analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1c.exe

Full analysis: https://app.any.run/tasks/45d01733-b428-4aa8-a634-89d25d23b0ed
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: August 13, 2019, 14:06:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
troldesh
shade
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

94F407E8615EBE091CCF5035197EA1EA

SHA1:

89C8938057A1B0514E3805536CCF3D2EB4ACB1E0

SHA256:

14FE0FA7E16253E53CE4C25616E08006AD09330BEA8DF9161A47B2815CD83067

SSDEEP:

24576:JAkh6SRcwxbc0x7A2JHQWP5Nx8ubFKD8L1QA/:JAe6Spxb9xc2JHXP3xBpD1Qw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 1c.exe (PID: 284)
    • TROLDESH was detected

      • 1c.exe (PID: 284)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 1c.exe (PID: 284)
    • Creates files in the program directory

      • 1c.exe (PID: 284)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • 1c.exe (PID: 284)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (35.8)
.exe | Win64 Executable (generic) (31.7)
.scr | Windows screen saver (15)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

Tag01000340: D
eUpUtilities2014: @ProductVersion
eUpUtilities: LProductName
yrightAVGNetherlandsBV2011: LLegalTrademarks
eUpStartUpOptimizer: <FileVersion
eUpSoftware: ZFileDescription
Comments: @CompanyName
CharacterSet: Unicode
LanguageCode: German
FileSubtype: -
ObjectFileType: Unknown
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x0017
ProductVersionNumber: 14.0.1000.340
FileVersionNumber: 14.0.1000.340
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: -
OSVersion: 5
EntryPoint: 0x6dc7
UninitializedDataSize: -
InitializedDataSize: 1076224
CodeSize: 49152
LinkerVersion: 9
PEType: PE32
TimeStamp: 2019:08:09 01:16:02+02:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROLDESH 1c.exe

Process information

PID
CMD
Path
Indicators
Parent process
284"C:\Users\admin\AppData\Local\Temp\1c.exe" C:\Users\admin\AppData\Local\Temp\1c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Total events
31
Read events
28
Write events
3
Delete events
0

Modification events

(PID) Process:(284) 1c.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\System32\Configuration
Operation:writeName:xi
Value:
906D0F2E2F604F839E04
(PID) Process:(284) 1c.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Client Server Runtime Subsystem
Value:
"C:\ProgramData\Windows\csrss.exe"
(PID) Process:(284) 1c.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\System32\Configuration
Operation:writeName:xVersion
Value:
4.0.0.1
Executable files
1
Suspicious files
0
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\state.tmp
MD5:
SHA256:
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\unverified-microdesc-consensus.tmp
MD5:
SHA256:
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\cached-certs.tmp
MD5:
SHA256:
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\cached-microdesc-consensus.tmp
MD5:
SHA256:
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\cached-certstext
MD5:BF5D8353FF2374E574640BA86A3C6793
SHA256:A2F64145FAFABDE747D7403C73CEA7E7AF8C8DEB4F8D734DC1EA7E3D431CCF0C
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\cached-microdescs.newtext
MD5:E6CCAD149D23925136A6A4B4BE53351D
SHA256:8E64CD16E183840B6C90AE50C9118F2665E69421AD51EC7097FF56CF1B58F7A0
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\statetext
MD5:F4A16D7B3436659BAEB79A2EB1C981A0
SHA256:0502497C12BCA257FD3F286A0C19741CE0C25CA2F3DE4A8224243C8B74467306
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\unverified-microdesc-consensustext
MD5:C6829D7D5F0C1098CC1C9D24089E04B8
SHA256:D60BDBBB01E50C3846C1A35954E026FCB3AC7ED6850955C6757971542E7ECD8F
2841c.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\cached-microdesc-consensustext
MD5:C6829D7D5F0C1098CC1C9D24089E04B8
SHA256:D60BDBBB01E50C3846C1A35954E026FCB3AC7ED6850955C6757971542E7ECD8F
2841c.exeC:\ProgramData\Windows\csrss.exeexecutable
MD5:94F407E8615EBE091CCF5035197EA1EA
SHA256:14FE0FA7E16253E53CE4C25616E08006AD09330BEA8DF9161A47B2815CD83067
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
284
1c.exe
193.23.244.244:443
Chaos Computer Club e.V.
DE
malicious
284
1c.exe
171.25.193.9:80
Foreningen for digitala fri- och rattigheter
SE
malicious
284
1c.exe
79.143.191.62:9001
Contabo GmbH
DE
suspicious
284
1c.exe
173.71.141.89:9001
MCI Communications Services, Inc. d/b/a Verizon Business
US
suspicious
284
1c.exe
51.15.36.183:443
Online S.a.s.
NL
suspicious

DNS requests

No data

Threats

PID
Process
Class
Message
284
1c.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 190
284
1c.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
284
1c.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] TOR SSL connection
284
1c.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 281
284
1c.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] TOR SSL connection
284
1c.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 507
284
1c.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 603
284
1c.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 199
284
1c.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
284
1c.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] TOR SSL connection
No debug info