File name:

gopher.exe

Full analysis: https://app.any.run/tasks/cffd9154-373a-41d2-8f1d-b0f297424f6b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: May 23, 2025, 06:38:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 10 sections
MD5:

49C94F915BE2A39FBA3133FE68065FD8

SHA1:

15FBF78B2CB4A8FB37DF421E2A225069AA9A134D

SHA256:

79D150AF704A6D7128ED909344E3B204766CCEC80E83D3C9C42B647F355916B5

SSDEEP:

196608:mg6trqbK5Fds8IeNw+IY7cotNZfh6J5/78GUJ1YQzVDFSYO4cvyMH0AE5ORFU41H:NAF9ShKJ1YQzVDFSt4qVH5URvQCk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • gopher.exe (PID: 3008)
  • SUSPICIOUS

    • Write to the desktop.ini file (may be used to cloak folders)

      • gopher.exe (PID: 3008)
    • Reads security settings of Internet Explorer

      • gopher.exe (PID: 3008)
    • Reads the date of Windows installation

      • gopher.exe (PID: 3008)
    • Starts CMD.EXE for commands execution

      • gopher.exe (PID: 3008)
    • Executing commands from a ".bat" file

      • gopher.exe (PID: 3008)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4272)
  • INFO

    • Creates files in the program directory

      • gopher.exe (PID: 3008)
    • Create files in a temporary directory

      • gopher.exe (PID: 3008)
    • Checks supported languages

      • gopher.exe (PID: 3008)
      • chcp.com (PID: 1512)
    • Reads the computer name

      • gopher.exe (PID: 3008)
    • Process checks computer location settings

      • gopher.exe (PID: 3008)
    • Changes the display of characters in the console

      • cmd.exe (PID: 4272)
    • Reads the software policy settings

      • slui.exe (PID: 7980)
    • Checks proxy server information

      • slui.exe (PID: 7980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:15 17:29:11+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 6372352
InitializedDataSize: 3281408
UninitializedDataSize: -
EntryPoint: 0x5c98d0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: gopher
FileDescription: gopher
FileVersion: 1.0.0.0
InternalName: gopher.dll
LegalCopyright:
OriginalFileName: gopher.dll
ProductName: gopher
ProductVersion: 1.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT gopher.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs rundll32.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
780\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exegopher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1512chcp 65001 C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
3008"C:\Users\admin\Desktop\gopher.exe" C:\Users\admin\Desktop\gopher.exe
explorer.exe
User:
admin
Company:
gopher
Integrity Level:
MEDIUM
Description:
gopher
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\gopher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4272"C:\Windows\System32\cmd.exe" /C "C:\Users\admin\AppData\Local\Temp\gopherware_decryptor.bat"C:\Windows\System32\cmd.exegopher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
6372C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7980C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 955
Read events
3 955
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
51
Text files
52
Unknown types
0

Dropped files

PID
Process
Filename
Type
3008gopher.exeC:\Users\admin\AppData\Local\Temp\GopherSecure_sd5svqmp.gpu\gopher.exe
MD5:
SHA256:
3008gopher.exeC:\Users\admin\Desktop\gopher.exe.enc
MD5:
SHA256:
3008gopher.exeC:\Users\admin\AppData\Local\Temp\GopherSecure_sd5svqmp.gpu\beentry.rtftext
MD5:ABBF07542C49BC8869531F4E5DFA4A8C
SHA256:78929E6F9B8C6686D7BE74EADBC009CEA89F6046C32BAD03D6F5A2A610CC461F
3008gopher.exeC:\Users\admin\AppData\Local\Temp\GopherSecure_sd5svqmp.gpu\antifurther.rtftext
MD5:EE676911006882B53A500063920F23C3
SHA256:B21329AEDC67AED68B7EBF4CCEEC974F6083FE89A80E4DC431BF7BAD4BC77FD1
3008gopher.exeC:\Users\admin\Desktop\antifurther.rtf.encbinary
MD5:45B41FE3AAF7213505FF724D9EACDB53
SHA256:B41765762006246472C79AB76D2340A174467F9562E58FEB7825CC35F72A2CA0
3008gopher.exeC:\Users\admin\Desktop\artlife.jpg.enc.securetext
MD5:77E3009C89A81DCDDCF5B7FCEBE4F999
SHA256:2AA2326592710257EE42AF443F79154D5824CCE1D971A3546B9F0B778E698623
3008gopher.exeC:\Users\admin\Desktop\artlife.jpg.encbinary
MD5:680695AB275CB26A40622D5F528BA422
SHA256:CA03F31F755DCE75274E89AF52EFB6C252E610E0113CC6C37353F11FA6016653
3008gopher.exeC:\Users\admin\Desktop\antifurther.rtf.enc.securetext
MD5:77E3009C89A81DCDDCF5B7FCEBE4F999
SHA256:2AA2326592710257EE42AF443F79154D5824CCE1D971A3546B9F0B778E698623
3008gopher.exeC:\Users\admin\Desktop\antifurther.rtf.enc.metabinary
MD5:62CEC6E1F283FF2EC6F8FE1F9CC93647
SHA256:5733932DCC067CE7E113E1AAE3DCE701EE2F65E6DC83A7D0BC392EC833B674C9
3008gopher.exeC:\Users\admin\Desktop\beentry.rtf.encbinary
MD5:9D10C2B1F3A63DADCC216388A193BF0B
SHA256:D9A8D3EC74A34E75512B3BB45958A7AAA9C03023D674D5B798B71EAA340DAD33
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
40
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1532
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
23.9 Kb
whitelisted
GET
200
20.3.187.198:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
23.9 Kb
whitelisted
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/sls/ping
unknown
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
24.8 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6544
svchost.exe
40.126.31.3:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.248:443
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.248:443
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
7328
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1532
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
nexusrules.officeapps.live.com
  • 52.111.243.29
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.46
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
self.events.data.microsoft.com
  • 20.189.173.28
whitelisted

Threats

No threats detected
No debug info