File name:

cs137.exe

Full analysis: https://app.any.run/tasks/c5a91a24-04bf-45b6-ac0f-e81701ce3593
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: January 05, 2025, 03:14:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 3 sections
MD5:

E95B6BD0A92A8AE4CCF0FBCBAE826938

SHA1:

F3D7088B692929CF10639DBF499C48A7692CDD9D

SHA256:

7E23AF5876349B5C36DFD2176F76782462F76A89262F9664A38DE888BCF733BD

SSDEEP:

6144:mTVYSfjOn59IuxJPKfHDRw8z9E2Kx1Gr3lXXhTdeTYB:mpYS65vxJyfjRdpEZx1cVhxeTYB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • cs137.exe (PID: 2260)
  • SUSPICIOUS

    • Changes the desktop background image

      • cs137.exe (PID: 2260)
  • INFO

    • Create files in a temporary directory

      • cs137.exe (PID: 2260)
    • Reads the computer name

      • cs137.exe (PID: 2260)
    • Checks supported languages

      • cs137.exe (PID: 2260)
    • Manual execution by a user

      • mspaint.exe (PID: 6768)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:01:05 03:14:47+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.32
CodeSize: 262144
InitializedDataSize: 4096
UninitializedDataSize: 282624
EntryPoint: 0x85ad0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT cs137.exe no specs conhost.exe no specs mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execs137.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2260"C:\Users\admin\AppData\Local\Temp\cs137.exe" C:\Users\admin\AppData\Local\Temp\cs137.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\cs137.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6768"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\whichbuilt.png"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
490
Read events
459
Write events
30
Delete events
1

Modification events

(PID) Process:(2260) cs137.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:TileWallpaper
Value:
0
(PID) Process:(2260) cs137.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:WallpaperStyle
Value:
2
(PID) Process:(2260) cs137.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General
Operation:writeName:WallpaperSource
Value:
C:\Users\admin\AppData\Local\Temp\wallpaper74743.jpg
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:WindowPlacement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF9C0000009C0000005C04000085020000
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ShowThumbnail
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPWidth
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPHeight
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbXPos
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbYPos
Value:
0
(PID) Process:(6768) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbWidth
Value:
0
Executable files
0
Suspicious files
45
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2260cs137.exeC:\Users\admin\Desktop\mountainend.rtfbinary
MD5:255C267D3DCE8E28E77B0D6AD2FA51A7
SHA256:27FED5ECD3C43F85C9D8F35B92FD0882C98F1878F66D28E757628108665A2171
2260cs137.exeC:\Users\admin\Desktop\housenotes.pngbinary
MD5:89352A4C86CEDC761697DFF97D050F1D
SHA256:372F6F5AE219569ACE5D5085057CAEEE36E5BC30A17E827F6AB568AABE0B4762
2260cs137.exeC:\Users\admin\Desktop\sheetteens.rtfbinary
MD5:842095ECC8B527B1DF13E24104345303
SHA256:5D72523ACE444BA127CB48CF50E3CBEE3A7D57B98F437B13DDD221BA0C9FC2AF
2260cs137.exeC:\Users\admin\Desktop\tellas.pngbinary
MD5:7CA1C0527E78AE07C54C270D805D53EF
SHA256:CB3B83004AF1363FCF9DB95D8A4E486DA7D6B08E0EBDA834430EFD6EFCDB9930
2260cs137.exeC:\Users\admin\Documents\Outlook Files\Outlook.pstbinary
MD5:0DE9CCB7AA73D81078A6187F78C2128E
SHA256:1E0F5CDD191D84FFFA453B78E7013E7602247EE21B7848017B788B3727AFB402
2260cs137.exeC:\Users\admin\Desktop\greattheory.pngbinary
MD5:FE5EB4A70979F706A1B353904A80FF1C
SHA256:DB888425B479E18D73FA44019249678D15299570758326D642317044143B2B98
2260cs137.exeC:\Users\admin\Documents\opportunitiesincreased.rtfbinary
MD5:663227A941A91209C53D2FD9464E2F8D
SHA256:2B4C5925E035AE785BA7FBE4792AE0EBC1B48BFFE9FF27F2F0C1BEA7AB0844D9
2260cs137.exeC:\Users\admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2binary
MD5:E37A68740646739EA8282C591C2A80F5
SHA256:CE964B51AC3022C925C2765D88867E4418C002647E9CFF05003789363A599DD7
2260cs137.exeC:\Users\admin\Documents\PowerShell\Modules\PSSQLite\1.1.0\core\osx-x64\SQLite.Interop.dllbinary
MD5:D5EA86A7D84623CF458DC971E6AFB5F3
SHA256:23E5BC5A54691F6337D730E5532990520EA487C11F0A8A32793AE248B46C9F22
2260cs137.exeC:\Users\admin\Documents\PowerShell\Modules\PSSQLite\1.1.0\core\linux-x64\SQLite.Interop.dllbinary
MD5:FDDBB4A571BC27005F78460106618BCD
SHA256:6632DBC7CF758EC5287DC713CF5605549C1C8C876989A541F4E769EBB1608836
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
24
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3884
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.131:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.16.142
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.145
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.0
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.23
  • 40.126.31.71
  • 40.126.31.73
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted

Threats

No threats detected
No debug info