File name:

encrypter-windows-x86.exe

Full analysis: https://app.any.run/tasks/854036e4-5de5-4d1e-9bf6-33013e5615d5
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 20, 2024, 22:09:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
beast
ransomware
scan
smb
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

2EB4C4496CE075D5885D74D9273D43B9

SHA1:

5E11FDB2D0E0A646EF8A1B29B648EEF2C5B554A2

SHA256:

6718CB66521A678274E5672285BF208EAC375827D622EDCF1FE7EBA7E7AA65E0

SSDEEP:

1536:kY47B7lxE49JjYuQwHFrW+HvXHFbza6V3cYDg:kY4F7lxEYJjYuQwlrZXHFbO6Vl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • encrypter-windows-x86.exe (PID: 1668)
    • BEAST mutex has been found

      • encrypter-windows-x86.exe (PID: 1668)
    • Attempting to scan the network

      • encrypter-windows-x86.exe (PID: 1668)
    • Attempt to connect to SMB server

      • encrypter-windows-x86.exe (PID: 1668)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • encrypter-windows-x86.exe (PID: 1668)
    • Checks Windows Trust Settings

      • encrypter-windows-x86.exe (PID: 1668)
    • Creates file in the systems drive root

      • encrypter-windows-x86.exe (PID: 1668)
    • Checks for external IP

      • encrypter-windows-x86.exe (PID: 1668)
    • Potential Corporate Privacy Violation

      • encrypter-windows-x86.exe (PID: 1668)
  • INFO

    • Checks supported languages

      • encrypter-windows-x86.exe (PID: 1668)
    • Reads the machine GUID from the registry

      • encrypter-windows-x86.exe (PID: 1668)
    • Reads the computer name

      • encrypter-windows-x86.exe (PID: 1668)
    • Create files in a temporary directory

      • encrypter-windows-x86.exe (PID: 1668)
    • Checks proxy server information

      • encrypter-windows-x86.exe (PID: 1668)
    • Reads the software policy settings

      • encrypter-windows-x86.exe (PID: 1668)
    • Creates files or folders in the user directory

      • encrypter-windows-x86.exe (PID: 1668)
    • Creates files in the program directory

      • encrypter-windows-x86.exe (PID: 1668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:04:28 09:54:23+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 52736
InitializedDataSize: 33792
UninitializedDataSize: -
EntryPoint: 0x68d5
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #BEAST encrypter-windows-x86.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1668"C:\Users\admin\AppData\Local\Temp\encrypter-windows-x86.exe" C:\Users\admin\AppData\Local\Temp\encrypter-windows-x86.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\encrypter-windows-x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7028C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 060
Read events
4 044
Write events
16
Delete events
0

Modification events

(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
840600001B69ED8CF1DADA01
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
D678BB57FA5A4324F5E5FB7FD0E5D19115F7D7450A9A39C8B2680222623E6443
(PID) Process:(1668) encrypter-windows-x86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
Executable files
0
Suspicious files
4
Text files
3
Unknown types
2

Dropped files

PID
Process
Filename
Type
1668encrypter-windows-x86.exeC:\Users\admin\AppData\Local\Temp\default.keybinary
MD5:6B0477C23E5DB4DCE87834666992DBAF
SHA256:06918C0784A7D061AD2CFD4FDF2623429D0B355ED8F42EAC092EBCC52F9230F9
1668encrypter-windows-x86.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12der
MD5:7FB5FA1534DCF77F2125B2403B30A0EE
SHA256:33A39E9EC2133230533A686EC43760026E014A3828C703707ACBC150FE40FD6F
1668encrypter-windows-x86.exeC:\Users\admin\AppData\Local\VirtualStore\README.TXTtext
MD5:5CB49C748F3604B342CDD4451C89FF79
SHA256:491639E41D85C8ADB1EEC59A02141ED67E141E73775C3E900E30AD58773691BA
1668encrypter-windows-x86.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:85D1EB1699CDE6DB8A620895F5FFC682
SHA256:5F8374156F7EC85920967D9CC7B5C27B4AA8621D5516D088CC8264732DB28E02
1668encrypter-windows-x86.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\README.TXTtext
MD5:5CB49C748F3604B342CDD4451C89FF79
SHA256:491639E41D85C8ADB1EEC59A02141ED67E141E73775C3E900E30AD58773691BA
1668encrypter-windows-x86.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:56F029A91A61B9D8F085BB8DC9790914
SHA256:ACA04AA345435040054B08F069E2406C29242DC1EACD86F2850D21B5D742DEF8
1668encrypter-windows-x86.exeC:\bootTel.datvc
MD5:933CC8B728059D2C31B241FFA4AC703C
SHA256:F9B38397B61D47221B505A61E4529A300DC4EFE469B60855B7CD3528219800C2
1668encrypter-windows-x86.exeC:\ProgramData\README.TXTtext
MD5:5CB49C748F3604B342CDD4451C89FF79
SHA256:491639E41D85C8ADB1EEC59A02141ED67E141E73775C3E900E30AD58773691BA
1668encrypter-windows-x86.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8der
MD5:1BFE0A81DB078EA084FF82FE545176FE
SHA256:5BA8817F13EEE00E75158BAD93076AB474A068C6B52686579E0F728FDA68499F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
293
DNS requests
14
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1668
encrypter-windows-x86.exe
GET
200
172.217.16.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
1668
encrypter-windows-x86.exe
GET
200
172.217.16.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4716
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
7856
svchost.exe
4.208.221.206:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5620
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1668
encrypter-windows-x86.exe
104.21.82.93:443
iplogger.co
CLOUDFLARENET
unknown
4
System
192.168.100.255:138
whitelisted
1668
encrypter-windows-x86.exe
172.217.16.131:80
c.pki.goog
GOOGLE
US
whitelisted
2760
svchost.exe
40.115.3.253:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
8116
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.71
  • 20.190.159.23
  • 40.126.31.73
  • 20.190.159.64
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.2
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.181.238
whitelisted
iplogger.co
  • 104.21.82.93
  • 172.67.167.249
shared
c.pki.goog
  • 172.217.16.131
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
licensing.mp.microsoft.com
  • 4.208.221.206
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted

Threats

PID
Process
Class
Message
1668
encrypter-windows-x86.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers inside a home network.
2 ETPRO signatures available at the full report
No debug info