File name:

HASH.zip

Full analysis: https://app.any.run/tasks/0935f254-1097-4983-8dc6-373536cf0ac1
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 14, 2024, 11:25:13
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
jigsaw
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B877491211BFCFF842912FD055588799

SHA1:

D19E7A79B08BAE01B00AC447F6CFD236EF055474

SHA256:

6D230F1F3A10F78741545A9D6FBD43BBB0A6A55FEFCA245760D5DB92AC3CC1CD

SSDEEP:

6144:zY4/Ezz+ML2q7kvNcezVavJdZP/B8ccT:z2XAGmNpdccT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4864)
    • Changes the autorun value in the registry

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • JIGSAW has been detected

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • RANSOMWARE has been detected

      • drpbx.exe (PID: 6884)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4864)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Executable content was dropped or overwritten

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Reads the date of Windows installation

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Starts itself from another location

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Creates file in the systems drive root

      • drpbx.exe (PID: 6884)
  • INFO

    • Creates files or folders in the user directory

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Checks supported languages

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
      • drpbx.exe (PID: 6884)
    • Reads the computer name

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
      • drpbx.exe (PID: 6884)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 4864)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4864)
    • Process checks computer location settings

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 6824)
    • Creates files in the program directory

      • drpbx.exe (PID: 6884)
    • Reads the machine GUID from the registry

      • drpbx.exe (PID: 6884)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 2773e3dc59472296cb0024ba7715a64e.exe
ZipUncompressedSize: 290304
ZipCompressedSize: 242871
ZipCRC: 0x3c351d58
ZipModifyDate: 2016:04:13 18:02:34
ZipCompression: Deflated
ZipBitFlag: 0x0001
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #JIGSAW 2773e3dc59472296cb0024ba7715a64e.exe THREAT drpbx.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4864"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\HASH.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6824"C:\Users\admin\AppData\Local\Temp\Rar$EXb4864.33172\2773e3dc59472296cb0024ba7715a64e.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4864.33172\2773e3dc59472296cb0024ba7715a64e.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb4864.33172\2773e3dc59472296cb0024ba7715a64e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6884"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb4864.33172\2773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe
2773e3dc59472296cb0024ba7715a64e.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
10 245
Read events
10 217
Write events
15
Delete events
13

Modification events

(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HASH.zip
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4864) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6824) 2773e3dc59472296cb0024ba7715a64e.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:firefox.exe
Value:
C:\Users\admin\AppData\Roaming\Frfx\firefox.exe
Executable files
4
Suspicious files
28
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6884drpbx.exeC:\Users\admin\Documents\Database1.accdb.funbinary
MD5:EE9E047AA1E8541C84F47BC7F0B8035A
SHA256:BEAC5CD010757E313D0ED73AA9778C72533A5015AB6CDE8C82099FE43FF94DBF
6884drpbx.exeC:\Users\admin\Desktop\maturesony.rtf.funbinary
MD5:8C0433C6F441B76F413772F1C90853CA
SHA256:91B489C1704CF7AAB93DC5D61058B09E544D7F547840893DC9965F674F9B8467
6884drpbx.exeC:\Users\admin\Documents\alreadyaudio.rtf.funbinary
MD5:5F24C64749168BB6172C1E1E5ED5EFF6
SHA256:A156BD4BED163081AD927F4732B687496ACBDA2AA86CAA74B916BD72B5C4D605
6884drpbx.exeC:\Users\admin\Desktop\windcountries.png.funbinary
MD5:3B885C2B1C5556D3CFFF8EA7DCBA28C1
SHA256:3C1EB01C2DE84863D042E8FF503C59DCE5BFBD59800926800FEF4AA24FDD43B6
6884drpbx.exeC:\Users\admin\Documents\includeforum.rtf.funbinary
MD5:E5C2A3E82CD0AF7B1225B92093A7D0C8
SHA256:C9DF37719FF9D0B6150B49591D334A0A7CEF6469906A60FA9950FEF774992191
6884drpbx.exeC:\Users\admin\Desktop\russiancosts.rtf.funbinary
MD5:D44B647BFB8ABEF57877EE224008F1DB
SHA256:69AD0A8496E04C02A7725C43C7A732C9F17E57100F45B901A261CBAABDF5B75A
6884drpbx.exeC:\Users\admin\Documents\addedchinese.rtf.funbinary
MD5:41AFB230AC897F37ED261B427299D479
SHA256:99E52551797F4ACE69B2F80282F071CEDB455472C18D42E32765EDA2B9973568
6884drpbx.exeC:\Users\admin\Documents\analysiscode.rtf.funbinary
MD5:41A0076302E1AA82A32D27408E23616F
SHA256:50C602EFD6996757C742059C66551B6A49A0D5F622575AFCDE673A47B8F15E36
6884drpbx.exeC:\Users\admin\Desktop\contentsfile.png.funbinary
MD5:EE47D3D038D5755AA91FB3C667B3E7DF
SHA256:1659160DED3A70956E426DD54669BECCF6AC0EE03DFD51A27B0ECE3F2A4E4F13
68242773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Roaming\Frfx\firefox.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
31
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7144
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7144
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6328
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6328
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.170:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.bing.com
  • 104.126.37.170
  • 104.126.37.171
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.162
  • 104.126.37.155
  • 104.126.37.145
  • 104.126.37.163
  • 104.126.37.144
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.0
  • 40.126.31.71
  • 20.190.159.64
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.105.99.58
whitelisted

Threats

No threats detected
No debug info