File name:

HWID Spoofer.rar

Full analysis: https://app.any.run/tasks/dac61a2e-98c7-4d61-b89e-3f588fc265ea
Verdict: Suspicious activity
Analysis date: June 30, 2019, 06:10:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

87B831401529F395A4F5117EB7F0C637

SHA1:

B7A6ABF24A0C2292B76999A447253F0EF2E006B3

SHA256:

BAAE3127ACF477FAFA20BCBF3F3D6D63C73CB541236844841708136BEA574D4E

SSDEEP:

24576:EfX/EzLtwSE3SEZs+VuJFtBqmtGJrGyhxGnY33Lr6XnQqW7gV+gkiWx8V8NBWL8p:WiBEZJojtGMyhxn3/QV+gxWx8V8N4L8p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MAC Changer.exe (PID: 3616)
      • OOF.exe (PID: 2548)
      • MAC Changer.exe (PID: 3892)
    • Loads dropped or rewritten executable

      • MAC Changer.exe (PID: 3616)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1812)
    • Starts CMD.EXE for commands execution

      • MAC Changer.exe (PID: 3616)
    • Uses NETSH.EXE for network configuration

      • cmd.exe (PID: 3512)
      • cmd.exe (PID: 3624)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 1812)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
10
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe oof.exe no specs mac changer.exe no specs mac changer.exe cmd.exe no specs getmac.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
388netsh interface set interface Wi-Fi disabledC:\Windows\system32\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1812"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\HWID Spoofer.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2548"C:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\OOF.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\OOF.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
WindowsApp1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1812.5493\hwid spoofer\oof.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2732netsh interface set interface Wi-Fi enabledC:\Windows\system32\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2912getmacC:\Windows\system32\getmac.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Displays NIC MAC information
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\getmac.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\mpr.dll
3192"C:\Windows\System32\cmd.exe" /k getmacC:\Windows\System32\cmd.exeMAC Changer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225786
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3512"C:\Windows\System32\cmd.exe" /c netsh interface set interface Wi-Fi disabledC:\Windows\System32\cmd.exeMAC Changer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3616"C:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\MAC Changer.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\MAC Changer.exe
OOF.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApp1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1812.5493\hwid spoofer\mac changer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3624"C:\Windows\System32\cmd.exe" /c netsh interface set interface Wi-Fi enabledC:\Windows\System32\cmd.exeMAC Changer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3892"C:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\MAC Changer.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\MAC Changer.exeOOF.exe
User:
admin
Integrity Level:
MEDIUM
Description:
WindowsFormsApp1
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1812.5493\hwid spoofer\mac changer.exe
c:\systemroot\system32\ntdll.dll
Total events
1 046
Read events
904
Write events
142
Delete events
0

Modification events

(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1812) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HWID Spoofer.rar
(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1812) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1812) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(1812) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
11
Suspicious files
0
Text files
4
Unknown types
1

Dropped files

PID
Process
Filename
Type
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\Cleaner.battext
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\drvmap.exeexecutable
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\capcom.libobj
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\Easy.txttext
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\EAC.exeexecutable
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\MAC Changer.exeexecutable
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\loop.battext
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\IP.battext
MD5:
SHA256:
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\Bunifu_UI_v1.5.3.dllexecutable
MD5:2ECB51AB00C5F340380ECF849291DBCF
SHA256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
1812WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1812.5493\HWID Spoofer\DK2.exeexecutable
MD5:BB36D4578CE201DC932AB6BBC079875C
SHA256:4C831252AA6F193C4474BA74F352BEE7D00099DFAF5AC6E98AB1253E21999B4A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info