File name:

HASH.zip

Full analysis: https://app.any.run/tasks/a0a004b2-d365-4281-bc62-dedae8224008
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 13, 2024, 21:12:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
jigsaw
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B877491211BFCFF842912FD055588799

SHA1:

D19E7A79B08BAE01B00AC447F6CFD236EF055474

SHA256:

6D230F1F3A10F78741545A9D6FBD43BBB0A6A55FEFCA245760D5DB92AC3CC1CD

SSDEEP:

6144:zY4/Ezz+ML2q7kvNcezVavJdZP/B8ccT:z2XAGmNpdccT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • JIGSAW has been detected

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
    • Changes the autorun value in the registry

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 5640)
    • Generic archive extractor

      • WinRAR.exe (PID: 628)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
      • WinRAR.exe (PID: 628)
    • Starts itself from another location

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
    • Executable content was dropped or overwritten

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 628)
    • The process uses the downloaded file

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
      • WinRAR.exe (PID: 628)
    • Checks supported languages

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 3696)
      • drpbx.exe (PID: 4516)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 5640)
    • Reads the computer name

      • drpbx.exe (PID: 4516)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 5640)
    • Reads the machine GUID from the registry

      • drpbx.exe (PID: 4516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2016:04:13 18:02:34
ZipCRC: 0x3c351d58
ZipCompressedSize: 242871
ZipUncompressedSize: 290304
ZipFileName: 2773e3dc59472296cb0024ba7715a64e.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe #JIGSAW 2773e3dc59472296cb0024ba7715a64e.exe drpbx.exe no specs 2773e3dc59472296cb0024ba7715a64e.exe

Process information

PID
CMD
Path
Indicators
Parent process
628"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\HASH.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3696"C:\Users\admin\AppData\Local\Temp\Rar$EXb628.14822\2773e3dc59472296cb0024ba7715a64e.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb628.14822\2773e3dc59472296cb0024ba7715a64e.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb628.14822\2773e3dc59472296cb0024ba7715a64e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4516"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb628.14822\2773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe2773e3dc59472296cb0024ba7715a64e.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5640"C:\Users\admin\AppData\Local\Temp\Rar$EXb628.19138\2773e3dc59472296cb0024ba7715a64e.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb628.19138\2773e3dc59472296cb0024ba7715a64e.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb628.19138\2773e3dc59472296cb0024ba7715a64e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
5 313
Read events
5 299
Write events
14
Delete events
0

Modification events

(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HASH.zip
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
1
Executable files
4
Suspicious files
22
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4516drpbx.exeC:\Users\admin\Desktop\thomasengineering.rtf.funbinary
MD5:D023ED55D63BCCA7A9A0C99B590AE69A
SHA256:C5F8B313B5DDEAD3C2A8F5AED33D8E624D863B07A3909C8B00818C4AB461610D
4516drpbx.exeC:\Users\admin\Documents\easilyseller.rtf.funbinary
MD5:310A0E61497ED421F36E7AE6BE9B8393
SHA256:BB5B8347B041296690E6A2AE825316F49E154B6B84ACD04ECFF3C1D33DEB3589
4516drpbx.exeC:\Users\admin\Desktop\italyothers.png.funbinary
MD5:7AC36B58885C45796B17C7B80F4C905A
SHA256:6232E167545D0F03F7081044236A07415DDBE92DA47E180C96377F2E9ED92E0F
4516drpbx.exeC:\Users\admin\Desktop\notesblood.rtf.funbinary
MD5:A6F8EF3844B88109586BB8C8B9B0452C
SHA256:0710672DA7C237643649E205C66246BB3B10823F587A2599B1C1D1B4C98EAD7A
4516drpbx.exeC:\Users\admin\Desktop\suretree.png.funbinary
MD5:2E6381109BDB3A7EC0AE5D6E0EF7925F
SHA256:0C26B2BCA1A0BAA9FC19A905F1209F3E992421C73CDC690624DABBADE58C0C2B
4516drpbx.exeC:\Users\admin\Downloads\friendlycountry.png.funbinary
MD5:681B51A78A73CED4A3D11865E73201F8
SHA256:2F0A9D0301313860EAE28D9015202ECD47FA6EB510C9AC26532B55B384F4E5C9
4516drpbx.exeC:\Users\admin\Desktop\helpfulnext.jpg.funbinary
MD5:A230DF090525A255F729810E7E71E973
SHA256:DF60E78B216B6A7F98B74CEAECC3A0A782BD60D4C8EC2C014956ED22A044A8E6
4516drpbx.exeC:\Users\admin\Documents\russiannames.rtf.funbinary
MD5:72869C846831F4E59FD1C4C438F1B1A1
SHA256:7FCE376935F3B1CE43C6CB982EE9D7C16ACC832F8735202A31F18DA8BF7B4602
4516drpbx.exeC:\Users\admin\Desktop\standardsltd.rtf.funbinary
MD5:C5D21B20FDC7F85651011FF0C6CFDF44
SHA256:6EAE998FA0B3E4BCC2C26FE3DFF7A660989501E33E015EACF9970CD450397FA9
4516drpbx.exeC:\Users\admin\Downloads\archivestyle.jpg.funbinary
MD5:77E38D557DB1D33ACAC53F5755F390BC
SHA256:0DC38895E6BA9FEC9B57CD4CDB0A8253A1F7293CAC1A4999575B8648889FA799
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
32
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
188
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6568
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
188
svchost.exe
GET
200
23.48.23.145:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6568
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1480
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
188
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
188
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
188
svchost.exe
23.48.23.145:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
188
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
188
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
92.123.104.33:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.48.23.145
  • 23.48.23.143
  • 23.48.23.180
  • 23.48.23.194
  • 23.48.23.173
  • 23.48.23.177
  • 23.48.23.166
  • 23.48.23.156
  • 23.48.23.176
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.33
  • 92.123.104.29
  • 92.123.104.17
  • 92.123.104.14
  • 92.123.104.16
  • 92.123.104.38
  • 92.123.104.36
  • 92.123.104.19
  • 92.123.104.57
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.134
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.76
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info