File name:

DeriaLock.exe

Full analysis: https://app.any.run/tasks/bfadc74f-4c92-472d-a4de-9bfccda53f44
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 29, 2025, 22:02:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 4 sections
MD5:

0A7B70EFBA0AA93D4BC0857B87AC2FCB

SHA1:

01A6C963B2F5F36FF21A1043587DCF921AE5F5CD

SHA256:

4F5BFF64160044D9A769AB277FF85BA954E2A2E182C6DA4D0672790CF1D48309

SSDEEP:

6144:lqHKx3YCgy8HmmjJpnVhvLqCO3bLinIz1wASxQ:lqHoyHNj/nVhvLcyIIQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • DeriaLock.exe (PID: 6044)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:12:26 08:58:11+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 321024
InitializedDataSize: 173568
UninitializedDataSize: -
EntryPoint: 0x5057e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.1.1.1
ProductVersionNumber: 1.1.1.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Generator
CompanyName: Microsoft
FileDescription: Generator
FileVersion: 1.1.1.1
InternalName: LOGON.exe
LegalCopyright: Copyright © 2016
LegalTrademarks: Microsoft
OriginalFileName: LOGON.exe
ProductName: Generator
ProductVersion: 1.1.1.1
AssemblyVersion: 1.1.1.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT derialock.exe searchapp.exe no specs derialock.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4620"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Search application
Exit code:
2147945463
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
6044"C:\Users\admin\AppData\Local\Temp\DeriaLock.exe" C:\Users\admin\AppData\Local\Temp\DeriaLock.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Generator
Version:
1.1.1.1
Modules
Images
c:\windows\syswow64\textinputframework.dll
c:\windows\syswow64\coreuicomponents.dll
c:\windows\syswow64\coremessaging.dll
c:\windows\syswow64\ntmarta.dll
c:\windows\syswow64\wintypes.dll
6488"C:\Users\admin\AppData\Local\Temp\DeriaLock.exe" C:\Users\admin\AppData\Local\Temp\DeriaLock.exeexplorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Generator
Exit code:
3221226540
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\derialock.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
14
Read events
14
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
29
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6044DeriaLock.exeC:\Users\admin\Documents\theirpet.rtf.deriabinary
MD5:E8D81980E1DD0367D72DA3D152D8650C
SHA256:BC69B081FEF683C26223D6EFE62C918C13D3EB84A5170C83F38D992FD994EC4A
6044DeriaLock.exeC:\Users\admin\Pictures\accommodationoverview.jpg.deriabinary
MD5:BE9AE7529943E98E8DAFFF3411DB69BC
SHA256:7BECED390EC42F19810BBC408776C3F4974ADCAD61F2992453356F06F26A187E
6044DeriaLock.exeC:\Users\admin\Documents\listendigital.rtf.deriabinary
MD5:5CDB76B5A8B9EB4EEC67A7CD4236245E
SHA256:4375093F2F0A2AC381EE08ECE967E96DB93055D15A0E0BBEDD1A56E4769F7FD5
6044DeriaLock.exeC:\Users\admin\Documents\theirprocess.rtf.deriabinary
MD5:FAED7FD40A80FCB1E1AA6C8AE87628A7
SHA256:F782172762BD5144A3DE21CC3EFC812D244CEEA9E01A100F808637DC6AE797AE
6044DeriaLock.exeC:\Users\admin\Documents\desktop.ini.deriabinary
MD5:56544FF9A9A659E62E4FBACD214606F5
SHA256:4E80BF07432C5E6C9D9FF2112B6DD8D5705C4261B724F930F6D39A0692875D4D
6044DeriaLock.exeC:\Users\admin\Documents\Database1.accdb.deriabinary
MD5:7963E7FCF2B789476CFFE2190C8B1DD6
SHA256:A6AA9BF095A0D0B5A91B7914566000ABC4B42D7C0B72417E1AAE0CEC7113BA03
6044DeriaLock.exeC:\Users\admin\Downloads\followingperformance.jpg.deriabinary
MD5:5D06D3A6F93D333A7D108C299E176524
SHA256:A9153565E5C7AB341E99267DEF58F08BB7B44B9BB10E193A760DCE64F4CDE803
6044DeriaLock.exeC:\Users\admin\Pictures\wineclick.png.deriabinary
MD5:2EE37B7FBA44C7223FA81136E92899BB
SHA256:6F8DEEF76E2221EF47CB9F0B18E84092944485DBEA8C8EA9382A5A9FDFFF85C7
6044DeriaLock.exeC:\Users\admin\Downloads\gomale.png.deriabinary
MD5:2EB319CC8B825A6C144AD389E4DC7189
SHA256:F40BF10DF954314363E015CFACC04B85EFA52F097CE44ACD3202DC876CCB553A
6044DeriaLock.exeC:\Users\admin\Downloads\homepageads.jpg.deriabinary
MD5:0245FF5037153BC1450B1F0F8FDACF59
SHA256:C4C1B22CF5F554D4421266A99ABC48E20CF22CC5FF09FBCCA52AE588EB800013
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
32
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/UNLOCKKEYS/LOGON.exe
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
162.55.0.137:80
arizonacode.bplaced.net
Hetzner Online GmbH
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6112
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6112
SIHClient.exe
40.69.42.241:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
arizonacode.bplaced.net
  • 162.55.0.137
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
  • 2a01:111:f100:a000::4134:4847
whitelisted
241.42.69.40.in-addr.arpa
unknown
7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
unknown

Threats

No threats detected
No debug info