File name:

freecraft.exe

Full analysis: https://app.any.run/tasks/dedefa6e-168b-4593-be64-28c95a099884
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 19, 2025, 09:16:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pyinstaller
python
rust
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

F8470A9257ED90953AAB3917027D3054

SHA1:

1440DFAB29210C86CAFC2AA1E82ADA008E651D51

SHA256:

00CC6B1F5AA08EDBA4701B6E2B8FE036D4D6D0B9EB9F4EBEFF1FB1278C38D748

SSDEEP:

196608:5ofNgKVh2TaMM0wE1MUxTymNUfkGrCKvr493/L:yfGKi1fxTymNUfkGOKj4l

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • freecraft.exe (PID: 7892)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7772)
    • There is functionality for taking screenshot (YARA)

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7684)
      • freecraft.exe (PID: 7772)
      • freecraft.exe (PID: 7892)
    • Loads Python modules

      • freecraft.exe (PID: 7684)
      • freecraft.exe (PID: 7892)
    • Reads the date of Windows installation

      • freecraft.exe (PID: 7684)
    • Process drops python dynamic module

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7772)
    • Application launched itself

      • freecraft.exe (PID: 7684)
      • freecraft.exe (PID: 7772)
      • freecraft.exe (PID: 7364)
    • Process drops legitimate windows executable

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7772)
    • Executable content was dropped or overwritten

      • freecraft.exe (PID: 7772)
      • freecraft.exe (PID: 7364)
    • Reads security settings of Internet Explorer

      • freecraft.exe (PID: 7684)
  • INFO

    • Reads the computer name

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7772)
      • freecraft.exe (PID: 7684)
      • freecraft.exe (PID: 7892)
    • The sample compiled with english language support

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7772)
    • Create files in a temporary directory

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7772)
    • PyInstaller has been detected (YARA)

      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7684)
      • freecraft.exe (PID: 7772)
      • freecraft.exe (PID: 7892)
    • Process checks computer location settings

      • freecraft.exe (PID: 7684)
    • Checks supported languages

      • freecraft.exe (PID: 7772)
      • freecraft.exe (PID: 7364)
      • freecraft.exe (PID: 7892)
      • freecraft.exe (PID: 7684)
    • Application based on Rust

      • freecraft.exe (PID: 7684)
      • freecraft.exe (PID: 7892)
    • Reads the software policy settings

      • slui.exe (PID: 7824)
    • Checks proxy server information

      • slui.exe (PID: 7824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:17 20:13:57+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 173568
InitializedDataSize: 155648
UninitializedDataSize: -
EntryPoint: 0xce20
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start freecraft.exe freecraft.exe no specs freecraft.exe slui.exe THREAT freecraft.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7364"C:\Users\admin\Desktop\freecraft.exe" C:\Users\admin\Desktop\freecraft.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\freecraft.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7684"C:\Users\admin\Desktop\freecraft.exe" C:\Users\admin\Desktop\freecraft.exefreecraft.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\freecraft.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7772"C:\Users\admin\Desktop\freecraft.exe" C:\Users\admin\Desktop\freecraft.exeC:\Users\admin\Desktop\freecraft.exe
freecraft.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\freecraft.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7824C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7892"C:\Users\admin\Desktop\freecraft.exe" C:\Users\admin\Desktop\freecraft.exeC:\Users\admin\Desktop\freecraft.exe
freecraft.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\freecraft.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 908
Read events
3 908
Write events
0
Delete events
0

Modification events

No data
Executable files
124
Suspicious files
6
Text files
1 922
Unknown types
0

Dropped files

PID
Process
Filename
Type
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_decimal.pydexecutable
MD5:F465C15E7BACEAC920DC58A5FB922C1C
SHA256:F4A486A0CA6A53659159A404614C7E7EDCCB6BFBCDEB844F6CEE544436A826CB
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26
SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_lzma.pydexecutable
MD5:3E73BC69EFB418E76D38BE5857A77027
SHA256:6F48E7EBA363CB67F3465A6C91B5872454B44FC30B82710DFA4A4489270CE95C
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_tcl_data\encoding\cp1250.enctext
MD5:9568EDE60D3F917F1671F5A625A801C4
SHA256:E2991A6F7A7A4D8D3C4C97947298FD5BACB3EAA2F898CEE17F5E21A9861B9626
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_bz2.pydexecutable
MD5:057325E89B4DB46E6B18A52D1A691CAA
SHA256:5BA872CAA7FCEE0F4FB81C6E0201CEED9BD92A3624F16828DD316144D292A869
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_tcl_data\encoding\cp1252.enctext
MD5:E9117326C06FEE02C478027CB625C7D8
SHA256:741859CF238C3A63BBB20EC6ED51E46451372BB221CFFF438297D261D0561C2E
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_tcl_data\encoding\cns11643.enctext
MD5:B6A7C59E6A48D91CC2DBCB2BBA7E4510
SHA256:8924545CC92584169138AADB64683C07BBF846A57014C2E668D23B63F43F3610
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_tcl_data\encoding\cp1253.enctext
MD5:441B86A0DE77F25C91DF1CD4685F651D
SHA256:5B8D47451F847C1BDE12CACA3739CA29860553C0B6399EE990D51B26F9A69722
7364freecraft.exeC:\Users\admin\AppData\Local\Temp\_MEI73642\_tcl_data\encoding\cp1256.enctext
MD5:D50DFAFEE5C605C5C00A25A9EEE4D4CF
SHA256:29340EA8E5AD3532BF67FA77CC852F055081B1238925CB109908AA72804CCC04
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
21
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
192.168.100.255:138
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3676
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7824
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info