File name:

safecrypt.exe

Full analysis: https://app.any.run/tasks/3a49c193-6c26-414a-b222-1ef99dfb6e54
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 28, 2021, 06:50:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
teslacrypt
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

4A1D88603B1007825A9C6B36D1E5DE44

SHA1:

78A6E76AB32039576B52153B56F2E8BD035222C3

SHA256:

7004AF389D633B82C3EE67055ECB0F9ACCAE5DC0A53721DA66C76825ECE528F8

SSDEEP:

12288:UH2tiySKXkTDj0jxwn8mHiCA092tiySKXkTDj0jxwnvSxU/:7AKXeDj0jkDA0QAKXeDj0jD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • xmimhhn.exe (PID: 3624)
    • TeslaCrypt was detected

      • xmimhhn.exe (PID: 3624)
    • Steals credentials from Web Browsers

      • xmimhhn.exe (PID: 3624)
    • Deletes shadow copies

      • xmimhhn.exe (PID: 3624)
    • Drops executable file immediately after starts

      • safecrypt.exe (PID: 2172)
    • Renames files like Ransomware

      • xmimhhn.exe (PID: 3624)
    • Writes to a start menu file

      • xmimhhn.exe (PID: 3624)
    • Modifies files in Chrome extension folder

      • xmimhhn.exe (PID: 3624)
    • Writes file to Word startup folder

      • xmimhhn.exe (PID: 3624)
    • Actions looks like stealing of personal data

      • xmimhhn.exe (PID: 3624)
  • SUSPICIOUS

    • Starts itself from another location

      • safecrypt.exe (PID: 2172)
    • Application launched itself

      • safecrypt.exe (PID: 3312)
      • xmimhhn.exe (PID: 3548)
    • Drops a file with too old compile date

      • safecrypt.exe (PID: 2172)
    • Starts CMD.EXE for commands execution

      • safecrypt.exe (PID: 2172)
    • Creates files in the user directory

      • safecrypt.exe (PID: 2172)
      • xmimhhn.exe (PID: 3624)
    • Creates files like Ransomware instruction

      • xmimhhn.exe (PID: 3624)
    • Starts Internet Explorer

      • xmimhhn.exe (PID: 3624)
    • Executable content was dropped or overwritten

      • safecrypt.exe (PID: 2172)
    • Executed via COM

      • DllHost.exe (PID: 2160)
    • Creates files in the program directory

      • xmimhhn.exe (PID: 3624)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • xmimhhn.exe (PID: 3624)
    • Application launched itself

      • iexplore.exe (PID: 1504)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1504)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2776)
    • Changes internet zones settings

      • iexplore.exe (PID: 1504)
    • Dropped object may contain TOR URL's

      • xmimhhn.exe (PID: 3624)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2006:06:09 14:59:47+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 266240
InitializedDataSize: 4390912
UninitializedDataSize: -
EntryPoint: 0x41a46
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.8.189.224
ProductVersionNumber: 0.31.175.78
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: Alighting
CompanyName: eSnips Ltd.
FileDescription: Snows Amplification Travails
FileVersion: 152, 162, 60, 63
InternalName: Artery
LegalCopyright: Copyright (C) 2016
LegalTrademarks: Unbar
OriginalFileName: Aintl.EXE
PrivateBuild: 38, 97, 22, 219
ProductName: Silvering Terrains
ProductVersion: 202, 130, 29, 218
SpecialBuild: 171, 248, 221, 121

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 09-Jun-2006 12:59:47
Detected languages:
  • English - United States
Comments: Alighting
CompanyName: eSnips Ltd.
FileDescription: Snows Amplification Travails
FileVersion: 152, 162, 60, 63
InternalName: Artery
LegalCopyright: Copyright (C) 2016
LegalTrademarks: Unbar
OriginalFilename: Aintl.EXE
PrivateBuild: 38, 97, 22, 219
ProductName: Silvering Terrains
ProductVersion: 202, 130, 29, 218
SpecialBuild: 171, 248, 221, 121

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 09-Jun-2006 12:59:47
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00040ED4
0x00041000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.12605
.rdata
0x00042000
0x00031D00
0x00032000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.05843
.data
0x00074000
0x003FAFC4
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.55415
.rsrc
0x0046F000
0x00002438
0x00003000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.23191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.52189
976
UNKNOWN
UNKNOWN
RT_VERSION
680
3.89158
824
UNKNOWN
UNKNOWN
RT_GROUP_ICON
681
5.07631
385
UNKNOWN
UNKNOWN
RT_GROUP_ICON
682
0.177031
558
UNKNOWN
UNKNOWN
RT_GROUP_ICON
683
3.50517
988
UNKNOWN
UNKNOWN
RT_GROUP_ICON
2258
4.01366
917
UNKNOWN
UNKNOWN
RT_DIALOG
2259
3.99128
942
UNKNOWN
UNKNOWN
RT_DIALOG
2260
3.96807
828
UNKNOWN
UNKNOWN
RT_DIALOG
2261
3.87588
543
UNKNOWN
UNKNOWN
RT_DIALOG
2262
3.44262
884
UNKNOWN
UNKNOWN
RT_DIALOG

