File name:

Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.7z

Full analysis: https://app.any.run/tasks/d2b0eb9f-5081-4738-9276-a08048f4ca0e
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 09, 2025, 13:11:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

309FD422A6DD5F6693341626EDAFC617

SHA1:

3D6DC52E7825DE9ED99E1A638D2103CF42B47E39

SHA256:

7DF91A1DD4A7C7690A6FDBC3AC79FE7DA6CA11C560C177882F4515961566EC5D

SSDEEP:

24576:rPoQgAqioc80PL0Nf1pM5xbTClg2WbzAtQUimKugt+WUsotuTRZpZCLUJ6p/:rPoQgAqioc80PL0Nf1pM5xbTClg2WbzU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe (PID: 8168)
    • Generic archive extractor

      • WinRAR.exe (PID: 7352)
  • SUSPICIOUS

    • Executes application which crashes

      • Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe (PID: 8168)
  • INFO

    • Creates files or folders in the user directory

      • WerFault.exe (PID: 1532)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7352)
    • Manual execution by a user

      • Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe (PID: 8168)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2019:04:18 05:00:00+00:00
ArchivedFileName: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs trojan-ransom.win32.crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1532C:\WINDOWS\SysWOW64\WerFault.exe -u -p 8168 -s 536C:\Windows\SysWOW64\WerFault.exeTrojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7352"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7504C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7536"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8168"C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\trojan-ransom.win32.crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
3 094
Read events
3 069
Write events
22
Delete events
3

Modification events

(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.7z
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
1
Suspicious files
3
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
1532WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Trojan-Ransom.Wi_a69e5a30d4beceed12dff1202f92e460df5a33ee_1a928ebd_1c00a04d-5654-4223-970d-f325e8682a7c\Report.wer
MD5:
SHA256:
7352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb7352.10097\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exeexecutable
MD5:6480A243FDEF6A65EF30DBDBB6AE0033
SHA256:57E84DA4E957456C4E8175890EDE206164CF6DFD3294E43881A9C8A85E582DD1
8168Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exeC:\_ÈçºÎ½âÃÜÎÒµÄÎļþ_.txttext
MD5:2E4943F359A8EF51BDFB1D5FDA33B46F
SHA256:1C06BC8940CBDB94CDCB1F5E3FFE8C072184ABAE651093E123494D9A45141A42
1532WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFE76.tmp.dmpbinary
MD5:9E579A8892EBF7E7499DCC3A734D2130
SHA256:892B16CC59FD6439691395A3702E2B6AEFFAF8C723B0C4624AEEB1B84ED7BC03
8168Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exeC:\Windows\Temp\Ssessiontext
MD5:5DBC97BA7D77C714742B7849E8A14ECE
SHA256:7810DA783B10D94F630798CDA4DAA3B8C36C4CFE5828FBC5EF657A90A1E16DF8
1532WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFF43.tmp.xmlxml
MD5:C824986270B9B5A7E8AF50467C8C2B78
SHA256:606F0EEE0199888493E681481DE4991391BF4087DDA2D0086E49CC2B9DF78EAC
1532WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe.8168.dmpbinary
MD5:6667AD1F97E8563DC4AD9C736EB0DAC3
SHA256:D6986A843D4059E13EB6A3E08A05F8ACAE43FAD6CFD6362F760EA576643D0570
1532WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFF14.tmp.WERInternalMetadata.xmlbinary
MD5:C858F239BDF43375FEC6BBDC3ADE6497
SHA256:F8057D6BE71D6D0CECAA081E4F3171117644BF4E9BCEE122967A028DCDBE76F9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
12
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.131
  • 20.190.160.14
  • 20.190.160.2
  • 20.190.160.17
  • 40.126.32.72
  • 20.190.160.5
  • 20.190.160.130
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

No threats detected
No debug info