analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe

Full analysis: https://app.any.run/tasks/21b100a0-a324-4e5d-982f-e19bf58b865a
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: January 24, 2022, 23:15:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
troldesh
shade
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

496F86F951E1DBD3C4534D51A5297668

SHA1:

1199C5F30F5724841905CBDB9787649D15AAE3D5

SHA256:

8B04AF13B729B0634B1A3C83E5758F25AECB708480BF2E3DF524E889B305C621

SSDEEP:

24576:es0fVWVbd8fKT0KqTAFFCa/2yDEmdvAkomBbOsn51D:es0fVWVR8fKTeU1imBbl51D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TROLDESH was detected

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
    • Changes the autorun value in the registry

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
  • SUSPICIOUS

    • Checks supported languages

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
    • Reads the computer name

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
    • Executable content was dropped or overwritten

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
    • Creates files in the program directory

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe (PID: 1408)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x7f52
UninitializedDataSize: -
InitializedDataSize: 967168
CodeSize: 76800
LinkerVersion: 12
PEType: PE32
TimeStamp: 2016:12:20 23:08:06+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 20-Dec-2016 22:08:06
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 20-Dec-2016 22:08:06
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00012A2B
0x00012C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.56821
.rdata
0x00014000
0x00009164
0x00009200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.63825
.data
0x0001E000
0x00003300
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.72323
.rsrc
0x00022000
0x001BBBB8
0x000E1C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.90266

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.96968
502
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.29847
16936
Latin 1 / Western European
English - United States
RT_ICON
3
3.70734
9640
Latin 1 / Western European
English - United States
RT_ICON
4
3.78133
4264
Latin 1 / Western European
English - United States
RT_ICON
5
3.94524
2440
Latin 1 / Western European
English - United States
RT_ICON
6
3.94349
1128
Latin 1 / Western European
English - United States
RT_ICON
186
2.79371
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
1440
3.12863
1080
Latin 1 / Western European
English - United States
RT_RCDATA
1441
7.94758
6587
Latin 1 / Western European
English - United States
RT_RCDATA
1442
4
16
Latin 1 / Western European
English - United States
RT_RCDATA

Imports

ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
IMM32.dll
KERNEL32.dll
OLEAUT32.dll
OPENGL32.dll
POWRPROF.dll
RPCRT4.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROLDESH 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe

Process information

PID
CMD
Path
Indicators
Parent process
1408"C:\Users\admin\AppData\Local\Temp\8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe" C:\Users\admin\AppData\Local\Temp\8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
Total events
1 496
Read events
1 493
Write events
3
Delete events
0

Modification events

(PID) Process:(1408) 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeKey:HKEY_CURRENT_USER\Software\System32\Configuration
Operation:writeName:xi
Value:
906D0F2E2F604F839E04
(PID) Process:(1408) 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Client Server Runtime Subsystem
Value:
"C:\ProgramData\Windows\csrss.exe"
(PID) Process:(1408) 8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeKey:HKEY_CURRENT_USER\Software\System32\Configuration
Operation:writeName:xVersion
Value:
4.0.0.1
Executable files
1
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\cached-certstext
MD5:74F989AF47C9EFDD72DC9C3BC0500098
SHA256:D31D1BF06A40FAA7D5F7C9C75CBD591C2176FB1A61C6D0048123AA41DAE46C73
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\unverified-microdesc-consensustext
MD5:7562EA72B9B51DE3F4045C57CB370644
SHA256:B1296705F9E02DCA06E8D9C775A37123B9C478ABA2D3883700121C85BAC48AA0
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\ProgramData\Windows\csrss.exeexecutable
MD5:496F86F951E1DBD3C4534D51A5297668
SHA256:8B04AF13B729B0634B1A3C83E5758F25AECB708480BF2E3DF524E889B305C621
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\cached-microdesc-consensus.tmptext
MD5:7562EA72B9B51DE3F4045C57CB370644
SHA256:B1296705F9E02DCA06E8D9C775A37123B9C478ABA2D3883700121C85BAC48AA0
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\cached-microdescs.newtext
MD5:AFBF8B36424E131A687E76932FBE0D97
SHA256:8F56056FDD0B4AC499112923C2E8B6F6464BE74107C5EA79A1E8C92947D30868
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\cached-certs.tmptext
MD5:74F989AF47C9EFDD72DC9C3BC0500098
SHA256:D31D1BF06A40FAA7D5F7C9C75CBD591C2176FB1A61C6D0048123AA41DAE46C73
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\state.tmptext
MD5:566DDDBCDB04D0668E337C2CFB9512FD
SHA256:260EBA6FB0B7D8E57E6194B8745C2F6E94B49F4D5F01E5DB3EB120B55A614EE8
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\statetext
MD5:566DDDBCDB04D0668E337C2CFB9512FD
SHA256:260EBA6FB0B7D8E57E6194B8745C2F6E94B49F4D5F01E5DB3EB120B55A614EE8
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5D897\cached-microdesc-consensustext
MD5:7562EA72B9B51DE3F4045C57CB370644
SHA256:B1296705F9E02DCA06E8D9C775A37123B9C478ABA2D3883700121C85BAC48AA0
14088b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exeC:\Users\admin\AppData\Local\Temp\6893A5~1\unverified-microdesc-consensus.tmptext
MD5:7562EA72B9B51DE3F4045C57CB370644
SHA256:B1296705F9E02DCA06E8D9C775A37123B9C478ABA2D3883700121C85BAC48AA0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
128.31.0.39:9101
Massachusetts Institute of Technology
US
malicious
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
171.25.193.9:80
Foreningen for digitala fri- och rattigheter
SE
malicious
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
194.109.206.212:443
Xs4all Internet BV
NL
malicious
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
109.146.117.125:9001
British Telecommunications PLC
GB
suspicious
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
82.165.166.198:9001
1&1 Internet SE
DE
suspicious
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
51.75.129.204:443
GB
suspicious

DNS requests

No data

Threats

PID
Process
Class
Message
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 295
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 761
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 840
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
1408
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
No debug info