File name:

AzovSample2.zip

Full analysis: https://app.any.run/tasks/7715b804-9f91-44be-ab71-c67737caaa3a
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 01, 2025, 09:49:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
ransomware
azov
wiper
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

DAE1B6964875A294490C61570B5386EB

SHA1:

AE21D5E3159208DC863951E1E4703FE48323911E

SHA256:

7396124F62C5657B362A8CC4857BEBA69A077454B633B53D1BC3C7B7AE4BABF6

SSDEEP:

384:jPnXbsLUGeXJ6BYYDIoJ6zkn2oQ4KxzkFVjY46UPuaFqPiZyV3Lp:j/XAJcJ6BvDJ0zxoQ4KeFmROuasPyyRp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6808)
    • AZOV mutex has been found

      • AzovSample2.exe (PID: 4800)
    • RANSOMWARE has been detected

      • AzovSample2.exe (PID: 4800)
    • Modifies files in the Chrome extension folder

      • AzovSample2.exe (PID: 4800)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • AzovSample2.exe (PID: 4800)
    • Process drops legitimate windows executable

      • AzovSample2.exe (PID: 4800)
    • Executable content was dropped or overwritten

      • AzovSample2.exe (PID: 4800)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6808)
    • Manual execution by a user

      • AzovSample2.exe (PID: 4800)
      • Taskmgr.exe (PID: 3672)
      • Taskmgr.exe (PID: 2072)
    • Creates files in the program directory

      • AzovSample2.exe (PID: 4800)
    • Checks supported languages

      • AzovSample2.exe (PID: 4800)
    • The sample compiled with english language support

      • AzovSample2.exe (PID: 4800)
    • Creates files or folders in the user directory

      • AzovSample2.exe (PID: 4800)
      • Taskmgr.exe (PID: 2072)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 2072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:09:10 08:38:04
ZipCRC: 0xde70ab3b
ZipCompressedSize: 20807
ZipUncompressedSize: 33280
ZipFileName: AzovSample2.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe THREAT azovsample2.exe taskmgr.exe no specs taskmgr.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2072"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
3672"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
3952C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4800"C:\Users\admin\Desktop\AzovSample2.exe" C:\Users\admin\Desktop\AzovSample2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\azovsample2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6808"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\AzovSample2.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
3 251
Read events
3 230
Write events
20
Delete events
1

Modification events

(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\AzovSample2.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
6
Suspicious files
22
Text files
146
Unknown types
755

Dropped files

PID
Process
Filename
Type
4800AzovSample2.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\RESTORE_FILES.txttext
MD5:78EDE93114E65F9160FD03D3357C56E6
SHA256:C97412FBF88DA8F91099A52888DEA4C3F222CD95AF3E681E3271CBCA8B6B7BB5
4800AzovSample2.exeC:\ProgramData\rdpclient.exeexecutable
MD5:3A8464F2CECDF1D89430C64237949F20
SHA256:8CA4B8B7A2F8E6E7D1DF1AE46437FC252CD9C4B78CA3C7ADCAB721BD0F68B358
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exeexecutable
MD5:B9F7D829B5C6E7C0DD8836BDB9A6648B
SHA256:03B86588C2DF2E952D1F512896BC31FCE322A53E974F40F97109B1A24EB78B67
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exeexecutable
MD5:1E6051AA1CE143186369C09002646C59
SHA256:6714D3EF8FB90F555C8E1FA8051512FA0A69409233B630E28964665163CA5588
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.manmp3
MD5:567AE562896B7C6454DD2305E34D5B57
SHA256:07C045E6CD22219508C3CC7BD19FB2C669C22A5A3449D90FA35A2F22C15078E3
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.manmp3
MD5:3D2FABF3CA3A9AB363B8F2F863FEBB45
SHA256:E28593E55F1642BB1A0CFA6879C4D9120B34B120870CD222EB0A0306688070D7
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.jsonmp3
MD5:F46A5E333AB95C9C3F25FBE870250A63
SHA256:926EBDD91A0AFB5C5EAC6F8BD1E9ABA0935795A856DEBEB1CA0A60D3B300DFB9
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exeexecutable
MD5:9740F9E38432E3FAC2AB229D046CDAF8
SHA256:D053B00020D2BF16D3889459F92704F3228A041AD77301C4FF2DCA8144AF11D1
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.catmp3
MD5:BE4E2B931ED43C1CE5E70C1ECC4F1BCD
SHA256:A26023173FE4E4E548899429B5263EB3C8F5A784B97B7AB703D88970F9ED53E2
4800AzovSample2.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xmlmp3
MD5:D2799F66303F3035F0062E305844CBD9
SHA256:5B472DF282A04F1F12A4BDC94BBBBF7CE66463B6F3A979DEF7B062AF9D2E3AE6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.16.241.14:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6672
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1036
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1036
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6732
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
2.16.241.14:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
6672
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6672
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 172.217.16.142
whitelisted
crl.microsoft.com
  • 2.16.241.14
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.0
  • 40.126.31.2
  • 20.190.159.73
  • 20.190.159.23
  • 20.190.159.129
  • 20.190.159.68
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info