Imports

ADVAPI32.dll
GDI32.dll
KERNEL32.dll
LZ32.dll
MFC42.DLL
MSVCRT.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
16
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start safecrypt.exe no specs safecrypt.exe xmimhhn.exe no specs cmd.exe no specs #TESLACRYPT xmimhhn.exe bcdedit.exe no specs vssadmin.exe bcdedit.exe no specs bcdedit.exe no specs bcdedit.exe no specs bcdedit.exe no specs notepad.exe no specs iexplore.exe PhotoViewer.dll no specs iexplore.exe no specs vssadmin.exe

Process information

PID
CMD
Path
Indicators
Parent process
572"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet C:\Windows\System32\vssadmin.exe
xmimhhn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
660bcdedit.exe /set {current} bootems offC:\Windows\system32\bcdedit.exexmimhhn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Boot Configuration Data Editor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1160"C:\Windows\system32\cmd.exe" /c DEL C:\Users\admin\AppData\Local\Temp\SAFECR~1.EXEC:\Windows\system32\cmd.exesafecrypt.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1504"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\Desktop\help_recover_instructions.HTMC:\Program Files\Internet Explorer\iexplore.exe
xmimhhn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2156"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet C:\Windows\System32\vssadmin.exe
xmimhhn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2160C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2172"C:\Users\admin\AppData\Local\Temp\safecrypt.exe" C:\Users\admin\AppData\Local\Temp\safecrypt.exe
safecrypt.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\safecrypt.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2292bcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailuresC:\Windows\system32\bcdedit.exexmimhhn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Boot Configuration Data Editor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2664bcdedit.exe /set {current} advancedoptions offC:\Windows\system32\bcdedit.exexmimhhn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Boot Configuration Data Editor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2776"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1504 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
695
Read events
607
Write events
87
Delete events
1

Modification events

(PID) Process:(2172) safecrypt.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2172) safecrypt.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3624) xmimhhn.exeKey:HKEY_CURRENT_USER\Software\xxxsys
Operation:writeName:ID
Value:
279E8FEFB179F044
(PID) Process:(3624) xmimhhn.exeKey:HKEY_CURRENT_USER\Software\279E8FEFB179F044
Operation:writeName:data
Value:
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
(PID) Process:(3624) xmimhhn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:EnableLinkedConnections
Value:
1
(PID) Process:(3624) xmimhhn.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:gatert-12010
Value:
C:\Users\admin\AppData\Roaming\xmimhhn.exe
(PID) Process:(3624) xmimhhn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:gatert-12010
Value:
C:\Users\admin\AppData\Roaming\xmimhhn.exe
(PID) Process:(3624) xmimhhn.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3624) xmimhhn.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3624) xmimhhn.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
1
Suspicious files
425
Text files
2 382
Unknown types
0

Dropped files

PID
Process
Filename
Type
3624xmimhhn.exeC:\Users\admin\.oracle_jre_usage\help_recover_instructions+oun.htmlhtml
MD5:
SHA256:
3624xmimhhn.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\help_recover_instructions+oun.pngimage
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\help_recover_instructions+oun.pngimage
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\Documents\recover_file_fyeevtsmj.txttext
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\help_recover_instructions+oun.htmlhtml
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\help_recover_instructions+oun.txttext
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\help_recover_instructions+oun.htmlhtml
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\help_recover_instructions+oun.txttext
MD5:
SHA256:
3624xmimhhn.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\help_recover_instructions+oun.txttext
MD5:
SHA256:
3624xmimhhn.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\help_recover_instructions+oun.htmlhtml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3624
xmimhhn.exe
POST
176.74.179.58:80
http://bddadmin.desjardins.fr/js/openlayers/theme/default/img/mzsys.php
GB
malicious
1504
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
4.19 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1504
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3624
xmimhhn.exe
176.74.179.58:80
bddadmin.desjardins.fr
Peer 1 Network (USA) Inc.
GB
malicious
1504
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
southinstrument.org
malicious
bddadmin.desjardins.fr
  • 176.74.179.58
malicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info