analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.gz

Full analysis: https://app.any.run/tasks/59fcc472-3118-4314-b949-8d142e1c2b5c
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 21, 2019, 14:24:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/gzip
File info: gzip compressed data, max compression, from Unix
MD5:

48A6F9882E83C180C8B34A098FA42A0B

SHA1:

C14ADAA0C8000CFD20ECFD4175D04F753BED1EED

SHA256:

6A2C91BB38505C7F560E533730F1573240B80E630A26DA8A83774DB045820F21

SSDEEP:

12288:BUCuiaV4D4aHNjGWHnAao7P7PzR/tqpJH7yA9A6/JQX:BmiQ4RGWHnAX7P72t7yAi6/JQX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe (PID: 3276)
      • tgytutrc3938.exe (PID: 3468)
      • c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe (PID: 3816)
      • tgytutrc3938.exe (PID: 2832)
      • tgytutrc3938.exe (PID: 3828)
      • tgytutrc3938.exe (PID: 2124)
      • tgytutrc3938.exe (PID: 3472)
      • tgytutrc3938.exe (PID: 3652)
      • tgytutrc3938.exe (PID: 2304)
      • tgytutrc3938.exe (PID: 3116)
      • tgytutrc3938.exe (PID: 2800)
      • tgytutrc3938.exe (PID: 3604)
      • tgytutrc3938.exe (PID: 3100)
      • tgytutrc3938.exe (PID: 2436)
      • tgytutrc3938.exe (PID: 3532)
      • tgytutrc3938.exe (PID: 3784)
      • tgytutrc3938.exe (PID: 2320)
      • tgytutrc3938.exe (PID: 3048)
      • tgytutrc3938.exe (PID: 3316)
      • tgytutrc3938.exe (PID: 2776)
      • tgytutrc3938.exe (PID: 3068)
      • tgytutrc3938.exe (PID: 3816)
      • tgytutrc3938.exe (PID: 2580)
      • tgytutrc3938.exe (PID: 2268)
      • tgytutrc3938.exe (PID: 3196)
      • tgytutrc3938.exe (PID: 2440)
      • tgytutrc3938.exe (PID: 3812)
      • tgytutrc3938.exe (PID: 2484)
      • tgytutrc3938.exe (PID: 2892)
      • tgytutrc3938.exe (PID: 2424)
      • tgytutrc3938.exe (PID: 2876)
      • tgytutrc3938.exe (PID: 3800)
      • tgytutrc3938.exe (PID: 2604)
      • tgytutrc3938.exe (PID: 2960)
      • tgytutrc3938.exe (PID: 3580)
      • tgytutrc3938.exe (PID: 2460)
      • tgytutrc3938.exe (PID: 2160)
      • tgytutrc3938.exe (PID: 2348)
      • tgytutrc3938.exe (PID: 3000)
      • tgytutrc3938.exe (PID: 2152)
      • tgytutrc3938.exe (PID: 1004)
      • tgytutrc3938.exe (PID: 3928)
      • tgytutrc3938.exe (PID: 2380)
      • tgytutrc3938.exe (PID: 4092)
      • tgytutrc3938.exe (PID: 1460)
      • tgytutrc3938.exe (PID: 2888)
      • tgytutrc3938.exe (PID: 2576)
    • Starts NET.EXE to view/add/change user profiles

      • tgytutrc3938.exe (PID: 3468)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2920)
      • cmd.exe (PID: 2888)
      • tgytutrc3938.exe (PID: 3532)
    • Creates files like Ransomware instruction

      • c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe (PID: 3816)
    • Starts CMD.EXE for commands execution

      • c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe (PID: 3816)
    • Application launched itself

      • tgytutrc3938.exe (PID: 3468)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

