File name:

Hakuna Matata.exe

Full analysis: https://app.any.run/tasks/5d4c3558-f82c-4fe7-b8cf-6890cd82eb8e
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: August 04, 2023, 22:00:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

53714513F52CD22FEBD991B426183D23

SHA1:

AA30879ACAD8593F5C3403EF7C9C725ECA4ABAD2

SHA256:

4DC6435686DAF4886E5F7741C7238298787BA73AB603C0083E4B4C632E85B3FD

SSDEEP:

3072:0c/gHkq0fmS3vSW1NKq099992222Z99992222M5gGhg+HsFVTixz99992222o:0c/d+adxHsFVT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts Visual C# compiler

      • Hakuna Matata.exe (PID: 2804)
    • Application was dropped or rewritten from another process

      • test.exe (PID: 1452)
    • Renames files like ransomware

      • test.exe (PID: 1452)
  • SUSPICIOUS

    • The process checks if it is being run in the virtual environment

      • Hakuna Matata.exe (PID: 2804)
    • Reads the Internet Settings

      • Hakuna Matata.exe (PID: 2804)
    • Uses .NET C# to load dll

      • Hakuna Matata.exe (PID: 2804)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 4012)
      • csc.exe (PID: 2684)
    • Creates files like ransomware instruction

      • test.exe (PID: 1452)
  • INFO

    • Checks supported languages

      • Hakuna Matata.exe (PID: 2804)
      • csc.exe (PID: 4012)
      • cvtres.exe (PID: 3676)
      • csc.exe (PID: 2684)
      • cvtres.exe (PID: 3504)
      • test.exe (PID: 1452)
    • Reads the machine GUID from the registry

      • cvtres.exe (PID: 3504)
      • Hakuna Matata.exe (PID: 2804)
      • csc.exe (PID: 4012)
      • csc.exe (PID: 2684)
      • cvtres.exe (PID: 3676)
      • test.exe (PID: 1452)
    • The process checks LSA protection

      • Hakuna Matata.exe (PID: 2804)
      • csc.exe (PID: 4012)
      • cvtres.exe (PID: 3676)
      • csc.exe (PID: 2684)
      • cvtres.exe (PID: 3504)
      • test.exe (PID: 1452)
    • Reads the computer name

      • Hakuna Matata.exe (PID: 2804)
      • test.exe (PID: 1452)
    • Create files in a temporary directory

      • Hakuna Matata.exe (PID: 2804)
      • cvtres.exe (PID: 3676)
      • cvtres.exe (PID: 3504)
      • test.exe (PID: 1452)
    • Manual execution by a user

      • test.exe (PID: 1452)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

AssemblyVersion: 1.7.0.0
ProductVersion: 1.7.0.0
ProductName: Hakuna Matata
OriginalFileName: Hakuna Matata.exe
LegalTrademarks: -
LegalCopyright: Copyright © ModernAesthetics 2020
InternalName: Hakuna Matata.exe
FileVersion: 1.7.0.0
FileDescription: Hakuna Matata
CompanyName: ModernAesthetics
Comments: Sleek Modern Login via SQL Connection
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.7.0.0
FileVersionNumber: 1.7.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x44706
UninitializedDataSize: -
InitializedDataSize: 86016
CodeSize: 272384
LinkerVersion: 48
PEType: PE32
ImageFileCharacteristics: Executable, Large address aware
TimeStamp: 2079:10:27 06:26:20+00:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 27-Oct-2079 06:26:20
Debug artifacts:
  • C:\Users\HelpDesk\Desktop\hakuna\ModernLogin\obj\Debug\Hakuna Matata.pdb
Comments: Sleek Modern Login via SQL Connection
CompanyName: ModernAesthetics
FileDescription: Hakuna Matata
FileVersion: 1.7.0.0
InternalName: Hakuna Matata.exe
LegalCopyright: Copyright © ModernAesthetics 2020
LegalTrademarks: -
OriginalFilename: Hakuna Matata.exe
ProductName: Hakuna Matata
ProductVersion: 1.7.0.0
Assembly Version: 1.7.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 27-Oct-2079 06:26:20
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x0004274C
0x00042800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.17363
.rsrc
0x00046000
0x00014D64
0x00014E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.98459
.reloc
0x0005C000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.00112
490
UNKNOWN
UNKNOWN
RT_MANIFEST
32512
2.08048
20
UNKNOWN
UNKNOWN
RT_GROUP_ICON

