File name:

45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.7z

Full analysis: https://app.any.run/tasks/f487196a-9a8b-4f3e-95b1-c1f65bf59de4
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 01, 2023, 19:24:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

4DB4BD0030F473332E93C68A55E0D5AF

SHA1:

B195FC8FF8CA0141B992D09EA742E6299D51E4CB

SHA256:

0045EF27812AB121324497770A831F393D7817948B194A4042221C8A2811B64B

SSDEEP:

3072:nUsEN5ouIl4PhvYLtPlHnJF7XTfSwg+sR3N6q:IN5gyhYtPJnJpXQ+a3V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 3336)
    • Renames files like ransomware

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Drops the executable file immediately after the start

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
  • SUSPICIOUS

    • Write to the desktop.ini file (may be used to cloak folders)

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Changes the desktop background image

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Creates files like ransomware instruction

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Starts application with an unusual extension

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3060)
      • WinRAR.exe (PID: 3936)
      • WinRAR.exe (PID: 3084)
      • WinRAR.exe (PID: 4020)
      • WinRAR.exe (PID: 3668)
    • Manual execution by a user

      • 45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe (PID: 3264)
      • WinRAR.exe (PID: 4020)
      • WinRAR.exe (PID: 3084)
      • WinRAR.exe (PID: 3936)
      • WinRAR.exe (PID: 3668)
      • 80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.exe (PID: 3652)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2924)
      • wmpnscfg.exe (PID: 1560)
    • Checks supported languages

      • 45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe (PID: 3264)
      • wmpnscfg.exe (PID: 1560)
      • 80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.exe (PID: 3652)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2924)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
      • 578B.tmp (PID: 3196)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1560)
      • 45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe (PID: 3264)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2924)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Reads the machine GUID from the registry

      • 45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe (PID: 3264)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2924)
      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Checks transactions between databases Windows and Oracle

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2924)
    • Creates files in the program directory

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
    • Dropped object may contain TOR URL's

      • 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe (PID: 2112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs 45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe wmpnscfg.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs 80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.exe 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe no specs CMSTPLUA no specs 87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe no specs 578b.tmp no specs

Process information

PID
CMD
Path
Indicators
Parent process
1560"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2112"C:\Users\admin\Desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe" C:\Users\admin\Desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exedllhost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
2924"C:\Users\admin\Desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe" C:\Users\admin\Desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
3060"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3084"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.7z" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3196"C:\ProgramData\578B.tmp"C:\ProgramData\578B.tmp87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\programdata\578b.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
3264"C:\Users\admin\Desktop\45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe" C:\Users\admin\Desktop\45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
3336C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3652"C:\Users\admin\Desktop\80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.exe" C:\Users\admin\Desktop\80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
3668"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\506f3b12853375a1fbbf85c82ddf13341cf941c5acd4a39a51d6addf145a7a51.7z" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
2 940
Read events
1 910
Write events
1 029
Delete events
1

Modification events

(PID) Process:(3060) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(3060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
8
Suspicious files
213
Text files
97
Unknown types
0

Dropped files

PID
Process
Filename
Type
3060WinRAR.exeC:\Users\admin\Desktop\45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315executable
MD5:AACEF4E2151C264DC30963823BD3BB17
SHA256:45C317200E27E5C5692C59D06768CA2E7EEB446D6D495084F414D0F261F75315
3668WinRAR.exeC:\Users\admin\Desktop\506f3b12853375a1fbbf85c82ddf13341cf941c5acd4a39a51d6addf145a7a51executable
MD5:7E37F198C71A81AF5384C480520EE36E
SHA256:506F3B12853375A1FBBF85C82DDF13341CF941C5ACD4A39A51D6ADDF145A7A51
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\ProgramData\47IsP2Rni.icoimage
MD5:88D9337C4C9CFE2D9AFF8A2C718EC76B
SHA256:95E059EF72686460884B9AEA5C292C22917F75D56FE737D43BE440F82034F438
3936WinRAR.exeC:\Users\admin\Desktop\87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9executable
MD5:5E54923E6DC9508AE25FB6148D5B2E55
SHA256:87B76F35740262ABB8DA224B94779FF56EB6346318B4F9FB1988A59A72A4E6C9
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\FFFFFFFFFFFbinary
MD5:2947C2FEB8C3BF946A554ADA5BA70564
SHA256:D929B54F5B49C9B50FB7891C71E23D235928E59349ED78B0ED52A37664646B5C
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\GGGGGGGGGGGbinary
MD5:2947C2FEB8C3BF946A554ADA5BA70564
SHA256:D929B54F5B49C9B50FB7891C71E23D235928E59349ED78B0ED52A37664646B5C
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\IIIIIIIIIIIbinary
MD5:2947C2FEB8C3BF946A554ADA5BA70564
SHA256:D929B54F5B49C9B50FB7891C71E23D235928E59349ED78B0ED52A37664646B5C
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\Users\Administrator\47IsP2Rni.README.txttext
MD5:572B3B754209A8F915E2C1F38224EFA2
SHA256:4D35D6DC7E6E288B9AFE6E5A9568A7E218DE9F266AD61992712EA1553976C17B
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\HHHHHHHHHHHbinary
MD5:2947C2FEB8C3BF946A554ADA5BA70564
SHA256:D929B54F5B49C9B50FB7891C71E23D235928E59349ED78B0ED52A37664646B5C
211287b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\JJJJJJJJJJJbinary
MD5:2947C2FEB8C3BF946A554ADA5BA70564
SHA256:D929B54F5B49C9B50FB7891C71E23D235928E59349ED78B0ED52A37664646B5C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
266
DNS requests
0
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
192.168.100.14:49211
unknown
192.168.100.14:49212
unknown
3264
45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe
192.168.1.2:445
unknown
192.168.100.14:49214
unknown
192.168.100.14:49215
unknown
192.168.100.14:49216
unknown

DNS requests

No data

Threats

PID
Process
Class
Message
3264
45c317200e27e5c5692c59d06768ca2e7eeb446d6d495084f414d0f261f75315.exe
Misc activity
ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection
No debug info