AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
19 March 2026

SOC104 โ€“ Malware Detected (WinRAR False Positive Investigation)

by

๐Ÿง  Summary

This investigation was triggered by a SOC104 โ€“ Malware Detected alert involving the executable winrar600.exe.

Initial analysis suggested a potential malware detection; however, further investigation revealed that the file was downloaded from the official WinRAR website and exhibited no malicious behavior.

Threat intelligence (VirusTotal) showed only 1/70 detections, and dynamic analysis using AnyRun sandbox confirmed that the file behaved as a legitimate installer.

The alert was ultimately classified as a False Positive.


๐Ÿšจ Alert Overview


๐Ÿ–ฅ๏ธ Endpoint Information


๐Ÿ” Initial Findings

โš ๏ธ Despite limited telemetry, investigation continued using sandbox and network analysis.


๐ŸŒ Network Analysis

Raw Log

Attribute Value
Process chrome.exe
Parent Process explorer.exe
Request Method GET
URL https://www.win-rar.com/postdownload.html
Action Allowed

๐Ÿง  Analysis


๐ŸŒ Threat Intelligence โ€“ IP Analysis

IP Lookup

Field Value
IP Address 51.195.68.163
ISP OVH SAS
Country Germany
Hostname win-rar.com

๐Ÿ“Œ Intelligence Insight


๐Ÿงช Threat Intelligence โ€“ File Analysis

๐Ÿ”Ž VirusTotal (File Hash)

VT Result

Result Value
Detection Ratio 1 / 70
Verdict Likely Clean

๐Ÿง  Interpretation


๐Ÿงฌ Dynamic Analysis (AnyRun Sandbox)

AnyRun Analysis

๐Ÿ”Ž Observations

๐Ÿง  Process Activity

Process Name Description
winrar600.exe Main executable
explorer.exe Windows shell
chrome.exe Browser
slui.exe Windows licensing component

โœ”๏ธ All processes are legitimate


๐Ÿ“Š Behavioral Indicators

Indicator Status
Malicious File Download โŒ Not Detected
Suspicious Network Traffic โŒ Not Detected
Known Malicious Hash โŒ Not Detected
Sandbox Malicious Behavior โŒ Not Detected
Endpoint Visibility Limited

๐Ÿงพ Investigation Steps

  1. Reviewed alert metadata and file details
  2. Checked endpoint telemetry (process, CLI, browser)
  3. Identified download source from raw logs
  4. Verified URL legitimacy (win-rar.com)
  5. Performed VirusTotal hash analysis
  6. Observed low detection ratio (1/70)
  7. Executed file in AnyRun sandbox
  8. Confirmed absence of malicious behavior
  9. Correlated all findings
  10. Determined alert classification

๐Ÿšจ Incident Response Actions


๐Ÿ“Œ Final Verdict

Category Result
Malware Presence Not Detected
Threat Type Legitimate Software
Initial Vector User Download
Host Compromise Not Observed
Alert Classification False Positive
Incident Severity Low

๐Ÿ Conclusion

This alert represents a false positive detection involving a legitimate WinRAR installer.

Although initially flagged as malware, deeper analysis showed:

No evidence of compromise or malicious activity was found.

โš ๏ธ The only concern observed was endpoint agent downtime, which should be addressed to ensure full visibility in future incidents.


tags: