File name:

Crypto.zip

Full analysis: https://app.any.run/tasks/067b5250-0019-4405-925c-bace6372c472
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: May 12, 2025, 02:40:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
cryptolocker
arch-exec
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

EDEE90322D445630E2AE329FD404B770

SHA1:

66772D7B69BE40FA9B38F429AA1564F73C7F03C7

SHA256:

17CCE8E06EDAB325DFEF75D2A75538A73FBFA34DEC16CA9FCFEC9F739064CBE3

SSDEEP:

12288:/PYf+7NsPmp1CQukcuKdEWM2KfcahVT9B6fEN/9:/PYf+7iPmp1TukcHdXMXEahVxB6cN/9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CRYPTOLOCKER has been found (auto)

      • WinRAR.exe (PID: 4652)
    • RANSOMWARE has been detected

      • Crypto.exe (PID: 8016)
    • Changes the autorun value in the registry

      • Crypto.exe (PID: 8016)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Crypto.exe (PID: 8016)
  • INFO

    • Manual execution by a user

      • Crypto.exe (PID: 7964)
      • Crypto.exe (PID: 8016)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4652)
    • Checks supported languages

      • Crypto.exe (PID: 8016)
    • Reads the machine GUID from the registry

      • Crypto.exe (PID: 8016)
    • Reads the computer name

      • Crypto.exe (PID: 8016)
    • Create files in a temporary directory

      • Crypto.exe (PID: 8016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:01 21:53:58
ZipCRC: 0xa43cbf3c
ZipCompressedSize: 385773
ZipUncompressedSize: 1234944
ZipFileName: Crypto.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #CRYPTOLOCKER winrar.exe sppextcomobj.exe no specs slui.exe no specs crypto.exe no specs THREAT crypto.exe

Process information

PID
CMD
Path
Indicators
Parent process
4652"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Crypto.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7220C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7252"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7964"C:\Users\admin\Desktop\Crypto.exe" C:\Users\admin\Desktop\Crypto.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Hexamethylcyclotrisiloxane
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\crypto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
8016"C:\Users\admin\Desktop\Crypto.exe" C:\Users\admin\Desktop\Crypto.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Hexamethylcyclotrisiloxane
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\crypto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
1 785
Read events
1 766
Write events
19
Delete events
0

Modification events

(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Crypto.zip
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(4652) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
3
Suspicious files
67
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
8016Crypto.exeC:\Users\admin\AppData\Local\Temp\backgroundImage.jpgimage
MD5:9C971E67218502E5C7E114325325CA9D
SHA256:EA730924EFA7FA634663DBCF025E840943374A714BB06AA7B798B706975532F2
8016Crypto.exeC:\Users\admin\Downloads\therelevel.png.tempbinary
MD5:EED7E288D7B13ECBE2605E8A422ABB16
SHA256:AFE4464EF5BE995A55EA13E52BD75E8B4598B791F00B512F4A5498F14284EF5D
4652WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4652.46881\Crypto.exeexecutable
MD5:06F35AA793D54A8C30233D5E74F55C33
SHA256:2857269196F820D1CEFE17E55A9C9F6CB29FB799550FA57650BC2E8CE0E7D27E
8016Crypto.exeC:\Users\admin\Downloads\areasorganization.jpg.HXAMTHYbinary
MD5:585F9D40609CCFFCFAA675FEE35BB4AC
SHA256:26EE86516C4BAB7ACBFCE333365B44D9541D7D05D2B38F89BC765B16EFF77733
8016Crypto.exeC:\Users\admin\Downloads\takingexperience.png.tempbinary
MD5:D2FFB849C18E558132D616CB65A685B4
SHA256:08270D1AA4391A832F1E540FC5D60774491181E07203EB90E122D76630758699
8016Crypto.exeC:\Users\admin\Downloads\remotelondon.jpg.tempbinary
MD5:54B1FFA7E267AEA8F562BE159B9153A4
SHA256:F441A6B76BDD868A5CF528777DDCE76AA589FE2634EF22E77D847C9D8DCCBC1F
8016Crypto.exeC:\Users\admin\Downloads\areasorganization.jpg.tempbinary
MD5:585F9D40609CCFFCFAA675FEE35BB4AC
SHA256:26EE86516C4BAB7ACBFCE333365B44D9541D7D05D2B38F89BC765B16EFF77733
8016Crypto.exeC:\Users\admin\Downloads\desktop.ini.HXAMTHYbinary
MD5:A352CA89506378F24DCFA5B8AD131416
SHA256:DB07DBA0F3E1C5B9E41D0F2F52DB098DF9C23EBA3B64210C23383C3818924F99
8016Crypto.exeC:\Users\admin\Downloads\seriesknow.png.HXAMTHYbinary
MD5:B441602E262427E2F4A7CA73FE52137C
SHA256:8922A1E3268595BFF562D913465C70FB8B34ACC941C3E981CFAC013D996A2832
8016Crypto.exeC:\Users\admin\Downloads\remotelondon.jpg.HXAMTHYbinary
MD5:54B1FFA7E267AEA8F562BE159B9153A4
SHA256:F441A6B76BDD868A5CF528777DDCE76AA589FE2634EF22E77D847C9D8DCCBC1F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7820
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7820
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6652
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
login.live.com
  • 40.126.31.129
  • 20.190.159.23
  • 20.190.159.130
  • 40.126.31.2
  • 20.190.159.73
  • 40.126.31.1
  • 20.190.159.128
  • 40.126.31.3
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info