File name:

4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe

Full analysis: https://app.any.run/tasks/a60c3ead-980f-4a07-bc29-4b97107908ee
Verdict: Malicious activity
Threats:

Play aka PlayCrypt ransomware group has been successfully targeting corporations, municipal entities, and infrastruction all over the world for about three years. It infiltrates networks via software vulnerabilities, phishing links and compromised websites. The ransomware abuses Windows system services to evade detection and maintain persistence. Play encrypts user files and steals sensitive data while demanding a ransom.

Analysis date: June 10, 2025, 07:07:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
play
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

39456C0DB7F259C4F7D29A226DDC0E60

SHA1:

4C66D4D9569D761F74F8961DECB1F1A5DA7FDD5D

SHA256:

4AA7436F0F98571F4E876D28491BF039B15E1B374BFED0EC6C2AB11FCE5D0E32

SSDEEP:

6144:0VVTEEUHmQKSPQ5ZFLVTPxQ9z6VP8AmD:t1HySPqFpjxIzgmD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PLAY has been detected

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
    • RANSOMWARE has been detected

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
  • INFO

    • Creates files or folders in the user directory

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
    • Reads the software policy settings

      • slui.exe (PID: 5772)
    • Checks supported languages

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
    • Reads the computer name

      • 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe (PID: 5556)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:17 19:56:50+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 401408
InitializedDataSize: 70656
UninitializedDataSize: -
EntryPoint: 0x577b1
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PLAY 4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe no specs sppextcomobj.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
5556"C:\Users\admin\AppData\Local\Temp\4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe" C:\Users\admin\AppData\Local\Temp\4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\4aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcrypt.dll
5588C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5772"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
614
Read events
614
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
383
Text files
4
Unknown types
12

Dropped files

PID
Process
Filename
Type
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\bootTel.datbinary
MD5:388ABA4E3628198F2CAE0979FF31F4E7
SHA256:62087DA321E0834ACF7111C4FF08A44A78810C3AD5E8BB3C1C63CCCB987A1CBB
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.PLAYbinary
MD5:1457E6CFB28358A467FCF304972F6B3E
SHA256:66DB6A159FF7262A8F305B2397B60A2F59CA884F3D61AF8BB303DD061C3F7417
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.inibinary
MD5:4C04F49AE76790235DBB22437FCDDD74
SHA256:8BE5A453122777B8E3E6187BEBC233311373B5D313BA4CDEE950A48B45CFF015
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\COPYING.LGPLv2.1.txt.PLAYbinary
MD5:CBBCC7E35C4F12D2EF7518E0FCAFECE7
SHA256:600EBA5A2682BAF3170A135373E7F20A1B8DC0439C2706C0AE0DA9C3802E7CE5
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\snapshot_blob.bin.PLAYbinary
MD5:44AEA43E2FF374BC585792FF173165EC
SHA256:2BC8BEBE6418E93CE06363DCDD7A29CB12F08A3DFC082DABDC7BBDB08C395C86
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.pngbinary
MD5:7DBAC53EEF74BD6C32BDC44925594B22
SHA256:C89E692BD23527CCD47C798CEA2ED31A70818FCD29F4CD87747C10ED7CF80A40
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\bootTel.dat.PLAYbinary
MD5:388ABA4E3628198F2CAE0979FF31F4E7
SHA256:62087DA321E0834ACF7111C4FF08A44A78810C3AD5E8BB3C1C63CCCB987A1CBB
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\Users\admin\AppData\Local\VirtualStore\ReadMe.txtbinary
MD5:E455E26B8A922A38E733B14DAB285B3E
SHA256:DC7A554F36F11F3604B916D7E2654FA3FD6C3F7830C4A01540B62C50A2553AD5
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.PLAYbinary
MD5:4C04F49AE76790235DBB22437FCDDD74
SHA256:8BE5A453122777B8E3E6187BEBC233311373B5D313BA4CDEE950A48B45CFF015
55564aa7436f0f98571f4e876d28491bf039b15e1b374bfed0ec6c2ab11fce5d0e32.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.PLAYbinary
MD5:7DBAC53EEF74BD6C32BDC44925594B22
SHA256:C89E692BD23527CCD47C798CEA2ED31A70818FCD29F4CD87747C10ED7CF80A40
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
19
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7564
svchost.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7564
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7196
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7196
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7564
svchost.exe
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7564
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4616
RUXIMICS.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7564
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.25
whitelisted
google.com
  • 142.250.186.110
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.130
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.67
  • 40.126.31.129
  • 20.190.159.71
  • 40.126.31.128
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info