File name:

Rensenware.exe

Full analysis: https://app.any.run/tasks/c14b6c45-2b33-41a0-9f0b-7e51989492c1
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: May 30, 2025, 09:07:04
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
rensenware
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

60335EDF459643A87168DA8ED74C2B60

SHA1:

61F3E01174A6557F9C0BFC89AE682D37A7E91E2E

SHA256:

7BF5623F0A10DFA148A35BEBD899B7758612F1693D2A9910F716CF15A921A76A

SSDEEP:

3072:kGXc7vE4k8sWJnmiWpJtCkGwJ1ED7qztGd:RXD8sWBmiW0wX6GxY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RENSENWARE has been detected

      • Rensenware.exe (PID: 5972)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • Rensenware.exe (PID: 5972)
    • Reads the machine GUID from the registry

      • Rensenware.exe (PID: 5972)
    • Reads the computer name

      • Rensenware.exe (PID: 5972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:04:06 13:32:37+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 96256
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x1977a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Rensenware Application
FileVersion: 1.0.0.0
InternalName: rensenWare.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: rensenWare.exe
ProductName: Rensenware
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rensenware.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4000C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5972"C:\Users\admin\AppData\Local\Temp\Rensenware.exe" C:\Users\admin\AppData\Local\Temp\Rensenware.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Rensenware Application
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rensenware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7196"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
274
Read events
274
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
16
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5972Rensenware.exeC:\Users\admin\Desktop\franciscomove.jpg.RENSENWAREbinary
MD5:EE8872DF54F56C499CCFE9BB879E3701
SHA256:06E2E72F6F7DB62F3AB0828F0E0C0027E5F637953F81F3565F9052DDCFFB0112
5972Rensenware.exeC:\Users\admin\Desktop\archivespurpose.png.RENSENWAREbinary
MD5:7A11DC85979238C58E69B3690E4F2043
SHA256:A7725492910E7180988820258AB5ABE9B4878D0B1CACB054C55446375F8D45D5
5972Rensenware.exeC:\Users\admin\Desktop\gamesofficer.jpg.RENSENWAREbinary
MD5:62841EF2391624A4A3778E7E5817FB6E
SHA256:D5946A443597E41E5EB0B5C7AC22E69C1CF62179D44ED5A2916166618CD74312
5972Rensenware.exeC:\Users\admin\Desktop\standdesign.jpg.RENSENWAREbinary
MD5:BB8C021E90E62AFD8484A6322070B606
SHA256:D7F2AE409FC14A61091E1A038AA9AE066C2A72DFA06A8FE664327A196252024D
5972Rensenware.exeC:\Users\admin\Downloads\reasoneducation.jpg.RENSENWAREbinary
MD5:C4762A039C4B502CF5C677DFCF99F45F
SHA256:820466E612791F5E1947C00084A42FBBD1019749A7379D99024BD2A272F9F2C2
5972Rensenware.exeC:\Users\admin\Downloads\printlicense.png.RENSENWAREbinary
MD5:E6A3A79614197C1C9A11ED89684E28D0
SHA256:EB0D88A2CAB77B738C2637F80B4A5AF7C54313FDA27B7436C1FD7ED2C5C101F8
5972Rensenware.exeC:\Users\admin\Downloads\directionsheart.jpg.RENSENWAREbinary
MD5:C6A6AF3A2E60289B0E0A450C5B5104E8
SHA256:7D6B88D50D98B7BC177D81608104944FC91392907AA4AC1F5A9FBE1A5216DCC6
5972Rensenware.exeC:\Users\admin\Downloads\womanresort.png.RENSENWAREbinary
MD5:7A513ABAA98E57BE352C60869AC8FB4E
SHA256:5D0923BC16ED2FCCA720052155FA4194421C6BE444AFB29F2FDC09A88324221D
5972Rensenware.exeC:\Users\admin\Pictures\committeeafrican.jpg.RENSENWAREbinary
MD5:B59094C463E5FED3938BC0478113ACEB
SHA256:60899F81BBD734CFBB1352CD13C65A8FEBE4B67D97ADF33EDD12CDF38255D3CD
5972Rensenware.exeC:\Users\admin\Pictures\ideasdocumentation.jpg.RENSENWAREbinary
MD5:350F73D8CF420441A5A242DAB51443C5
SHA256:3D1A8699137D2AD89B0EEFE5B975F46B9E2188A8422B26D0EF1809FE65F78DE3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7764
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7764
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
www.microsoft.com
  • 2.16.253.202
  • 2.23.246.101
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.132
  • 20.190.160.128
  • 20.190.160.22
  • 40.126.32.136
  • 20.190.160.66
  • 20.190.160.65
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info