File name:

HASH.zip

Full analysis: https://app.any.run/tasks/6d5ed7a8-5a2e-4950-b06f-e86468d37c78
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 14, 2024, 11:28:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
jigsaw
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B877491211BFCFF842912FD055588799

SHA1:

D19E7A79B08BAE01B00AC447F6CFD236EF055474

SHA256:

6D230F1F3A10F78741545A9D6FBD43BBB0A6A55FEFCA245760D5DB92AC3CC1CD

SSDEEP:

6144:zY4/Ezz+ML2q7kvNcezVavJdZP/B8ccT:z2XAGmNpdccT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • JIGSAW has been detected

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Changes the autorun value in the registry

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Generic archive extractor

      • WinRAR.exe (PID: 6252)
    • RANSOMWARE has been detected

      • drpbx.exe (PID: 2728)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • drpbx.exe (PID: 2728)
    • Reads the date of Windows installation

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Reads security settings of Internet Explorer

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Starts itself from another location

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Executable content was dropped or overwritten

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
  • INFO

    • Creates files or folders in the user directory

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6252)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Process checks computer location settings

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Manual execution by a user

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Reads the computer name

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
      • drpbx.exe (PID: 2728)
    • Checks supported languages

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
      • drpbx.exe (PID: 2728)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6252)
    • Reads the machine GUID from the registry

      • drpbx.exe (PID: 2728)
    • Creates files in the program directory

      • drpbx.exe (PID: 2728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: 2773e3dc59472296cb0024ba7715a64e.exe
ZipUncompressedSize: 290304
ZipCompressedSize: 242871
ZipCRC: 0x3c351d58
ZipModifyDate: 2016:04:13 18:02:34
ZipCompression: Deflated
ZipBitFlag: 0x0001
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #JIGSAW 2773e3dc59472296cb0024ba7715a64e.exe THREAT drpbx.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6252"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\HASH.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4544"C:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exe" C:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\desktop\2773e3dc59472296cb0024ba7715a64e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2728"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe
2773e3dc59472296cb0024ba7715a64e.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
5 417
Read events
5 381
Write events
23
Delete events
13

Modification events

(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HASH.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
3
Suspicious files
28
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2728drpbx.exeC:\Users\admin\Desktop\dictionarydue.rtf.funbinary
MD5:9B9A0BD049A7477835158C2E6345B3E0
SHA256:974A05DD9C13C78696134FD83800D96CAC3586184C0C89B86D9BA74885E8D82F
45442773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Roaming\Frfx\firefox.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
6252WinRAR.exeC:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
2728drpbx.exeC:\Users\admin\Desktop\maonce.png.funbinary
MD5:F1D75779A0707272A811B13F21385732
SHA256:4BDA6C84A8B137BC6F9A294D15E5FFBDC57B4D6D17DBC5B8F05A64CDC33C204D
2728drpbx.exeC:\Users\admin\Desktop\laterlocations.jpg.funbinary
MD5:FBC543F85FDAE675F3114C0F23005909
SHA256:78D4251362A9FB6D83C6B7CDBA64371C02EFA07D6973D2C5021A39D3BC2770B8
2728drpbx.exeC:\Users\admin\Desktop\greatermonthly.png.funbinary
MD5:E68ED49494663BE21615DE95A493E373
SHA256:24C70FF0099A627B98B3E3EF32BA809DDBF44C5194228FE12C430B6E114BA20E
2728drpbx.exeC:\Users\admin\Desktop\flashtown.rtf.funbinary
MD5:9C058996FD751125B4F8034649AA6C73
SHA256:E5C718F3E3E42909A02797774A22F6C7D5704837AB5E34020A2EFD5F3872539A
2728drpbx.exeC:\Users\admin\Desktop\ensureislands.png.funbinary
MD5:810EA6E826A3800210A572B41B9429AB
SHA256:78DDED560466DCF38B55F3E9E9AC65E3FB08D095D32FB0E75E32643940505A9C
45442773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
2728drpbx.exeC:\Users\admin\Desktop\typecommittee.png.funbinary
MD5:A8F447B27EB5028609CFCE1231D169F0
SHA256:857E66686715DA2C85711C37D0E60898DD1FD3886463BE37101E3FE77B0F8189
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
32
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
448
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
448
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6480
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6480
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3220
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
23.212.110.147:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
www.bing.com
  • 23.212.110.147
  • 23.212.110.153
  • 23.212.110.211
  • 23.212.110.136
  • 23.212.110.219
  • 23.212.110.144
  • 23.212.110.217
  • 23.212.110.208
  • 23.212.110.209
whitelisted
google.com
  • 142.250.185.110
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.71
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.71
  • 20.190.159.73
  • 20.190.159.68
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted

Threats

No threats detected
No debug info