.exe no specs cmd.exe no specs timeout.exe no specs cmd.exe cmd.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs avgsetup.exe #INSTALLCORE uninstaller.exe avg_antivirus_free_setup.exe instup.exe instup.exe sbr.exe no specs chrome.exe explorer.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs 228656-691348-whatsapp-for-pc.exe update.exe squirrel.exe whatsapp.exe no specs whatsapp.exe update.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs whatsapp.exe whatsapp.exe whatsapp.exe setupinf.exe no specs setupinf.exe no specs whatsapp.exe setupinf.exe no specs update.exe reg.exe no specs setupinf.exe no specs avemupdate.exe no specs avemupdate.exe avemupdate.exe avemupdate.exe regsvr.exe no specs update.exe no specs update.exe regsvr.exe no specs regsvr.exe no specs aswrundll.exe no specs overseer.exe avgsvc.exe update.exe no specs update.exe no specs wsc_proxy.exe no specs instup.exe instup.exe update.exe no specs unsecapp.exe no specs keytool.exe no specs keytool.exe no specs avemupdate.exe avgui.exe aswoffertool.exe instup.exe squirrel.exe no specs whatsapp.exe aswidsagent.exe whatsapp.exe reg.exe no specs whatsapp.exe no specs reg.exe no specs update.exe no specs whatsapp.exe no specs update.exe no specs whatsapp_executionstub.exe no specs update.exe no specs whatsapp.exe whatsapp.exe whatsapp.exe no specs update.exe no specs whatsapp.exe whatsapp.exe no specs whatsapp.exe update.exe no specs update.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
556"C:\Program Files\AVG\Antivirus\aswidsagent.exe"C:\Program Files\AVG\Antivirus\aswidsagent.exe
services.exe
User:
SYSTEM
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
SYSTEM
Description:
AVG Software Analyzer
Exit code:
0
Version:
18.8.4.1339
Modules
Images
c:\program files\avg\antivirus\aswidsagent.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
624AvEmUpdate.exe /installer1 /emupdater /applydll "C:\Program Files\AVG\Antivirus\Setup\fe2f42e9-3748-40c9-8c54-784562f34018.dll"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe
AvEmUpdate.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Emergency Update
Exit code:
0
Version:
18.8.4084.0
Modules
Images
c:\program files\avg\antivirus\avemupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
648C:\Users\admin\AppData\Local\WhatsApp\Update.exe --checkForUpdate https://web.whatsapp.com/desktop/windows/release/ia32?version=0.3.1649C:\Users\admin\AppData\Local\WhatsApp\Update.exeWhatsApp.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\whatsapp\update.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\program files\avg\antivirus\aswhookx.dl
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
920C:\Users\admin\AppData\Local\WhatsApp\app-0.2.2732\WhatsApp.exe --reporter-url=https://web-crashlog.whatsapp.net/upload.php --application-name=WhatsApp --v=1C:\Users\admin\AppData\Local\WhatsApp\app-0.2.2732\WhatsApp.exe
WhatsApp.exe
User:
admin
Company:
WhatsApp
Integrity Level:
MEDIUM
Description:
WhatsApp
Exit code:
0
Version:
1.4.2
Modules
Images
c:\users\admin\appdata\local\whatsapp\app-0.2.2732\whatsapp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\whatsapp\app-0.2.2732\node.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\psapi.dll
928"C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\aswAMSI.dll"C:\Program Files\AVG\Antivirus\RegSvr.exeinstup.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Antivirus Installer
Exit code:
0
Version:
18.8.4084.0
Modules
Images
c:\program files\avg\antivirus\regsvr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1024cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D39016406360932.dat"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1204C:\Windows\system32\reg.exe ADD HKCU\Software\Classes\whatsapp /fC:\Windows\system32\reg.exeWhatsApp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1248C:\Users\admin\AppData\Local\WhatsApp\Update.exe --createShortcut=WhatsApp.exe --shortcut-locations=StartMenuC:\Users\admin\AppData\Local\WhatsApp\Update.exeWhatsApp.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\whatsapp\update.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1420/d /c TIMEOUT 1 & cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D85911679986161.dat"+"C:\Users\admin\AppData\Local\Temp\D85911679986162.dat" "C:\Users\admin\AppData\Local\Temp\in7E200845\754ECA65_stp\uninstaller.exe" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D85911679986161.dat" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D85911679986162.dat"C:\Windows\system32\cmd.exeinstaller_whatsapp_para_pc_0_2_2732__32_bit_.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1676"C:\Users\admin\AppData\Local\WhatsApp\app-0.3.1649\WhatsApp.exe" C:\Users\admin\AppData\Local\WhatsApp\app-0.3.1649\WhatsApp.exe
Update.exe
User:
admin
Company:
WhatsApp
Integrity Level:
MEDIUM
Description:
WhatsApp
Exit code:
0
Version:
0.3.1649
Modules
Images
c:\users\admin\appdata\local\whatsapp\app-0.3.1649\whatsapp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\avg\antivirus\aswhookx.dl
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\whatsapp\app-0.3.1649\node.dll
c:\windows\system32\psapi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
Total events
14 360
Read events
8 437
Write events
5 902
Delete events
21

