File name:

WhatsApp-Key-DB-Extractor-master.zip

Full analysis: https://app.any.run/tasks/4d6cbc79-c02f-4d02-b96d-5d001e3c9f87
Verdict: Malicious activity
Analysis date: January 20, 2021, 16:22:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

0769154334E022047C0A23D93E3CEF8A

SHA1:

551761662BFE233D1109C810BFCC6F640F10C76C

SHA256:

BEB32B7494D9BE95AF90219E1CA73209808C55AD4FA6AAEFF539B8FB1C4F4FE2

SSDEEP:

196608:WsKmk9D8czVbuBtuKL58BzP6gbCzK9xgaqRtfUXLY:p7kTsbugVgecY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3352)
      • adb.exe (PID: 2196)
      • adb.exe (PID: 184)
      • adb.exe (PID: 3472)
      • adb.exe (PID: 3152)
    • Application was dropped or rewritten from another process

      • adb.exe (PID: 184)
      • adb.exe (PID: 3152)
      • adb.exe (PID: 3472)
      • adb.exe (PID: 2196)
  • SUSPICIOUS

    • Drops a file with too old compile date

      • WinRAR.exe (PID: 2800)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2800)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2800)
    • Application launched itself

      • adb.exe (PID: 3472)
  • INFO

    • Manual execution by user

      • cmd.exe (PID: 528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2016:10:20 19:26:21
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: WhatsApp-Key-DB-Extractor-master/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
7
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs cmd.exe no specs adb.exe adb.exe adb.exe adb.exe

Process information

PID
CMD
Path
Indicators
Parent process
184adb fork-server serverC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
adb.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
528cmd /c ""C:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2196bin\adb.exe kill-serverC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2800"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\WhatsApp-Key-DB-Extractor-master.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3152bin\adb.exe wait-for-deviceC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3352"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3472bin\adb.exe start-serverC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\adb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\users\admin\desktop\whatsapp-key-db-extractor-master\bin\adbwinapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
809
Read events
783
Write events
26
Delete events
0

Modification events

(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2800) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\WhatsApp-Key-DB-Extractor-master.zip
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2800) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(2800) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
Executable files
11
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.shtext
MD5:515A7665B7FE56A06321BF1B476BC64C
SHA256:EAD787560DD1ED45A6B2BC6EB386C3C65C243327BD29101827EB445A0DD0F57C
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\WhatsAppKeyDBExtract.battext
MD5:3DB1F0D41705EF3B05C904B0FEBAC7DD
SHA256:DF01839C8E0760970779B821D3FBAD8FDD8D5DCE498DD65DC1136BFD29465685
184adb.exeC:\Users\admin\.android\adbkey.pubtext
MD5:
SHA256:
184adb.exeC:\Users\admin\.android\adbkeytext
MD5:
SHA256:
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\README.mdtext
MD5:515EDD3D594543F2FDB8E0756CD8506F
SHA256:9766FFC6464ED3096E3448BE1E9F8949D9A7F6FB522C644709DA4EDF6CE33108
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\pcre3.dllexecutable
MD5:57CAC848FA14AE38F14F9441F8933282
SHA256:8861AAAF4C65EB975B927292F7283BF1AEACDAE8428700E81DDFD0FA2C379D62
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\abe.jarjava
MD5:769FC4D3934E923EA115BABEA0580999
SHA256:E73E465F1371DF55838B842CC184EB6AECB225C90AB2B33DDA9F39787472483F
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\tar.exeexecutable
MD5:AE84767ABEC5A769B0C7CB5A356D74C5
SHA256:7D33F24AE4C7B3024D5CEC2A31420BE857F0E547DE8971DD6DEA169119D4F348
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\bin\libintl3.dllexecutable
MD5:D202BAA425176287017FFE1FB5D1B77C
SHA256:F48CE1866602B114E653C876334B771107559ACF1C685373D2305034613958F0
2800WinRAR.exeC:\Users\admin\Desktop\WhatsApp-Key-DB-Extractor-master\extracted\.placeholderbinary
MD5:68B329DA9893E34099C7D8AD5CB9C940
SHA256:01BA4719C80B6FE911B091A7C05124B64EEECE964E09C058EF8F9805DACA546B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info