File name:

ransom-infected.zip

Full analysis: https://app.any.run/tasks/8c1351ab-981d-4d39-86e3-0bf592bfeb0f
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 01, 2024, 15:11:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
obfuscated-js
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
MD5:

3175C0C00A9FEE744AD2ABB7AC7877FE

SHA1:

36E018018C305A91F4F8E55FFAFA880D945178ED

SHA256:

7F4162B2DF60F1CD3076B53EAF26585CBD884EAF9A7098749D998074A7F39D81

SSDEEP:

24576:dd5ct1eRlYXkrPTbgnb1q+s17coM3pRg0lp8lth/k++02x4YXpleMz:dd5ct1eRlYXkzvgnb1q317cz3pRg0lpP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Renames files like ransomware

      • radiyu.exe (PID: 1176)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • WinRAR.exe (PID: 1836)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1836)
      • radiyu.exe (PID: 1176)
    • Reads the Internet Settings

      • cmd.exe (PID: 3120)
      • radiyu.exe (PID: 1176)
    • Executable content was dropped or overwritten

      • radiyu.exe (PID: 1176)
    • Starts CMD.EXE for commands execution

      • radiyu.exe (PID: 1176)
  • INFO

    • Checks supported languages

      • radiyu.exe (PID: 1176)
      • wmpnscfg.exe (PID: 2872)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 1836)
      • WinRAR.exe (PID: 2280)
      • radiyu.exe (PID: 1176)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2280)
      • WinRAR.exe (PID: 1836)
    • Manual execution by a user

      • WinRAR.exe (PID: 2280)
      • radiyu.exe (PID: 1176)
      • wmpnscfg.exe (PID: 2872)
    • Reads the computer name

      • radiyu.exe (PID: 1176)
      • wmpnscfg.exe (PID: 2872)
    • Reads the machine GUID from the registry

      • radiyu.exe (PID: 1176)
    • Application launched itself

      • msedge.exe (PID: 820)
      • msedge.exe (PID: 3380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0x00000000
ZipCompressedSize: 639057
ZipUncompressedSize: 710144
ZipFileName: cb7095218d923498aa6bdbe7cda19c5d2a9fd5cb988122e10d1a48efed2e5bfc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
22
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs winrar.exe radiyu.exe cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
820"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.twitch.tv/radiyuC:\Program Files\Microsoft\Edge\Application\msedge.exe
radiyu.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
824"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3528 --field-trial-handle=1356,i,11843238777280409038,11809733106348504085,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1176"C:\Users\admin\Desktop\radiyu.exe" C:\Users\admin\Desktop\radiyu.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
TestAES
Version:
1.2.2.1
Modules
Images
c:\users\admin\desktop\radiyu.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1836"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\ransom-infected.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2088"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3288 --field-trial-handle=1356,i,11843238777280409038,11809733106348504085,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2260"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Rar$DIb1836.25777\cb7095218d923498aa6bdbe7cda19c5d2a9fd5cb988122e10d1a48efed2e5bfcC:\Windows\System32\rundll32.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2280"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\ransom-infected.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2724"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1464 --field-trial-handle=1356,i,11843238777280409038,11809733106348504085,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2872"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2980"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=2464 --field-trial-handle=1356,i,11843238777280409038,11809733106348504085,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
6 973
Read events
6 859
Write events
110
Delete events
4

Modification events

(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1836) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\ransom-infected.zip
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
3
Suspicious files
144
Text files
43
Unknown types
0

Dropped files

PID
Process
Filename
Type
3392msedge.exe
MD5:
SHA256:
1176radiyu.exeC:\Users\admin\Desktop\clinicalshipping.jpg.Radiyuimage
MD5:86B9F17D929B4801FF6EF0865734D05E
SHA256:163E93A95097D24D0E93DD8EDC6D2172E0E610F79E4093769266000452263BBF
820msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF13b9ce.TMP
MD5:
SHA256:
820msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1176radiyu.exeC:\Users\admin\Desktop\cablefishing.rtf.Radiyutext
MD5:56F59270EAE1E49534DC0411F44EC5E0
SHA256:A1B67840664CD1EC78640BC856ED268951FCD8A5F8732AB2D6CBAF1C5669ECAC
1176radiyu.exeC:\Users\admin\Desktop\bankbetween.rtf.Radiyutext
MD5:82DD4C1464AE89147D6818219095239F
SHA256:453C99C9441701226D49AAB0A7FEDEC9C4801B080DE038AFA67D14524D562459
2280WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2280.28074\cb7095218d923498aa6bdbe7cda19c5d2a9fd5cb988122e10d1a48efed2e5bfcexecutable
MD5:DD6072414C14322C0CD3939150172853
SHA256:CB7095218D923498AA6BDBE7CDA19C5D2A9FD5CB988122E10D1A48EFED2E5BFC
1176radiyu.exeC:\Users\admin\Desktop\brandschoose.png.Radiyuimage
MD5:A9CF83F3FD2620358E4E1D4EF4D8F215
SHA256:658DF623596045246461F421E43D6E370D4F64E9F7D33A9E67BCB0C2142E5133
820msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF13b9fc.TMP
MD5:
SHA256:
820msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
36
DNS requests
49
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
3468
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3468
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
820
msedge.exe
239.255.255.250:1900
whitelisted
3468
msedge.exe
151.101.194.214:443
www.twitch.tv
FASTLY
US
whitelisted
3468
msedge.exe
2.16.204.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
3468
msedge.exe
108.138.26.17:443
assets.twitch.tv
whitelisted
3468
msedge.exe
151.101.66.214:443
www.twitch.tv
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
www.twitch.tv
  • 151.101.194.214
  • 151.101.2.214
  • 151.101.130.214
  • 151.101.66.214
whitelisted
www.bing.com
  • 2.16.204.155
  • 2.16.204.132
  • 2.16.204.139
  • 2.16.204.138
  • 2.16.204.134
  • 2.16.204.157
  • 2.16.204.154
  • 2.16.204.136
  • 2.16.204.159
whitelisted
api.twitch.tv
  • 18.66.147.14
  • 18.66.147.60
  • 18.66.147.95
  • 18.66.147.16
whitelisted
static-cdn.jtvnw.net
  • 52.222.227.96
whitelisted
gql.twitch.tv
  • 151.101.66.214
  • 151.101.130.214
  • 151.101.194.214
  • 151.101.2.214
whitelisted
assets.twitch.tv
  • 108.138.26.17
  • 108.138.26.123
  • 108.138.26.91
  • 108.138.26.69
whitelisted
irc-ws.chat.twitch.tv
  • 52.43.228.135
  • 44.239.60.109
  • 44.240.8.238
  • 44.241.122.21
  • 34.209.81.160
  • 54.213.27.168
  • 54.187.83.25
  • 54.214.52.128
whitelisted

Threats

No threats detected
No debug info