Modification events

(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3524) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\lcFGnjYe2QlfWRaCZBbTzO.zip
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3524) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
676
Suspicious files
515
Text files
794
Unknown types
155

Dropped files

PID
Process
Filename
Type
3524WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3524.9058\installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
MD5:
SHA256:
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\0013DF18.log
MD5:
SHA256:
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_positions.scsstext
MD5:D70EE316E26374F839174916490E937E
SHA256:3AFFBAEB6F57451FAF94CA9CBCAB2504EF75DF0E8570AA7BE99DD52C9CECB8E7
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_visibility.scsstext
MD5:02061AEA75EAC76FFF1D2A8E9607D64C
SHA256:F32292CF3212F83814C985AA82F0F8A0E8DADA0AEE81CD7401AA3AAC08E45BC0
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_colors.scsstext
MD5:2DA278FBB61E370E0CC9F548E8154E1C
SHA256:857A73FC1DA7CF54525048AA60EC9E2F07328EE1D718A66E3B17186170BB5B5B
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_float.scsstext
MD5:BC5EB91B59A99E0FC439E02F80319975
SHA256:EAF9D36E3E75177E64090AC71C6FCF9BB6465CD21F5C0A5CCB05666033609DA8
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_typography.scsstext
MD5:0D6E99087615172921E0383B0BCE87D2
SHA256:A94BD2FB6595FAEA527116D8D8EE090FF74E89216EF3C9260F5F0B5BFA330E0E
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_margin.scsstext
MD5:E83D43D06045E990E910E494AEBAE8AE
SHA256:15484F9E0794F7526E5671615BCDBB436DC7F53012387821D2163CE59FA5E84B
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_backgrounds.scsstext
MD5:6092A3768F84CFBC6E5C52301F5B63EA
SHA256:8A22A3285F3C7D82AA1A4273BDD62729DA241723507C1ECD5D2FD0A24C12E23B
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_clearfix.scsstext
MD5:ADD166BC071472DC105F4734D2DCF0E2
SHA256:75EBE8B4A4CBBAC0EB4DE35B60972452B4526C56EEFB5186DD40A92C70773377
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
116
TCP/UDP connections
93
DNS requests
97
Threats
246

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
GET
301
104.27.136.111:80
http://median.mp3.es/uploads/installer_logos/programs/56/228656/65333.png
US
shared
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
HEAD
200
149.202.192.156:80
http://i_mp3-es_WhatsApp-para-PC-0-2-2732--32-bit.foramuinareqy.com/crawled_soft/2/2/idpf-mp300z4b8d2d6b7445358785154a7fa1034b68-ici-5889c16d992e22.71369822-chrome-idpf/228656-691348-whatsapp-for-pc.exe
FR
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
54.154.255.147:80
http://os.guarddownloadsapps.com/Vittalia_ns/
IE
binary
455 Kb
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
GET
200
146.185.27.53:80
http://img.guarddownloadsapps.com/img/Tavasat/15Feb17/v2/EN.png
GB
image
43.9 Kb
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
52.214.73.247:80
rp.guarddownloadsapps.com
Amazon.com, Inc.
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
54.154.81.16:80
info.guarddownloadsapps.com
Amazon.com, Inc.
IE
whitelisted
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
104.27.136.111:80
median.mp3.es
Cloudflare Inc
US
shared
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
104.27.136.111:443
median.mp3.es
Cloudflare Inc
US
shared
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
54.154.255.147:80
os.guarddownloadsapps.com
Amazon.com, Inc.
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
146.185.27.53:80
img.guarddownloadsapps.com
UK-2 Limited
GB
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
149.202.192.156:80
i_mp3-es_whatsapp-para-pc-0-2-2732--32-bit.foramuinareqy.com
OVH SAS
FR
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
185.59.222.146:80
cdneu.vittaliacdn.com
Datacamp Limited
NL
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
199.115.112.67:80
cdnus.vittaliacdn.com
Leaseweb USA, Inc.
US
malicious
1904
avgSetup.exe
172.217.168.46:80
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
rp.guarddownloadsapps.com
  • 52.214.73.247
  • 54.194.149.175
malicious
info.guarddownloadsapps.com
  • 54.154.81.16
  • 34.251.155.7
  • 52.209.116.64
malicious
median.mp3.es
  • 104.27.136.111
  • 104.27.137.111
unknown
os.guarddownloadsapps.com
  • 54.154.255.147
  • 52.30.154.50
malicious
img.guarddownloadsapps.com
  • 146.185.27.53
malicious
i_mp3-es_whatsapp-para-pc-0-2-2732--32-bit.foramuinareqy.com
  • 149.202.192.156
malicious
cdneu.vittaliacdn.com
  • 185.59.222.146
malicious
cdnus.vittaliacdn.com
  • 199.115.112.67
suspicious
www.google-analytics.com
  • 172.217.168.46
whitelisted
iavs9x.avg.u.avcdn.net
  • 72.247.178.18
  • 72.247.178.41
whitelisted

Threats

PID
Process
Class
Message
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Possible threat - .exe downloading with HEAD option
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
unknown
SURICATA IPv4 invalid checksum
24 ETPRO signatures available at the full report
Process
Message
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service_main.cc(76)] Session start. cmdline is [--reporter-url=https://web-crashlog.whatsapp.net/upload.php --application-name=WhatsApp --v=1]
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service.cc(142)] window handle is 00030180
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service.cc(284)] pipe name is \\.\pipe\WhatsApp Crash Service dumps at C:\Users\admin\AppData\Local\Temp\WhatsApp Crashes
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service.cc(288)] checkpoint is C:\Users\admin\AppData\Local\Temp\WhatsApp Crashes\crash_checkpoint.txt server is https://web-crashlog.whatsapp.net/upload.php maximum 128 reports/day reporter is electron-crash-service
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service_main.cc(92)] Ready to process crash requests
WhatsApp.exe
[920:1828:1218/151702:VERBOSE1:crash_service.cc(317)] client start. pid = 2168
WhatsApp.exe
[920:3064:1218/151703:VERBOSE1:crash_service.cc(325)] client end. pid = 2168
WhatsApp.exe
[920:3064:1218/151704:VERBOSE1:crash_service.cc(346)] zero clients. exiting
WhatsApp.exe
[920:3532:1218/151704:VERBOSE1:crash_service.cc(486)] session ending..
WhatsApp.exe
[920:3532:1218/151704:VERBOSE1:crash_service.cc(491)] clients connected :1 clients terminated :1 dumps serviced :0 dumps reported :0