File name:

HEXAMETHYLCYCLOTRISILOXANE.exe

Full analysis: https://app.any.run/tasks/0458a98e-fad9-4669-a8e8-f167298e605e
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 04, 2025, 13:52:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

06F35AA793D54A8C30233D5E74F55C33

SHA1:

55ED367A8E8116A81B404BCF839381E30BD56AF6

SHA256:

2857269196F820D1CEFE17E55A9C9F6CB29FB799550FA57650BC2E8CE0E7D27E

SSDEEP:

49152:QI0oo9IM5EPCuN8a9HG1V0oo9IMK0Ro9LMm01mSTYfkAfJ85PelsAvHfuAjOSDAA:J0oo9IMGauNM/0oo9IMK0Ro9LMmvvJo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
    • Changes the autorun value in the registry

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
  • INFO

    • Reads the computer name

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
    • Create files in a temporary directory

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
    • Checks supported languages

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
    • Checks proxy server information

      • slui.exe (PID: 7660)
    • Reads the software policy settings

      • slui.exe (PID: 7660)
    • Reads the machine GUID from the registry

      • HEXAMETHYLCYCLOTRISILOXANE.exe (PID: 5256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2068:11:23 16:33:01+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 796160
InitializedDataSize: 438272
UninitializedDataSize: -
EntryPoint: 0xc4562
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: 000000000000000
CompanyName: -
FileDescription: Hexamethylcyclotrisiloxane
FileVersion: 1.0.0.0
InternalName: HEXAMETHYLCYCLOTRISILOXANE.exe
LegalCopyright: Copyright © 2024
LegalTrademarks: -
OriginalFileName: HEXAMETHYLCYCLOTRISILOXANE.exe
ProductName: Hexamethylcyclotrisiloxane
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT hexamethylcyclotrisiloxane.exe slui.exe hexamethylcyclotrisiloxane.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1672"C:\Users\admin\AppData\Local\Temp\HEXAMETHYLCYCLOTRISILOXANE.exe" C:\Users\admin\AppData\Local\Temp\HEXAMETHYLCYCLOTRISILOXANE.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Hexamethylcyclotrisiloxane
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\hexamethylcyclotrisiloxane.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5256"C:\Users\admin\AppData\Local\Temp\HEXAMETHYLCYCLOTRISILOXANE.exe" C:\Users\admin\AppData\Local\Temp\HEXAMETHYLCYCLOTRISILOXANE.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Hexamethylcyclotrisiloxane
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\hexamethylcyclotrisiloxane.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7660C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
861
Read events
860
Write events
1
Delete events
0

Modification events

(PID) Process:(5256) HEXAMETHYLCYCLOTRISILOXANE.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Hexamethy decryptor
Value:
C:\Users\admin\AppData\Local\Temp\HEXAMETHYLCYCLOTRISILOXANE.exe
Executable files
2
Suspicious files
79
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\AppData\Local\Temp\backgroundImage.jpgbinary
MD5:9C971E67218502E5C7E114325325CA9D
SHA256:EA730924EFA7FA634663DBCF025E840943374A714BB06AA7B798B706975532F2
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\camerawritten.png.HXAMTHYbinary
MD5:817BB4B2F0E256F8FF207FDD0239EBD1
SHA256:FE30F0013F51B5925DBE05E7D80FF06D43242E63C5928086B38B2A0A10131516
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\desktop.ini.tempbinary
MD5:FD45C257E532B76C03A635D71DE80FAD
SHA256:DCE7B7670C29DC115ECF2E801D1E9144F2C13D88336B5BD6FCF37725E294A9B0
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\buyergerman.jpg.tempbinary
MD5:1613DE23A59C039F1AA31C6A33FC661B
SHA256:6D7C01EB7657BAF20E78DCEC25B37937E65FB4692BA9643443CB6144C7331141
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\camerawritten.png.tempbinary
MD5:817BB4B2F0E256F8FF207FDD0239EBD1
SHA256:FE30F0013F51B5925DBE05E7D80FF06D43242E63C5928086B38B2A0A10131516
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\communicationlate.jpg.HXAMTHYbinary
MD5:E68BA9D9BD42418823D12AA00FAB2D8F
SHA256:B6B894E23DCA32F522B7D7CFFFBFB2EDECA89D670C9489D42778035B41FB4224
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\buyergerman.jpg.HXAMTHYbinary
MD5:1613DE23A59C039F1AA31C6A33FC661B
SHA256:6D7C01EB7657BAF20E78DCEC25B37937E65FB4692BA9643443CB6144C7331141
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\communicationlate.jpg.tempbinary
MD5:E68BA9D9BD42418823D12AA00FAB2D8F
SHA256:B6B894E23DCA32F522B7D7CFFFBFB2EDECA89D670C9489D42778035B41FB4224
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Downloads\desktop.ini.HXAMTHYbinary
MD5:FD45C257E532B76C03A635D71DE80FAD
SHA256:DCE7B7670C29DC115ECF2E801D1E9144F2C13D88336B5BD6FCF37725E294A9B0
5256HEXAMETHYLCYCLOTRISILOXANE.exeC:\Users\admin\Desktop\amcosts.rtf.tempbinary
MD5:026EE1587FE72EF0FA64CCCFA70D19DC
SHA256:3F3D0F309BCDC355E616E3B324528427035E7067AE91FB6DED0C7196FDA18E4A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
27
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
US
binary
471 b
whitelisted
4120
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
NL
binary
419 b
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
US
binary
313 b
whitelisted
4120
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
NL
binary
408 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.86.251.6:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4120
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4120
SIHClient.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.159.129
  • 40.126.31.2
  • 40.126.31.131
  • 20.190.159.0
  • 40.126.31.0
  • 40.126.31.73
  • 40.126.31.128
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 40.113.103.199
  • 40.115.3.253
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
www.bing.com
  • 184.86.251.6
  • 184.86.251.9
  • 184.86.251.5
  • 184.86.251.7
  • 184.86.251.14
  • 184.86.251.10
  • 184.86.251.12
  • 184.86.251.8
  • 184.86.251.15
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info