File name:

Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.7z

Full analysis: https://app.any.run/tasks/476bc980-1fd1-4512-8b51-956bee2ff029
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 29, 2025, 13:09:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

FB70E3770C54D464CC2E2557C8AC4A32

SHA1:

47BB111DB08841398F898D1973F77D266AE04DC2

SHA256:

277005D6992D6270ED18451C8E7A5131435AF4C913FCBBF53413C9D951CDBB74

SSDEEP:

768:Q2aXX3zQRWYgl5Hw2WA1JZHJt6EA4m3R0c/dImaG2ZogiMPGLcs4vaU6iIf2SEUk:QZzQSl5LJtwtB/d1QCgPeLm+pPIn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 1276)
    • RANSOMWARE has been detected

      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 8092)
    • Creates file in the systems drive root

      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1276)
    • Manual execution by a user

      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
      • notepad.exe (PID: 6080)
    • Reads the computer name

      • ShellExperienceHost.exe (PID: 8092)
      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
    • Checks supported languages

      • ShellExperienceHost.exe (PID: 8092)
      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
    • Reads the machine GUID from the registry

      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
    • Creates files in the program directory

      • Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe (PID: 7776)
    • Reads the software policy settings

      • slui.exe (PID: 7272)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2020:09:07 12:19:44+00:00
ArchivedFileName: Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe THREAT trojan-ransom.win32.gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe shellexperiencehost.exe no specs slui.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1276"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6080"C:\WINDOWS\system32\NOTEPAD.EXE" M:\Read_Me.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7184C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7240C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7272"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7776"C:\Users\admin\Desktop\Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\trojan-ransom.win32.gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
8092"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
Total events
3 469
Read events
3 411
Write events
40
Delete events
18

Modification events

(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.7z
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1276) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
19
Suspicious files
4 742
Text files
1 127
Unknown types
0

Dropped files

PID
Process
Filename
Type
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\Recovery\WindowsRE\Winre.wim
MD5:
SHA256:
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\Recovery\WindowsRE\Winre.wim.readme
MD5:
SHA256:
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exeC:\$WinREAgent\Backup\Winre.wim
MD5:
SHA256:
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exeC:\$WinREAgent\Backup\Winre.wim.readme
MD5:
SHA256:
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\$WINRE_BACKUP_PARTITION.MARKERbinary
MD5:84181A672C4F55116BBFC063F3C7BD79
SHA256:C517F613C373A749C16C46288725F18A23F6B8760F9E74E4BCFAF7FE09027674
1276WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1276.48511\Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exeexecutable
MD5:8BA537F8D00A73D6CC1CC5DFFA566ED1
SHA256:AAC2024789FFD2BFCE97D6A509136ECF7C43B18C2A83280B596E62D988CEDB10
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\$WINRE_BACKUP_PARTITION.MARKER.readmebinary
MD5:84181A672C4F55116BBFC063F3C7BD79
SHA256:C517F613C373A749C16C46288725F18A23F6B8760F9E74E4BCFAF7FE09027674
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\Recovery\WindowsRE\ReAgent.xml.readmebinary
MD5:BEA84559ECBC54D51B9EB5073C3E2263
SHA256:78B40E049E809E615816491D94DBA877160CB0FB65B483361EA20FCB9F7B71FE
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\Recovery\Read_Me.txttext
MD5:DE658A71DD7C60065FED46A87424CBD6
SHA256:54DA71A2C2C15EE60BF6AB3FE66535C702CB53FFAD48C2C611E5A46991F97C2B
7776Trojan-Ransom.Win32.Gen.xye-aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10.exe\\?\Volume{eaf65672-68c3-4f99-8d5c-104b5f4d8fff}\Recovery\WindowsRE\boot.sdi.readmebinary
MD5:0D3FE68E0CE772F9E8AC2BF0586ADC08
SHA256:6698C69AD7C66215B2A73EE264C4765352DBFDB77D1687A5739455BAA6C97ACF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7440
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7440
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
6876
RUXIMICS.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.73
  • 40.126.31.1
  • 20.190.159.2
  • 40.126.31.131
  • 20.190.159.68
  • 40.126.31.0
  • 20.190.159.64
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info