analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

RW.rar

Full analysis: https://app.any.run/tasks/36f0eb5d-34f8-45a8-a148-a632e4d588c5
Verdict: Malicious activity
Analysis date: June 19, 2019, 14:34:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

2C65DA7DB8D78C9C024E8C8E4853530C

SHA1:

230FF8449F35C12317F22B996A50BCB4083B5CFC

SHA256:

7FF71E4E853DF009F93A0E174EADBFD1E419C6A86F8FEBA2289FD7625E23BC3A

SSDEEP:

98304:vGayOq9LV6tJLaGSarg1wAGxH042kQrYpveZbTFgRe:6n6vLaGmGxHckQrfRTqRe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • RemoveWAT.2.2.7.0.exe (PID: 1028)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2796)
      • schtasks.exe (PID: 3936)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2104)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • RemoveWAT.2.2.7.0.exe (PID: 1028)
      • cmd.exe (PID: 3536)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3544)
    • Creates files in the Windows directory

      • RemoveWAT.2.2.7.0.exe (PID: 1028)
      • wusa.exe (PID: 1700)
    • Executed via COM

      • DrvInst.exe (PID: 1952)
    • Executed as Windows Service

      • vssvc.exe (PID: 3632)
    • Removes files from Windows directory

      • RemoveWAT.2.2.7.0.exe (PID: 1028)
    • Uses ICACLS.EXE to modify access control list

      • cmd.exe (PID: 2520)
      • cmd.exe (PID: 2532)
      • cmd.exe (PID: 304)
    • Starts CMD.EXE for commands execution

      • RemoveWAT.2.2.7.0.exe (PID: 1028)
  • INFO

    • Manual execution by user

      • RemoveWAT.2.2.7.0.exe (PID: 1028)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

ArchivedFileName: phanmem47.com--RemoveWAT.2.2.7\RemoveWAT.2.2.7.0.exe
PackingMethod: Normal
ModifyDate: 2010:09:20 13:05:28
OperatingSystem: Win32
UncompressedSize: 6664704
CompressedSize: 3937517
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
24
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe removewat.2.2.7.0.exe taskkill.exe no specs wusa.exe no specs vssvc.exe no specs drvinst.exe no specs cmd.exe no specs taskkill.exe no specs taskkill.exe no specs cmd.exe no specs takeown.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs takeown.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs schtasks.exe no specs schtasks.exe no specs cmd.exe no specs takeown.exe no specs icacls.exe no specs icacls.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3544"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RW.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
1028"C:\Users\admin\Desktop\phanmem47.com--RemoveWAT.2.2.7\RemoveWAT.2.2.7.0.exe" C:\Users\admin\Desktop\phanmem47.com--RemoveWAT.2.2.7\RemoveWAT.2.2.7.0.exe
explorer.exe
User:
admin
Company:
Hazar & Co.
Integrity Level:
HIGH
Description:
RemoveWAT
Version:
2.2.6.0
2152"C:\Windows\System32\taskkill.exe" /f /im explorer.exeC:\Windows\System32\taskkill.exeRemoveWAT.2.2.7.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1700"C:\Windows\system32\wusa.exe" "C:\Windows\wat.MSU" /quiet C:\Windows\system32\wusa.exeRemoveWAT.2.2.7.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Standalone Installer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3632C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1952DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot18" "" "" "6792c44eb" "00000000" "000005C4" "00000580"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3536"C:\Windows\System32\cmd.exe" /c taskkill /f /im WatAdminSvc.exe & taskkill /f /im WatUX.exeC:\Windows\System32\cmd.exeRemoveWAT.2.2.7.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
128
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2344taskkill /f /im WatAdminSvc.exe C:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1460taskkill /f /im WatUX.exeC:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
304"C:\Windows\System32\cmd.exe" /c takeown /f "C:\Windows\System32\Wat\WatAdminSvc.exe" & icacls "C:\Windows\System32\Wat\WatAdminSvc.exe" /reset & icacls "C:\Windows\System32\Wat\WatAdminSvc.exe" /deny *S-1-1-0:(X)C:\Windows\System32\cmd.exeRemoveWAT.2.2.7.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
768
Read events
612
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
4
Text files
130
Unknown types
1

Dropped files

PID
Process
Filename
Type
1700wusa.exeC:\9db1f398289f13d73ce10aaec23f\$dpx$.tmp\17957a4cc808414ebcd3069f6c664ab5.tmp
MD5:
SHA256:
1700wusa.exeC:\9db1f398289f13d73ce10aaec23f\$dpx$.tmp\26b5c2e43a1c6846ad39bf7ed5ead212.tmp
MD5:
SHA256:
1700wusa.exeC:\9db1f398289f13d73ce10aaec23f\$dpx$.tmp\59d824e80d1bdb44a6168c2103111335.tmp
MD5:
SHA256:
1700wusa.exeC:\9db1f398289f13d73ce10aaec23f\$dpx$.tmp\a3278428233d2144b92e74ad2db77cba.tmp
MD5:
SHA256:
1952DrvInst.exeC:\Windows\INF\setupapi.dev.logini
MD5:D82D9CE0AB3C5AFC0E0E38D0827BFD67
SHA256:AB2AEFC34EC8391F76404CEFD924821EA2B73447D4B02D508D549F0536D7D19E
1700wusa.exeC:\9db1f398289f13d73ce10aaec23f\WSUSSCAN.cabcompressed
MD5:63B344025100243B997D5E2756A11F7A
SHA256:9B3FC7CAC1E02935F5D59D96D76844780DCCAE81CCC275FB0847A81E5BDB8594
1952DrvInst.exeC:\Windows\INF\setupapi.ev3binary
MD5:76DCC60F78B3DFF1AE3627619074F465
SHA256:18541AC1875315C4F9EFF75050C574FAFF83717C029DAE6B366F9C6C3F0C19E0
1952DrvInst.exeC:\Windows\INF\setupapi.ev1binary
MD5:57D02ECB849B7CB0CE2648B9338292E1
SHA256:E40A4335A0A1A34499F59103B669413734508B843F26192B1E2B950958178EF5
1700wusa.exeC:\9db1f398289f13d73ce10aaec23f\Windows6.1-KB971033-x86-pkgProperties.txttext
MD5:2A935916F7EA88AA5EE735B1775C228E
SHA256:D71B35046C13D0638ADBC20F5D9835E5E363AE685E23CECC3A47E66C79510337
3544WinRAR.exeC:\Users\admin\Desktop\phanmem47.com--RemoveWAT.2.2.7\RemoveWAT.2.2.7.0.exeexecutable
MD5:BFACF78644CA41FD6D4B23976E7574A1
SHA256:94A1A26F61B015C2CED2FD50BDBA4070B6C9AEC7D2938FBF7EB9E99960D3B7A9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info