analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

wrar540.exe

Full analysis: https://app.any.run/tasks/799e0a1e-4658-4839-8ba2-230f293b7795
Verdict: Malicious activity
Analysis date: October 20, 2020, 09:32:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5D930FA790EED4B6C7DD22262A015723

SHA1:

211A19CA4EC3C7562C9844FE6C42E66A521B8BD4

SHA256:

E81BAA5C2D2771CBAD2D168ECF278F865DC2DE38983C6A169D583949375EA735

SSDEEP:

49152:/Dkie7RK2bx22GpCmYEtmE9T8RtiwcwBbo28T9holoPAGP:r87RK2b3G5YEtmE9T+UwcUq9h/AK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • CCleaner.exe (PID: 2264)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 3896)
  • SUSPICIOUS

    • Reads internet explorer settings

      • wrar540.exe (PID: 3892)
      • CCleaner.exe (PID: 3896)
    • Executable content was dropped or overwritten

      • wrar540.exe (PID: 3892)
    • Reads Internet Cache Settings

      • wrar540.exe (PID: 3892)
      • CCleaner.exe (PID: 3896)
    • Creates files in the program directory

      • wrar540.exe (PID: 3892)
    • Executed via Task Scheduler

      • CCleaner.exe (PID: 3896)
    • Low-level read access rights to disk partition

      • CCleaner.exe (PID: 3896)
    • Creates files in the user directory

      • CCleaner.exe (PID: 3896)
    • Starts Internet Explorer

      • CCleaner.exe (PID: 3896)
  • INFO

    • Manual execution by user

      • CCleaner.exe (PID: 2264)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 3896)
      • iexplore.exe (PID: 3380)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3512)
      • iexplore.exe (PID: 3380)
    • Application launched itself

      • iexplore.exe (PID: 3512)
    • Changes internet zones settings

      • iexplore.exe (PID: 3512)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3380)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3380)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3380)
    • Creates files in the user directory

      • iexplore.exe (PID: 3380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:08:14 21:15:59+02:00
PEType: PE32
LinkerVersion: 14
CodeSize: 186880
InitializedDataSize: 204800
UninitializedDataSize: -
EntryPoint: 0x1c445
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 14-Aug-2016 19:15:59
Detected languages:
  • English - United States
Debug artifacts:
  • D:\Projects\WinRAR\sfx\setup\build\sfxrar32\Release\sfxrar.pdb

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 14-Aug-2016 19:15:59
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0002D988
0x0002DA00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.70795
.rdata
0x0002F000
0x00009930
0x00009A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.13601
.data
0x00039000
0x0001F8A0
0x00000C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.26031
.gfids
0x00059000
0x000000F0
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.13823
.rsrc
0x0005A000
0x000068A0
0x00006A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.62086
.reloc
0x00061000
0x00001F48
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.63002

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.26297
1872
UNKNOWN
English - United States
RT_MANIFEST
2
4.38314
1384
UNKNOWN
English - United States
RT_ICON
3
3.38848
744
UNKNOWN
English - United States
RT_ICON
4
3.48636
296
UNKNOWN
English - United States
RT_ICON
7
3.11482
376
UNKNOWN
English - United States
RT_STRING
8
3.14988
436
UNKNOWN
English - United States
RT_STRING
9
3.16863
434
UNKNOWN
English - United States
RT_STRING
10
2.99727
326
UNKNOWN
English - United States
RT_STRING
11
3.06856
470
UNKNOWN
English - United States
RT_STRING
12
2.86396
214
UNKNOWN
English - United States
RT_STRING

Imports

COMCTL32.dll (delay-loaded)
KERNEL32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wrar540.exe no specs wrar540.exe ccleaner.exe no specs ccleaner.exe iexplore.exe no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3228"C:\Users\admin\AppData\Local\Temp\wrar540.exe" C:\Users\admin\AppData\Local\Temp\wrar540.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
3892"C:\Users\admin\AppData\Local\Temp\wrar540.exe" C:\Users\admin\AppData\Local\Temp\wrar540.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
9
2264"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeexplorer.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
5, 35, 0, 6210
3896"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
taskeng.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5, 35, 0, 6210
3512"C:\Program Files\Internet Explorer\iexplore.exe" http://www.piriform.com/ccleaner/update?a=0&v=5.35.6210&l=1033&o=6.1W3&t=4&au=1C:\Program Files\Internet Explorer\iexplore.exeCCleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3380"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3512 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
1 177
Read events
881
Write events
0
Delete events
0

