File name:

24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.zip

Full analysis: https://app.any.run/tasks/8e0d7caa-712b-45f6-831f-b326d67a91cf
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: May 15, 2025, 11:45:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
sinkhole
ransomware
wannacry
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

9124BEAF31C8ED636767C104918193C0

SHA1:

6491E154407050A57033ADB47B0016D06EC56CF7

SHA256:

1EEC5C7691736B941B20056932D86A55504240636CCF0C3E1B337B57C039BE8E

SSDEEP:

98304:WICIrRmMM1iIUnCmvIIwMZ9T1+nLifQxdkhHRBO+DPEQ2x2E9wqIcm+eu9j4yIdP:/O8yY0B0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • WANNACRY has been detected (SURICATA)

      • svchost.exe (PID: 1080)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2840)
    • Starts a Microsoft application from unusual location

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
    • Reads the Internet Settings

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
    • Reads security settings of Internet Explorer

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 2840)
    • Manual execution by a user

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2840)
    • Checks supported languages

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
    • Checks proxy server information

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
    • Reads the computer name

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
    • Reads the machine GUID from the registry

      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2332)
      • 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0003
ZipCompression: Unknown (99)
ZipModifyDate: 2025:05:15 11:45:08
ZipCRC: 0x9fbb1227
ZipCompressedSize: 3587788
ZipUncompressedSize: 3723264
ZipFileName: 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #WANNACRY 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe #WANNACRY svchost.exe #WANNACRY 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe

Process information

PID
CMD
Path
Indicators
Parent process
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2056"C:\Users\admin\Desktop\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe" C:\Users\admin\Desktop\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Disk Defragmenter
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\desktop\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
2332"C:\Users\admin\Desktop\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe" C:\Users\admin\Desktop\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Disk Defragmenter
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\desktop\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
2840"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
1 958
Read events
1 899
Write events
49
Delete events
10

Modification events

(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2840) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2840WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2840.36722\24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exeexecutable
MD5:DB349B97C37D22F5EA1D1841E3C89EB4
SHA256:24D004A104D4D54034DBCFFC2A4B19A11F39008A575AA614EA04703480B1022C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
7
DNS requests
2
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2056
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
GET
200
104.16.166.228:80
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
unknown
whitelisted
2332
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
GET
200
104.16.166.228:80
http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
2332
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
104.16.166.228:80
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
CLOUDFLARENET
malicious
2056
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
104.16.166.228:80
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
  • 104.16.166.228
  • 104.16.167.228
whitelisted

Threats

PID
Process
Class
Message
2332
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
A Network Trojan was detected
AV TROJAN Domain Sinkholed by Kryptos Logic (HTML Response)
2332
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
A Network Trojan was detected
ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
1080
svchost.exe
A Network Trojan was detected
ET MALWARE Possible WannaCry DNS Lookup 1
2332
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
Misc activity
ET MALWARE Known Sinkhole Response Kryptos Logic
2056
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
A Network Trojan was detected
AV TROJAN Domain Sinkholed by Kryptos Logic (HTML Response)
2056
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
Misc activity
ET MALWARE Known Sinkhole Response Kryptos Logic
2056
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe
A Network Trojan was detected
ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
No debug info