Compression: Deflated
Flags: (none)
ModifyDate: 0000:00:00 00:00:00
ExtraFlags: Maximum Compression
OperatingSystem: Unix
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
103
Monitored processes
59
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe no specs c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe cmd.exe tgytutrc3938.exe no specs logoff.exe no specs logoff.exe no specs logoff.exe no specs logoff.exe no specs logoff.exe no specs logoff.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe tgytutrc3938.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2920"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.gz"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3276"C:\Users\admin\Desktop\c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe" C:\Users\admin\Desktop\c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exeexplorer.exe
User:
admin
Company:
ALISA LTD
Integrity Level:
MEDIUM
Description:
Background Tasks Host
Exit code:
3221226540
Version:
1.5.1.0
3816"C:\Users\admin\Desktop\c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe" C:\Users\admin\Desktop\c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
2888C:\Windows\system32\cmd.exe /c move /y C:\Users\admin\Desktop\c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe C:\Users\admin\AppData\Local\Temp\tgytutrc3938.exeC:\Windows\system32\cmd.exe
c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3468C:\Users\admin\AppData\Local\Temp\tgytutrc3938.exe -mC:\Users\admin\AppData\Local\Temp\tgytutrc3938.exec97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.bin.exe
User:
admin
Company:
ALISA LTD
Integrity Level:
HIGH
Description:
Background Tasks Host
Version:
1.5.1.0
2664C:\Windows\system32\logoff.exe 0C:\Windows\system32\logoff.exetgytutrc3938.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Session Logoff Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3004C:\Windows\system32\logoff.exe 0C:\Windows\system32\logoff.exetgytutrc3938.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Session Logoff Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3380C:\Windows\system32\logoff.exe 0C:\Windows\system32\logoff.exetgytutrc3938.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Session Logoff Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3952C:\Windows\system32\logoff.exe 0C:\Windows\system32\logoff.exetgytutrc3938.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Session Logoff Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2272C:\Windows\system32\logoff.exe 0C:\Windows\system32\logoff.exetgytutrc3938.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Session Logoff Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
4 844
Read events
635
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
454
Text files
39
Unknown types
14

Dropped files

PID
Process
Filename
Type
2124tgytutrc3938.exeC:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\Setup.xml.lockedbinary
MD5:AAC5FB4E8AB1885FA2D4D0D41096BE67
SHA256:0DE8E94F57F2D74DE9C2B0598A38E0A0870C2ED4796D315E2D5794AA7DF9E871
3828tgytutrc3938.exeC:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.xml.lockedbinary
MD5:0A85A6AA5B6782798692D516E532AF7F
SHA256:C76DE5D6B080EA003B77A25C30247AAFC5D5682B779EA0BC5C23F713353AB0AD
3472tgytutrc3938.exeC:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proofing.xml.lockedbinary
MD5:D6C0BF3CB32586961C09C1A107052223
SHA256:83421FF447DEB7911CB5F0184BFE4B8786ACBA234668E73D529822932003EEDA
3652tgytutrc3938.exeC:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.xml.lockedbinary
MD5:8FD3708E92C7DAEA0304FC1E87F1106E
SHA256:850424BEFE3C591BA3250CDF7987CE29C0A2D58D69FCA99E294965952E4C304E
2124tgytutrc3938.exeC:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.xml.lockedbinary
MD5:BAD21A07F474AC924A966AFD09FFF874
SHA256:FEEB23E59EFC718E953ABFBFC9785A77257926641DEA396E8BB012D51F84FD59
3652tgytutrc3938.exeC:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUISet.xml.lockedbinary
MD5:3657370AD18E59728DB24A4251F2B2D6
SHA256:1693ABDCCB4EFECA18365221C8FEDE31E7A1A9727D1626451ADB532196214235
2832tgytutrc3938.exeC:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.xml.lockedbinary
MD5:CC7EB8EEAF18F744C81DF40B7B28BB72
SHA256:C0E3980D69FF67A177A52063535489D585A07A8EDC8BD1A026997E38E7D8ED7B
3472tgytutrc3938.exeC:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.xml.lockedbinary
MD5:32FCCA7B509FD6B54B15087C4CE4BC87
SHA256:41148C33866BEFBD34A79CE175FDFCE0F36284BFD7ED950D863803953C5AC653
3828tgytutrc3938.exeC:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Setup.xml.lockedbinary
MD5:A7E00E668B27AAC4D88F4E6C9915E691
SHA256:5D741629B6E1591167EC0E787ECBB3248E9EDF8142EFF983D5CCE246005D1D0C
3828tgytutrc3938.exeC:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUI.xml.lockedbinary
MD5:A764A40724288B00123DE87838FB370E
SHA256:3C79EB9EC3F7708EF82F10E73B43922E41D7BD71D9018F9319CA502D489F699C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proofing.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUISet.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUI.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\Setup.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.xml
tgytutrc3938.exe
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\branding.xml