File name:

cs137.exe

Full analysis: https://app.any.run/tasks/c5a91a24-04bf-45b6-ac0f-e81701ce3593
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: January 05, 2025, 03:14:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 3 sections
MD5:

E95B6BD0A92A8AE4CCF0FBCBAE826938

SHA1:

F3D7088B692929CF10639DBF499C48A7692CDD9D

SHA256:

7E23AF5876349B5C36DFD2176F76782462F76A89262F9664A38DE888BCF733BD

SSDEEP:

6144:mTVYSfjOn59IuxJPKfHDRw8z9E2Kx1Gr3lXXhTdeTYB:mpYS65vxJyfjRdpEZx1cVhxeTYB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • cs137.exe (PID: 2260)
  • SUSPICIOUS

    • Changes the desktop background image

      • cs137.exe (PID: 2260)
  • INFO

    • Checks supported languages

      • cs137.exe (PID: 2260)
    • Reads the computer name

      • cs137.exe (PID: 2260)
    • Create files in a temporary directory

      • cs137.exe (PID: 2260)
    • Manual execution by a user

      • mspaint.exe (PID: 6768)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:01:05 03:14:47+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.32
CodeSize: 262144
InitializedDataSize: 4096
UninitializedDataSize: 282624
EntryPoint: 0x85ad0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT cs137.exe no specs conhost.exe no specs mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execs137.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2260"C:\Users\admin\AppData\Local\Temp\cs137.exe" C:\Users\admin\AppData\Local\Temp\cs137.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\cs137.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6768"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\whichbuilt.png"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
490
Read events
459
Write events
30
Delete events
1

Modification events

(PID) Process:(2260) cs137.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:TileWallpaper
Value:
0
(PID) Process:(2260) cs137.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:WallpaperStyle
Value:
2
(PID) Process:(2260) cs137.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General
Operation:writeName:WallpaperSource
Value:
C:\Users\admin\AppData\Local\Temp\wallpaper74743.jpg
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:WindowPlacement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF9C0000009C0000005C04000085020000
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ShowThumbnail
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPWidth
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPHeight
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbXPos
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbYPos
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbWidth
Value:
0
Executable files
0
Suspicious files
45
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2260cs137.exeC:\Users\admin\Desktop\housenotes.pngbinary
MD5:89352A4C86CEDC761697DFF97D050F1D
SHA256:372F6F5AE219569ACE5D5085057CAEEE36E5BC30A17E827F6AB568AABE0B4762
2260cs137.exeC:\Users\admin\Desktop\sheetteens.rtfbinary
MD5:842095ECC8B527B1DF13E24104345303
SHA256:5D72523ACE444BA127CB48CF50E3CBEE3A7D57B98F437B13DDD221BA0C9FC2AF
2260cs137.exeC:\Users\admin\Desktop\offerbalance.rtfbinary
MD5:515C73920E6F05B5F0505334356EE467
SHA256:FBBA8096FB4EDC1ACF4D3BFD5623FE9ADAED51505ADDB01030CB7B5601820705
2260cs137.exeC:\Users\admin\Desktop\statesatellite.jpgbinary
MD5:3B6A9E816E5A516348A3D5410B942EB5
SHA256:8292E51008152C74C61FBE4062C370D00352362F2ACFEAD08311BA41C6C847B0
2260cs137.exeC:\Users\admin\Desktop\whichbuilt.pngbinary
MD5:64C80BFBA3CE6AD8C3C16A9C247D59A3
SHA256:A826ED63CC59FBA5CA139BF15794AE171D2189E303573AD1DD87324D4B0BABC0
2260cs137.exeC:\Users\admin\Desktop\mountainend.rtfbinary
MD5:255C267D3DCE8E28E77B0D6AD2FA51A7
SHA256:27FED5ECD3C43F85C9D8F35B92FD0882C98F1878F66D28E757628108665A2171
2260cs137.exeC:\Users\admin\Documents\Database1.accdbbinary
MD5:5328CD5E9EDCAC056C133D0582BCC2BB
SHA256:CA8C2B585DA27286395D3127F59B8F79A6DA8D9231C177EF9AA294AF52EAF81E
2260cs137.exeC:\Users\admin\Desktop\greattheory.pngbinary
MD5:FE5EB4A70979F706A1B353904A80FF1C
SHA256:DB888425B479E18D73FA44019249678D15299570758326D642317044143B2B98
2260cs137.exeC:\Users\admin\Documents\opportunitiesincreased.rtfbinary
MD5:663227A941A91209C53D2FD9464E2F8D
SHA256:2B4C5925E035AE785BA7FBE4792AE0EBC1B48BFFE9FF27F2F0C1BEA7AB0844D9
2260cs137.exeC:\Users\admin\Documents\developmentvarious.rtfbinary
MD5:4CC731A8BC16F50065A774A08FAEB16B
SHA256:A67D0F5509561DC46E9588D3EB5BB113BC06A5269698FBF4A4C9F6D83EF7BFE6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
24
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3884
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.131:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.16.142
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.145
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.0
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.23
  • 40.126.31.71
  • 40.126.31.73
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted

Threats

No threats detected
No debug info