File name:

WhatsApp-Key-DB-Extractor-master.zip

Full analysis: https://app.any.run/tasks/4d6cbc79-c02f-4d02-b96d-5d001e3c9f87
Verdict: Malicious activity
Analysis date: January 20, 2021, 16:22:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

0769154334E022047C0A23D93E3CEF8A

SHA1:

551761662BFE233D1109C810BFCC6F640F10C76C

SHA256:

BEB32B7494D9BE95AF90219E1CA73209808C55AD4FA6AAEFF539B8FB1C4F4FE2

SSDEEP:

196608:WsKmk9D8czVbuBtuKL58BzP6gbCzK9xgaqRtfUXLY:p7kTsbugVgecY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3352)
      • adb.exe (PID: 184)
      • adb.exe (PID: 3152)
      • adb.exe (PID: 2196)
      • adb.exe (PID: 3472)
    • Application was dropped or rewritten from another process

      • adb.exe (PID: 3472)
      • adb.exe (PID: 184)
      • adb.exe (PID: 2196)
      • adb.exe (PID: 3152)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2800)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2800)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2800)
    • Application launched itself

      • adb.exe (PID: 3472)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2016:10:20 19:26:21
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: WhatsApp-Key-DB-Extractor-master/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
7
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs cmd.exe no specs adb.exe adb.exe adb.exe adb.exe

Process information

PID
CMD
Path
Indicators
Parent process
184adb fork-server serverC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
adb.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
528cmd /c ""C:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2196bin\adb.exe kill-serverC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2800"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\WhatsApp-Key-DB-Extractor-master.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3152bin\adb.exe wait-for-deviceC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3352"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3472bin\adb.exe start-serverC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
809
Read events
783
Write events
26
Delete events
0

Modification events

(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2800) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\WhatsApp-Key-DB-Extractor-master.zip
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2800) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
Executable files
11
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\AdbWinUsbApi.dllexecutable
MD5:5F23F2F936BDFAC90BB0A4970AD365CF
SHA256:041C6859BB4FC78D3A903DD901298CD1ECFB75B6BE0646B74954CD722280A407
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.shtext
MD5:515A7665B7FE56A06321BF1B476BC64C
SHA256:EAD787560DD1ED45A6B2BC6EB386C3C65C243327BD29101827EB445A0DD0F57C
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.ps1text
MD5:C3C92A57CA5ABC0ED497E0BFEDCA1E7C
SHA256:E5A7A8FE70AEA53B84D013DFBF1D7D2353EF4583F39D86713235F0639A9E90F7
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\libintl3.dllexecutable
MD5:D202BAA425176287017FFE1FB5D1B77C
SHA256:F48CE1866602B114E653C876334B771107559ACF1C685373D2305034613958F0
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\curl.exeexecutable
MD5:E87C7A33BB6802C39D1905622BBDC80C
SHA256:632CC16CE51CF77F342BA60035749B496A80738334ADD769253474A506910960
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exeexecutable
MD5:C4BE24DF324EE7892EFA1FA1871B9BC0
SHA256:AD5D27384D1B5BCEB6342BB3204FEE977217422BCAFD252AB18F763A3DE43931
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\libiconv2.dllexecutable
MD5:E0DC8C6BBC787B972A9A468648DBFD85
SHA256:6DEEDAD652BFAB7B09EBD0E06045810390B6AC6CB5AA9EF41C9DAA5616181F22
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\regex2.dllexecutable
MD5:547C43567AB8C08EB30F6C6BACB479A3
SHA256:3A71BF90E8BDDFB813B44F9CBCECF431311A7979C1DEBC976767B3E5E59031AF
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\abe.jarjava
MD5:769FC4D3934E923EA115BABEA0580999
SHA256:E73E465F1371DF55838B842CC184EB6AECB225C90AB2B33DDA9F39787472483F
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.battext
MD5:3DB1F0D41705EF3B05C904B0FEBAC7DD
SHA256:DF01839C8E0760970779B821D3FBAD8FDD8D5DCE498DD65DC1136BFD29465685
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info