File name:

Endermanch@DeriaLock.exe

Full analysis: https://app.any.run/tasks/fd08b993-b1aa-4251-ae46-9898babf8daf
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 29, 2025, 21:05:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 4 sections
MD5:

0A7B70EFBA0AA93D4BC0857B87AC2FCB

SHA1:

01A6C963B2F5F36FF21A1043587DCF921AE5F5CD

SHA256:

4F5BFF64160044D9A769AB277FF85BA954E2A2E182C6DA4D0672790CF1D48309

SSDEEP:

6144:lqHKx3YCgy8HmmjJpnVhvLqCO3bLinIz1wASxQ:lqHoyHNj/nVhvLcyIIQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • Endermanch@DeriaLock.exe (PID: 7188)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads the computer name

      • Endermanch@DeriaLock.exe (PID: 7188)
    • Creates files or folders in the user directory

      • Endermanch@DeriaLock.exe (PID: 7188)
    • Reads the machine GUID from the registry

      • Endermanch@DeriaLock.exe (PID: 7188)
    • Checks supported languages

      • Endermanch@DeriaLock.exe (PID: 7188)
    • Disables trace logs

      • Endermanch@DeriaLock.exe (PID: 7188)
    • Checks proxy server information

      • Endermanch@DeriaLock.exe (PID: 7188)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:12:26 08:58:11+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 321024
InitializedDataSize: 173568
UninitializedDataSize: -
EntryPoint: 0x5057e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.1.1.1
ProductVersionNumber: 1.1.1.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Generator
CompanyName: Microsoft
FileDescription: Generator
FileVersion: 1.1.1.1
InternalName: LOGON.exe
LegalCopyright: Copyright © 2016
LegalTrademarks: Microsoft
OriginalFileName: LOGON.exe
ProductName: Generator
ProductVersion: 1.1.1.1
AssemblyVersion: 1.1.1.1
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT endermanch@derialock.exe sppextcomobj.exe no specs slui.exe no specs searchapp.exe no specs endermanch@derialock.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6028"C:\Users\admin\AppData\Local\Temp\Endermanch@DeriaLock.exe" C:\Users\admin\AppData\Local\Temp\Endermanch@DeriaLock.exeexplorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Generator
Exit code:
3221226540
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\endermanch@derialock.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7188"C:\Users\admin\AppData\Local\Temp\Endermanch@DeriaLock.exe" C:\Users\admin\AppData\Local\Temp\Endermanch@DeriaLock.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Generator
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\endermanch@derialock.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7224C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7256"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7780"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Search application
Exit code:
2147945463
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
Total events
864
Read events
850
Write events
14
Delete events
0

Modification events

(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7188) Endermanch@DeriaLock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Endermanch@DeriaLock_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
32
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7188Endermanch@DeriaLock.exeC:\Users\admin\Music\desktop.ini.deriabinary
MD5:E1BC4F7581F17635F7728F1BB161F215
SHA256:0FB8C2320E0C8302910E3125CFA7A78E4DA73C7A085F04408D2ECF433A283FC7
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\trafficvacation.rtf.deriabinary
MD5:85F942F1C7D9F4BE896D0396A89598B0
SHA256:BD469F35011A77826B45129C7F8EF8E79E92CDEC6C59FEF8A1571F5F2BA2914A
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\desktop.ini.deriabinary
MD5:56544FF9A9A659E62E4FBACD214606F5
SHA256:4E80BF07432C5E6C9D9FF2112B6DD8D5705C4261B724F930F6D39A0692875D4D
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\Database1.accdb.deriabinary
MD5:7963E7FCF2B789476CFFE2190C8B1DD6
SHA256:A6AA9BF095A0D0B5A91B7914566000ABC4B42D7C0B72417E1AAE0CEC7113BA03
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\doinguser.rtf.deriabinary
MD5:1BB65FCD632432FEE38683CB6C8D2DFA
SHA256:6AA62137FFEA7F5A14FAC3F420E706FECB11C760A5236974F4A472FFC098623A
7188Endermanch@DeriaLock.exeC:\Users\admin\Pictures\sevenintroduction.jpg.deriabinary
MD5:3E379392AB94ADB0EB59A2BE8597E0D8
SHA256:CBEC14F47BBC2801911827B17B6B039E8B3BE6E28EDEBA4102357770649AF676
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\funmother.rtf.deriabinary
MD5:5D6EB53662D204079E005884B5020E5F
SHA256:C648B0CCBF7A67C64FF43FC949FE6117A11B9A2F62FB58EFE7D971C667CED61F
7188Endermanch@DeriaLock.exeC:\Users\admin\Pictures\Camera Roll\desktop.ini.deriabinary
MD5:5A4658C7EC3539DC9E8D262637D74AD1
SHA256:317CC4C673749E23C36D12E669DF0716C3A399DFA784613A7D352033CD07359F
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\skindevice.rtf.deriabinary
MD5:3E5DFE0FD14F6886A3C47034EDB95FA6
SHA256:3742182D1AFC27E4C4545C999B6757C53B3327FE25F8AAF1E2A82BB428FA4B8B
7188Endermanch@DeriaLock.exeC:\Users\admin\Documents\sportscd.rtf.deriabinary
MD5:BA944CFE8461802D138904914E4A6FC2
SHA256:B3054738A2F99C42A2C35DE48C2C6F00D77CC6E5AF9890071D6AB98C1669FCA8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
38
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/UNLOCKKEYS/LOGON.exe
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
7188
Endermanch@DeriaLock.exe
GET
404
162.55.0.137:80
http://arizonacode.bplaced.net/HF/SystemLocker/unlock-everybody.txt
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7188
Endermanch@DeriaLock.exe
162.55.0.137:80
arizonacode.bplaced.net
Hetzner Online GmbH
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7836
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
arizonacode.bplaced.net
  • 162.55.0.137
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.128
  • 40.126.31.130
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.129
  • 40.126.31.73
  • 40.126.31.131
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
  • 2a01:111:f100:9001::1761:914d
whitelisted
171.39.242.20.in-addr.arpa
unknown
d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
unknown

Threats

No threats detected
No debug info