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hakuna matata.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs test.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1452"C:\Users\admin\Desktop\test.exe" C:\Users\admin\Desktop\test.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\test.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2684"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\el5tkhkt.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
Hakuna Matata.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcr120_clr0400.dll
2804"C:\Users\admin\AppData\Local\Temp\Hakuna Matata.exe" C:\Users\admin\AppData\Local\Temp\Hakuna Matata.exeexplorer.exe
User:
admin
Company:
ModernAesthetics
Integrity Level:
MEDIUM
Description:
Hakuna Matata
Exit code:
0
Version:
1.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\hakuna matata.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3504C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESF410.tmp" "c:\Users\admin\Desktop\CSC4A358995799343669856F5E8F01BE1FE.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
12.00.51209.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\cryptsp.dll
3676C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESEDC6.tmp" "c:\Users\admin\Desktop\CSC95167AF5A2514E17B76367B3AC7A686.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
12.00.51209.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\cryptsp.dll
4012"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\jjbrazxe.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
Hakuna Matata.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\ole32.dll
Total events
2 354
Read events
2 299
Write events
52
Delete events
3

Modification events

(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
07000000020000000000000006000000010000000C0000000B0000000D0000000A0000000900000008000000030000000500000004000000FFFFFFFF
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
02000000070000000000000006000000010000000C0000000B0000000D0000000A0000000900000008000000030000000500000004000000FFFFFFFF
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_FolderType
Value:
{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_TopViewID
Value:
{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_TopViewVersion
Value:
0
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:Mode
Value:
4
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:LogicalViewMode
Value:
1
(PID) Process:(2804) Hakuna Matata.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:FFlags
Value:
1
Executable files
2
Suspicious files
90
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
4012csc.exeC:\Users\admin\Desktop\test.exeexecutable
MD5:E790CA7A00F2C1BC2DD908864EEDD8EA
SHA256:CEE4CBDF263913E76F28BBCB7293C45C3CF811DCDF48F9CFA11BA515E8E3FDDB
3676cvtres.exeC:\Users\admin\AppData\Local\Temp\RESEDC6.tmpbinary
MD5:45A12EB95F0F9F64E2F1734EBB0588C8
SHA256:C9289A3884910BAC9CFF9B7E2A7356D377E38C4278C090C9F5374DE6B3EB4633
2684csc.exeC:\Users\admin\AppData\Local\Temp\el5tkhkt.outtext
MD5:112D6945E509650C5B5FF78DA3E19D1D
SHA256:2202BD618A3FDF81AAC675A6E08714B7B208E19BB3A589D50636D99AA059576D
1452test.exeC:\Users\admin\Desktop\acrossfacility.jpgbinary
MD5:F139582CAA53FEC519A5DEA56EAD84FB
SHA256:D443EC92F6B9D0F480DFC42DBE8BA123C8EEF28AC95E3AD0349B45FEFD49E80B
1452test.exeC:\Users\admin\Desktop\Readme.txttext
MD5:B20421F2F23D1501C169A63D360AF5E7
SHA256:968F31FA5B8362C239AD514D67692D05132F2BA48CDCD1F8C5659F130C0C6011
2684csc.exeC:\Users\admin\Desktop\test-decrypter.exeexecutable
MD5:6AD143F096CF6397362FFAD66A3A737A
SHA256:A34FFED12224CF553B6EAC0F51B6E341E5DE6E2B879F7BB15966361CB295AB00
4012csc.exeC:\Users\admin\AppData\Local\Temp\jjbrazxe.outtext
MD5:EF9AFA72DAAFD5211C540D21485C3A30
SHA256:335F12B75029EE400046CF52072C40AAF1A96032D047C05D08EF25427AAC0E0A
2804Hakuna Matata.exeC:\Users\admin\AppData\Local\Temp\jjbrazxe.cmdlinetext
MD5:591B737A9DEC5313BB2462101233E666
SHA256:F28E1B62C655EFF4AA74105B443E97E00E00C4E2A753C1401F29764972CC8209
3504cvtres.exeC:\Users\admin\AppData\Local\Temp\RESF410.tmpbinary
MD5:819FAF937603CC02B0F24B7A98A6F4EF
SHA256:A715A7EAF74FDABB5C21CDDA3A5B54CB1356A80C6828F7812B0C5D5B579A490B
1452test.exeC:\Users\admin\Contacts\admin.contactbinary
MD5:23154CB31691A9084169E45E9931DC09
SHA256:F76AA6E76653C8AA106FB375034808442699565DA30B7119DE70D145264BC8A7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2640
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info