| download: | Ransomware.Cryptowall.zip |
| Full analysis: | https://app.any.run/tasks/03deffcd-09cf-47df-9025-de6aaa79ca85 |
| Verdict: | Malicious activity |
| Threats: | CryptoWall is a notorious ransomware family that emerged in early 2014 and rapidly became one of the most destructive cyber threats of its time. This malware encrypts victims' files using strong AES encryption, demands ransom payments in Bitcoin, and has generated hundreds of millions of dollars for cybercriminals. |
| Analysis date: | January 24, 2022, 16:58:49 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | 8710EA46C2DB18965A3F13C5FB7C5BE8 |
| SHA1: | 24978C79B5B4B3796ADCEFFE06A3A39B33DDA41D |
| SHA256: | 60D574055AE164CC32DF9E5C9402DEEFA9D07E5034328D7B41457D35B7312A0E |
| SSDEEP: | 3072:OCDc19avf1fHqOhdzVD/9Ae7RT5f6IiL+WfXS21o4D:OCD0QvlqGRlAlX+sXjo4D |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipFileName: | cryptowall.bin |
|---|---|
| ZipUncompressedSize: | 246272 |
| ZipCompressedSize: | 102838 |
| ZipCRC: | 0x6baaab1e |
| ZipModifyDate: | 2015:02:09 22:05:26 |
| ZipCompression: | Deflated |
| ZipBitFlag: | 0x0009 |
| ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1384 | "C:\Windows\explorer.exe" | C:\Windows\explorer.exe | cryptowall.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2112 | "C:\Users\admin\Desktop\cryptowall.exe" | C:\Users\admin\Desktop\cryptowall.exe | — | cryptowall.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2220 | -k netsvcs | C:\Windows\system32\svchost.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3500 | bcdedit /set {default} recoveryenabled No | C:\Windows\system32\bcdedit.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Boot Configuration Data Editor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3684 | vssadmin.exe Delete Shadows /All /Quiet | C:\Windows\system32\vssadmin.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Command Line Interface for Microsoft� Volume Shadow Copy Service Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3720 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Ransomware.Cryptowall.zip" | C:\Program Files\WinRAR\WinRAR.exe | Explorer.EXE | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 3800 | bcdedit /set {default} bootstatuspolicy ignoreallfailures | C:\Windows\system32\bcdedit.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Boot Configuration Data Editor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3896 | "C:\Users\admin\Desktop\cryptowall.exe" | C:\Users\admin\Desktop\cryptowall.exe | — | Explorer.EXE | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Ransomware.Cryptowall.zip | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3720) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | der | |
MD5:— | SHA256:— | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13 | binary | |
MD5:— | SHA256:— | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13 | der | |
MD5:— | SHA256:— | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\19CB7CB85F3C1BAA0B50740305CB83A0_E82339634BA2CD03EAD3AF4785D65A60 | der | |
MD5:— | SHA256:— | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | binary | |
MD5:— | SHA256:— | |||
| 1384 | explorer.exe | C:\46695237\46695237.exe | executable | |
MD5:47363B94CEE907E2B8926C1BE61150C7 | SHA256:45317968759D3E37282CEB75149F627D648534C5B4685F6DA3966D8F6FCA662D | |||
| 1384 | explorer.exe | C:\Users\admin\AppData\Roaming\46695237.exe | executable | |
MD5:47363B94CEE907E2B8926C1BE61150C7 | SHA256:45317968759D3E37282CEB75149F627D648534C5B4685F6DA3966D8F6FCA662D | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | compressed | |
MD5:F7DCB24540769805E5BB30D193944DCE | SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA | |||
| 2220 | svchost.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19CB7CB85F3C1BAA0B50740305CB83A0_E82339634BA2CD03EAD3AF4785D65A60 | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2220 | svchost.exe | GET | — | 184.106.112.172:80 | http://curlmyip.com/ | US | — | — | malicious |
2220 | svchost.exe | POST | — | 94.247.31.19:8080 | http://proxy1-1-1.i2p/sb8unrxt7yyu0 | ES | — | — | malicious |
2220 | svchost.exe | POST | — | 94.247.31.19:8080 | http://proxy2-2-2.i2p/sb8unrxt7yyu0 | ES | — | — | malicious |
2220 | svchost.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
2220 | svchost.exe | POST | — | 94.247.31.19:8080 | http://proxy2-2-2.i2p/8pa639492ew0 | ES | — | — | malicious |
2220 | svchost.exe | GET | 308 | 188.165.164.184:80 | http://ip-addr.es/ | FR | html | 164 b | shared |
2220 | svchost.exe | POST | — | 94.247.31.19:8080 | http://proxy1-1-1.i2p/n4rlned77xg | ES | — | — | malicious |
2220 | svchost.exe | GET | 308 | 188.165.164.184:80 | http://ip-addr.es/ | FR | html | 164 b | shared |
2220 | svchost.exe | GET | 302 | 34.117.59.81:80 | http://myexternalip.com/raw | US | text | 50 b | shared |
2220 | svchost.exe | GET | 302 | 34.117.59.81:80 | http://myexternalip.com/raw | US | text | 50 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2220 | svchost.exe | 188.165.164.184:80 | ip-addr.es | OVH SAS | FR | suspicious |
2220 | svchost.exe | 23.32.238.208:80 | ctldl.windowsupdate.com | XO Communications | US | unknown |
2220 | svchost.exe | 34.117.59.81:443 | myexternalip.com | — | US | whitelisted |
2220 | svchost.exe | 142.250.186.131:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
2220 | svchost.exe | 94.247.28.156:8081 | — | ELB Multimedia SARL | FR | suspicious |
— | — | 94.247.28.26:2525 | — | ELB Multimedia SARL | FR | unknown |
2220 | svchost.exe | 94.247.31.19:8080 | — | ELB Multimedia SARL | ES | malicious |
2220 | svchost.exe | 184.106.112.172:80 | curlmyip.com | Rackspace Ltd. | US | suspicious |
2220 | svchost.exe | 34.117.59.81:80 | myexternalip.com | — | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
ip-addr.es |
| shared |
myexternalip.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
dns.msftncsi.com |
| shared |
curlmyip.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2220 | svchost.exe | A Network Trojan was detected | ET POLICY Possible IP Check ip-addr.es |
2220 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY External IP Check myexternalip.com |
2220 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY IP Check Domain (myexternalip .com in TLS SNI) |
2220 | svchost.exe | A Network Trojan was detected | ET TROJAN CryptoWall Check-in |
2220 | svchost.exe | A Network Trojan was detected | ET TROJAN CryptoWall CryptoWall 3.0 Check-in |
2220 | svchost.exe | A Network Trojan was detected | ET TROJAN CryptoWall Check-in |
2220 | svchost.exe | A Network Trojan was detected | ET TROJAN CryptoWall CryptoWall 3.0 Check-in |
2220 | svchost.exe | A Network Trojan was detected | ET POLICY Possible IP Check ip-addr.es |
2220 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY External IP Check myexternalip.com |
2220 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY IP Check Domain (myexternalip .com in TLS SNI) |