| File name: | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.zip |
| Full analysis: | https://app.any.run/tasks/3b474d8c-06bd-48d4-ac94-c1b371d6cb5d |
| Verdict: | Malicious activity |
| Threats: | Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage. |
| Analysis date: | April 21, 2025, 20:15:13 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract, compression method=AES Encrypted |
| MD5: | D6833C801DA2B1C7DBAF7DDA7DE7B01C |
| SHA1: | 556A37C6E365533049C0516A91F47E16AACDA3B4 |
| SHA256: | 2711CE2AA32A9E462AFB81CEC038995A950902A4973C54420A79FA0AAF992D54 |
| SSDEEP: | 12288:qaU4iOmR0nB03hLXek/GZHisrQayBpb1ZgDIvrhkdO1sLCb:rNxmRKB03hLXJ/GZH1QayBpb1yDIvrhd |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0003 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2025:04:21 20:14:06 |
| ZipCRC: | 0x5c6d851a |
| ZipCompressedSize: | 389017 |
| ZipUncompressedSize: | 896512 |
| ZipFileName: | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 208 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 516 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1228 | "C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\divisionduring.png" | C:\Windows\System32\mspaint.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Paint Exit code: 0 Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 1676 | ping 1.1.1.1 -n 1 -w 3000 | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4756 | c:\evTghw\evTg\..\..\Windows\evTg\evTg\..\..\system32\evTg\evTg\..\..\wbem\evTg\evTgh\..\..\wmic.exe shadowcopy delete | C:\Windows\System32\wbem\WMIC.exe | — | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 2147749908 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5392 | c:\NZMuOh\NZMu\..\..\Windows\NZMu\NZMu\..\..\system32\NZMu\NZMu\..\..\wbem\NZMu\NZMuO\..\..\wmic.exe shadowcopy delete | C:\Windows\System32\wbem\WMIC.exe | — | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 2147749908 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7204 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7240 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7356 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.zip | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (1276) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 1 | |||
| (PID) Process: | (1228) mspaint.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Ribbon |
| Operation: | write | Name: | QatItems |
Value: <siq:customUI xmlns:siq="http://schemas.microsoft.com/windows/2009/ribbon/qat"><siq:ribbon minimized="false"><siq:qat position="0"><siq:sharedControls><siq:control idQ="siq:20002" visible="false" argument="0"/><siq:control idQ="siq:20003" visible="false" argument="0"/><siq:control idQ="siq:20004" visible="true" argument="0"/><siq:control idQ="siq:20014" visible="false" argument="0"/><siq:control idQ="siq:20017" visible="false" argument="0"/><siq:control idQ="siq:20019" visible="false" argument="0"/><siq:control idQ="siq:31001" visible="true" argument="0"/><siq:control idQ="siq:31002" visible="true" argument="0"/></siq:sharedControls></siq:qat></siq:ribbon></siq:customUI> | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\Decryptfiles.txt | text | |
MD5:6725D4E3EF45C7DDAA913773CC797E90 | SHA256:513E27E998F2EBD8F961131027A023BE4CD3CA703741B942E7C822AF0EBE2576 | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\divisionduring.png | binary | |
MD5:BE3A198186FD98D22E67F1471672C08D | SHA256:6B4B2CABD00AD616BE6AE27170AD9BD4E7ECE44BA90B89A6261D7ADDD3EA1912 | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\autoabove.rtf | binary | |
MD5:9885E4E972281748D0C591F3D079E58F | SHA256:B2A1048CE244A0825711D486E2D898E8C0E7C2725228046A2D67C4AA886CDB06 | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\autoabove.rtf.NRot | binary | |
MD5:9885E4E972281748D0C591F3D079E58F | SHA256:B2A1048CE244A0825711D486E2D898E8C0E7C2725228046A2D67C4AA886CDB06 | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\divisionduring.png.snXv | binary | |
MD5:BE3A198186FD98D22E67F1471672C08D | SHA256:6B4B2CABD00AD616BE6AE27170AD9BD4E7ECE44BA90B89A6261D7ADDD3EA1912 | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\individualrated.jpg | binary | |
MD5:8E211C120BE3FE0C543D593289CD1C7E | SHA256:28F9C685A2A1C1574C3457CCC31388326107CC49A3BA0D6FDBDFEA787DB3632B | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\greenreports.rtf.PtYX | binary | |
MD5:03FC8317511965AE872CA24815D30CEB | SHA256:4DC0638AEA4EDB4FE1B38E7E71D2D1B7D00AE6152E38176F5844E798D998AB2D | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\greenreports.rtf | binary | |
MD5:03FC8317511965AE872CA24815D30CEB | SHA256:4DC0638AEA4EDB4FE1B38E7E71D2D1B7D00AE6152E38176F5844E798D998AB2D | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\everykids.png.xNvP | binary | |
MD5:CD90BA04DD4892D98CCF60F67F7EB79A | SHA256:F3E3E343D1FCE5ED973DA12E8DEB9BF5DAE5997EB5C06C925091B60248B06A54 | |||
| 7928 | affa4e7daf9d64e4e3660b489bd684249c6f678f4f04a1a5f74bf4d9144cdde1.exe | C:\Users\admin\Desktop\individualrated.jpg.dUeo | binary | |
MD5:8E211C120BE3FE0C543D593289CD1C7E | SHA256:28F9C685A2A1C1574C3457CCC31388326107CC49A3BA0D6FDBDFEA787DB3632B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7776 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7776 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.16.38.4:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2112 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |