File name:

HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.7z

Full analysis: https://app.any.run/tasks/bf065701-1144-4b29-bfa2-13a6eb8d9600
Verdict: Malicious activity
Threats:

Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.

Analysis date: April 27, 2025, 17:44:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
cerber
ransomware
stealer
wmi-base64
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

DC47824B5BD8B93024526A951ACBFF2B

SHA1:

386AFCC3372B0B7B7FD02C43BCB8CE1BAD9BB1C0

SHA256:

10778C95554F8C3B95005BD2E1A5BE07754BDF8D966B5D35E1ADCDB0ABF9F410

SSDEEP:

6144:+uc14RCmJ03fSHd3FK1qr7B/+wN/ft6U49CAhe0eVLzGZmQqBTDJEe:+uc14kmJ03wVKa7B/vfoBvhebHcCB/Jr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CERBER mutex has been found

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • Actions looks like stealing of personal data

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • CERBER has been detected (SURICATA)

      • mshta.exe (PID: 3004)
  • SUSPICIOUS

    • Reads the Internet Settings

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
      • mshta.exe (PID: 3004)
    • Reads security settings of Internet Explorer

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • There is functionality for taking screenshot (YARA)

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • The process creates files with name similar to system file names

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Executable content was dropped or overwritten

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Application launched itself

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2912)
    • Starts CMD.EXE for commands execution

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 2912)
  • INFO

    • Reads the computer name

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Checks supported languages

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2060)
    • Create files in a temporary directory

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Reads the machine GUID from the registry

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
    • Found Base64 encoded reference to WMI classes (YARA)

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • Manual execution by a user

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 3140)
      • msedge.exe (PID: 2608)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 3004)
    • Checks proxy server information

      • mshta.exe (PID: 3004)
    • Creates files or folders in the user directory

      • HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe (PID: 704)
    • Application launched itself

      • msedge.exe (PID: 2608)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2017:05:03 07:02:10+00:00
ArchivedFileName: HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
73
Monitored processes
30
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe heur-trojan-ransom.win32.agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe #CERBER heur-trojan-ransom.win32.agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe #CERBER mshta.exe PhotoViewer.dll no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs taskkill.exe no specs ping.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
704"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.win32.agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
752"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3888 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
756"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1072"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1880"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4556 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1980taskkill /f /im "HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe" C:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
2060"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2068"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1272 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2336"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3116 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2516"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2336 --field-trial-handle=1316,i,14629742414692114922,13585450275518447578,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
11 906
Read events
11 593
Write events
289
Delete events
24

Modification events

(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2060) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.7z
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2060) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
73
Suspicious files
672
Text files
135
Unknown types
3

Dropped files

PID
Process
Filename
Type
2060WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2060.18203\HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeexecutable
MD5:1306783305417FE3BFB813A158DB08EC
SHA256:849AA2E275D84C05213F95F764331DF0DD743B17B32F61174AC45946544F67EB
3140HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\AppData\Local\Temp\jquery.touchwipe.min.jsbinary
MD5:9268DC7F6A871944D3974A495F659CE8
SHA256:63500B6B7E794EFF658C7B31AAB9154B682DDDED20751D5F9D04D6EF65439BBB
3140HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\AppData\Local\Temp\overlay.csstext
MD5:15DE621B3A147EB7F4C08213AB39B5E5
SHA256:C222D6C91EE3195D3E7EE88946C208E49038CE5C7059679DB103651A33777E7B
3140HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\AppData\Local\Temp\detachments.mbinary
MD5:A187375F96FB9A4F9422320A8E976A35
SHA256:D03EBE124C30F6BBF3A091BA2F95B288E1BCBBEF88D3527CDD170DD217E2F975
3140HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\AppData\Local\Temp\customStyles.csstext
MD5:6D88FCC171C3B237A81E9624B055AAA3
SHA256:4E20F2BB58D90B2871859178B7102B3BCE8CF55C273FC4188F2902B3AD55BA64
3140HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\AppData\Local\Temp\nsv416A.tmp\System.dllexecutable
MD5:CA332BB753B0775D5E806E236DDCEC55
SHA256:DF5AE79FA558DC7AF244EC6E53939563B966E7DBD8867E114E928678DBD56E5D
704HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\AppData\Local\Temp\90059c37\41a4.tmptext
MD5:BE4C9EFE16B5988A0147585FE0B0E6D4
SHA256:1DC8C753EA2FFECA881CE9210331CFE746B93FBB39C09B7BF41469C2889FB029
704HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\Documents\FdNQiaSrvS.b58dtext
MD5:EC340E68115468DE0421D2C430ADBC1E
SHA256:CBAD9766F776DD4CF13C54BF50AF3B1D85478A4A6938061ECCF5B6414FD21ED3
704HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\Documents\administer.rtftext
MD5:A3C36A3B5D6B6D27A7BB492A7CE8B177
SHA256:2AE2883FC39D2C6E8168B2570CCDB9F4FEBF4FA8BE1F27BD2E2575BF493FB53A
704HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exeC:\Users\admin\Documents\atrent.rtftext
MD5:EC340E68115468DE0421D2C430ADBC1E
SHA256:CBAD9766F776DD4CF13C54BF50AF3B1D85478A4A6938061ECCF5B6414FD21ED3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
1 235
DNS requests
95
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3004
mshta.exe
GET
403
172.67.17.223:80
http://api.blockcypher.com/v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1745775896328
unknown
whitelisted
1072
msedge.exe
GET
301
150.171.28.10:80
http://bing.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
704
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
90.2.1.1:6892
unknown
704
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
90.2.1.3:6892
unknown
704
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
90.2.1.4:6892
unknown
704
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
90.2.1.0:6892
unknown
704
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
90.2.1.2:6892
unknown
704
HEUR-Trojan-Ransom.Win32.Agent.gen-849aa2e275d84c05213f95f764331df0dd743b17b32f61174ac45946544f67eb.exe
90.2.1.8:6892
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
api.blockcypher.com
  • 172.67.17.223
  • 104.20.99.10
  • 104.20.98.10
whitelisted
btc.blockr.io
unknown
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
ntp.msn.com
  • 204.79.197.203
whitelisted
assets.msn.com
  • 23.50.131.73
  • 23.50.131.83
  • 23.50.131.76
  • 23.50.131.81
  • 23.50.131.72
  • 23.50.131.74
  • 23.50.131.85
  • 23.50.131.84
  • 23.50.131.80
whitelisted
img-s-msn-com.akamaized.net
  • 184.24.77.12
  • 184.24.77.9
whitelisted
sb.scorecardresearch.com
  • 18.245.60.107
  • 18.245.60.76
  • 18.245.60.53
  • 18.245.60.72
whitelisted
th.bing.com
  • 92.123.104.17
  • 92.123.104.22
  • 92.123.104.30
  • 92.123.104.25
  • 92.123.104.14
  • 92.123.104.13
  • 92.123.104.28
  • 92.123.104.11
  • 92.123.104.12
whitelisted

Threats

PID
Process
Class
Message
3004
mshta.exe
A Network Trojan was detected
RANSOMWARE [ANY.RUN] Cerber Blockchain has been detected
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (maxcdn .bootstrapcdn .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (maxcdn .bootstrapcdn .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
1072
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
No debug info