File name:

GRENAM RENAMER MALWARE.zip

Full analysis: https://app.any.run/tasks/0bb90961-ddd5-4d18-9223-2a80decea797
Verdict: Malicious activity
Analysis date: April 05, 2025, 23:18:29
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
renamer
worm
arch-exec
delphi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

409DEE4CE34DD8488433755BC098F464

SHA1:

3F74132D3CDF6AA69BFDF47AB30434885A3859BD

SHA256:

865F5B55211ED10C7B8AC50839F6E53A47B1B064CE9804DD70CAC1DCD881131F

SSDEEP:

24576:0FSNkNSE1V1GAdbZhVok44Oxa3ArxnFSNkNSE1V1GAdbZhVok44Oxa3AxUZFSNk2:0FSNkNSEb1GAdbZhOk45a3ArxnFSNkNo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RENAMER mutex has been found

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • Create files in the Startup directory

      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • There is functionality for taking screenshot (YARA)

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • The process creates files with name similar to system file names

      • Virus;Win32.Grenam.A.exe (PID: 1096)
    • Process drops legitimate windows executable

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
  • INFO

    • Checks supported languages

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • Manual execution by a user

      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2564)
    • Creates files or folders in the user directory

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • Creates files in the program directory

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • Reads the computer name

      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • The sample compiled with english language support

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • Compiled with Borland Delphi (YARA)

      • Worm;Win32.Renamer.A!MSR.exe (PID: 2236)
      • Virus;Win32.Grenam.A.exe (PID: 1096)
      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • The sample compiled with bulgarian language support

      • Virus;Win32.Grenam.VA!MSR.exe (PID: 3884)
    • Reads the software policy settings

      • slui.exe (PID: 5972)
      • slui.exe (PID: 4736)
    • Checks proxy server information

      • slui.exe (PID: 4736)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:05 16:35:34
ZipCRC: 0x0292d7cb
ZipCompressedSize: 281103
ZipUncompressedSize: 534016
ZipFileName: Worm;Win32.Renamer.A!MSR.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe #RENAMER worm;win32.renamer.a!msr.exe #RENAMER virus;win32.grenam.a.exe #RENAMER virus;win32.grenam.va!msr.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1096"C:\Users\admin\Desktop\Virus;Win32.Grenam.A.exe" C:\Users\admin\Desktop\Virus;Win32.Grenam.A.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\virus;win32.grenam.a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2236"C:\Users\admin\Desktop\Worm;Win32.Renamer.A!MSR.exe" C:\Users\admin\Desktop\Worm;Win32.Renamer.A!MSR.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\worm;win32.renamer.a!msr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2564"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\GRENAM RENAMER MALWARE.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3884"C:\Users\admin\Desktop\Virus;Win32.Grenam.VA!MSR.exe" C:\Users\admin\Desktop\Virus;Win32.Grenam.VA!MSR.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\virus;win32.grenam.va!msr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4736C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5972"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6264C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
2 710
Read events
2 689
Write events
21
Delete events
0

Modification events

(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\GRENAM RENAMER MALWARE.zip
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(2564) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
404
Suspicious files
9
Text files
74
Unknown types
0

Dropped files

PID
Process
Filename
Type
2236Worm;Win32.Renamer.A!MSR.exe
MD5:
SHA256:
2236Worm;Win32.Renamer.A!MSR.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeexecutable
MD5:6816F88F22AACFB87701497706A8CC1A
SHA256:73E295135CC2D82DF23950751D3847E1136C64ACFC34360311C6FBC71237FFAB
2236Worm;Win32.Renamer.A!MSR.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\gAcrobat.icoimage
MD5:372D01BE6D0FE1D84B2416EE0132CE26
SHA256:19D7D8DE2AF2CDB792C35C6D924654452982860CA34B9FF0A561355C4574145F
2236Worm;Win32.Renamer.A!MSR.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exeexecutable
MD5:1BA4DE71468AD5FD5C3A7CCC0E303B72
SHA256:1591A8601111868EEA7D1962718FEC955A0E4381509D6FD6D28F83197849287B
1096Virus;Win32.Grenam.A.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ground.lnkbinary
MD5:8D582CE26AC358A6BBBE4D9CD2F143DF
SHA256:EEFF46660483635903347F5C873046472C09B16C6EC25E9DCCCA3134ACF050AF
2236Worm;Win32.Renamer.A!MSR.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exeexecutable
MD5:1BA4DE71468AD5FD5C3A7CCC0E303B72
SHA256:1591A8601111868EEA7D1962718FEC955A0E4381509D6FD6D28F83197849287B
2236Worm;Win32.Renamer.A!MSR.exeC:\Users\admin\AppData\Roaming\Ground.exeexecutable
MD5:1BA4DE71468AD5FD5C3A7CCC0E303B72
SHA256:1591A8601111868EEA7D1962718FEC955A0E4381509D6FD6D28F83197849287B
1096Virus;Win32.Grenam.A.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\ADelRCP.exeexecutable
MD5:62189C5A294DD4D600BE5B435A199A5E
SHA256:8247B6A592A2A417C8FE2BA5B02DCE0200B6D5D4AB872D2341D75D8DAA5B4CD8
1096Virus;Win32.Grenam.A.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\gAcroTextExtractor.exeexecutable
MD5:66C8FEDA5C8CC5126DEC3BCC6FC74089
SHA256:CC5D88D8EB4F35CF4E3A372A3C1BF2D98D0981791096B2EDFEBB2D87C4128AA4
2236Worm;Win32.Renamer.A!MSR.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\gAcroBroker.exeexecutable
MD5:8E28D0B408C981B517CF90D6DCE6BD29
SHA256:FE03F76CD7ED1782E58FA77C12576042F56FC494C94163E9C74E33B11D4EAA14
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
24
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4776
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4776
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.172.255.217:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
google.com
  • 142.250.186.46
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.130
  • 40.126.31.1
  • 20.190.159.129
  • 20.190.159.68
  • 40.126.31.2
  • 40.126.31.3
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.172.255.217
  • 20.197.71.89
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info