Modification events

No data
Executable files
10
Suspicious files
92
Text files
81
Unknown types
45

Dropped files

PID
Process
Filename
Type
3896CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0Y4H3EDYEBN1ZEOB5MTP.temp
MD5:
SHA256:
3892wrar540.exeC:\Program Files\WinRAR\Uninstall.exeexecutable
MD5:510F4305CC45A210F2A05CB9BA750BA6
SHA256:83FD8CDD156F71FD761524B1AD9A8B2142FBB23412F468AC046F4FF7CFC3AE00
3892wrar540.exeC:\Program Files\WinRAR\UnRAR.exeexecutable
MD5:4611A5B3F70A8D6C40776E0BFA3B3F36
SHA256:ECAA09C596FC481273D535E0F192909E0558F3C7B2D98C992BEF3FFEFDEE5627
3892wrar540.exeC:\Program Files\WinRAR\Uninstall.lsttext
MD5:DC20A41DD5976945AD2FF6A742BC26DD
SHA256:548291EC78A04CB9B1606858A6913ECCF215C5B57F05E510EC82B4A1BDCFEF8C
3892wrar540.exeC:\Program Files\WinRAR\Rar.exeexecutable
MD5:DC0222F1E0868C3612A93BA2D83B99BE
SHA256:6BC4497B86DF521B413E4574F4CD4289C986348D2A69DA1945FF1A1784DB05DB
3896CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ed7a5cc3cca8d52a.customDestinations-msbinary
MD5:161E208EE77425919A9BCA3C847B5E71
SHA256:ECA7692D73BEE527E6BCC3BE23B4D6B43EEEE3CDF2CEFC5D34BD04A66D1F060B
3892wrar540.exeC:\Program Files\WinRAR\WinRAR.exeexecutable
MD5:707B31677CC218899C1F488BBDC5A7E9
SHA256:3C2364BF6C80DED47EC6ABB90B25568AFC89C79692886CC34DF5CF332B9ED706
3892wrar540.exeC:\Program Files\WinRAR\WhatsNew.txttext
MD5:9F49544A844B7652D5765EEF0A6028AE
SHA256:0D35A441F492BD5FC5A216B475DFF0193DA933E946E984E5D53649A12D215CA2
3892wrar540.exeC:\Program Files\WinRAR\Descript.iontext
MD5:73E2E911B7730A92C04298EC770B0AB6
SHA256:29BF0E22BA729921958BBE4DC42D8BF688CCCFBFEAC6EF68B79674023B05D01F
3892wrar540.exeC:\Program Files\WinRAR\Zip.SFXexecutable
MD5:75553E7D2FD421F3C0E89797CF64FC30
SHA256:D28535A5FE0A02DC89E09C8CA04F7C53CC8D199870DA3AB6268EEDC08CB38348
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
97
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3380
iexplore.exe
GET
301
151.101.0.64:80
http://www.piriform.com/ccleaner/update?a=0&v=5.35.6210&l=1033&o=6.1W3&t=4&au=1
US
whitelisted
3896
CCleaner.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDkbwjNvPLFRm7zMB3V80
US
der
1.49 Kb
whitelisted
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3896
CCleaner.exe
GET
301
151.101.0.64:80
http://www.piriform.com/auto?a=0&p=cc&v=5.35.6210&l=1033&lk=&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-HZ8S&o=6.1W3&au=1&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=00000000-0000-4000-8000-d6f7f2be5127
US
whitelisted
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3380
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3896
CCleaner.exe
GET
200
151.101.2.109:80
http://license.piriform.com/verify/?p=ccpro&c=cc&cv=5.35.6210&l=1033&lk=CJ9T-J7CU-SPNV-GWMB-WBEC&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-HZ8S&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=00000000-0000-4000-8000-d6f7f2be5127
US
text
14 b
whitelisted
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3380
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCOUTy4wn8XWggAAAAAWy8I
US
der
472 b
whitelisted
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAtb9ltrp%2FvQiykNkEU33uA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3896
CCleaner.exe
151.101.2.109:80
license.piriform.com
Fastly
US
suspicious
3896
CCleaner.exe
151.101.2.109:443
license.piriform.com
Fastly
US
suspicious
3896
CCleaner.exe
151.101.0.64:443
www.piriform.com
Fastly
US
whitelisted
3896
CCleaner.exe
151.101.0.64:80
www.piriform.com
Fastly
US
whitelisted
3896
CCleaner.exe
151.101.2.202:443
www.ccleaner.com
Fastly
US
suspicious
3896
CCleaner.exe
104.18.20.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared
3896
CCleaner.exe
104.18.21.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared
3380
iexplore.exe
151.101.0.64:80
www.piriform.com
Fastly
US
whitelisted
3380
iexplore.exe
151.101.2.202:443
www.ccleaner.com
Fastly
US
suspicious
3380
iexplore.exe
216.58.208.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.piriform.com
  • 151.101.0.64
  • 151.101.64.64
  • 151.101.128.64
  • 151.101.192.64
whitelisted
www.ccleaner.com
  • 151.101.2.202
  • 151.101.66.202
  • 151.101.130.202
  • 151.101.194.202
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
license.piriform.com
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
s1.pir.fm
  • 151.139.237.73
suspicious
www.google.com
  • 172.217.23.100
whitelisted
s7.addthis.com
  • 104.75.88.112
whitelisted
fonts.googleapis.com
  • 216.58.208.42
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
ocsp.pki.goog
  • 142.250.74.195
whitelisted

Threats

PID
Process
Class
Message
3380
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3380
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info