File name:

HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.7z

Full analysis: https://app.any.run/tasks/15db95f2-17f5-45ed-a9fd-c1fd1bf1490b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 12, 2025, 17:54:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

4CFB1DAA2F6B0324B41FE17AA3379560

SHA1:

A3CA588443E6A602CDDB2819686BCB6F3CC2AC1E

SHA256:

8B4BEA2875C142B35B9DA18DD7CB57CDAD6AF0408F897E4551A9C861DC5930CE

SSDEEP:

49152:hGpoZUk1Tys8EZ1s929osX+0Ehywh2Bpj53NIsyQzzY6MKFcqzp9lfkaTgq91Fj8:RZUwmNEZ1s9mosei953/yQzzY6b9lpTG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
    • Manual execution by a user

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4300)
    • Reads the machine GUID from the registry

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
    • Reads the computer name

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2021:06:20 12:11:06+00:00
ArchivedFileName: HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs THREAT heur-trojan-ransom.msil.crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe

Process information

PID
CMD
Path
Indicators
Parent process
4300"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\15db95f2-17f5-45ed-a9fd-c1fd1bf1490b.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5228"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApp1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.msil.crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5548C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6512"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 458
Read events
1 439
Write events
19
Delete events
0

Modification events

(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\15db95f2-17f5-45ed-a9fd-c1fd1bf1490b.7z
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
1
Suspicious files
50
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb4300.29895\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeexecutable
MD5:A87DAB3A9DB347EE99882D8D075A6871
SHA256:B81EB2589B6FF68546891A15655E43D4F89FF2122B29E7A1D4D91430B2A21867
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\blocksec.jpg.cyberbinary
MD5:5DDD45414E4F8227E1160DE25B9505E1
SHA256:79B71387F091A0352522A13FB6DB35C69F7D23796AA090C39C5F806663C885E0
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\containsweek.rtf.cyberbinary
MD5:AD2CC99A68537F4584A75FE247D220FE
SHA256:5B52748C1AE30A3C9DE8C05FE650ADFC7492A3BB98278D8216C1A5411DEC4DA2
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\answersbreak.png.cyberbinary
MD5:4835D16321B11399C9FB98EB43859C3C
SHA256:9F1DFB944D8BA926F8C26BFCD4DD8874B91B0941FDC1D90B45F2AEC48284CB9D
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\15db95f2-17f5-45ed-a9fd-c1fd1bf1490b.7z.cyberbinary
MD5:2B4B4BD7C9C422AB02A1013B6C5BA72B
SHA256:853CC55B39BA67407939390CE151D4F7A7E84C3D2D7E55672FBA36465BF8F12B
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\dueregulations.jpg.cyberbinary
MD5:246758CAC74E292E0E1DCA4953A00A43
SHA256:B1296E51F92C143711EA1365B9A2EF5C54841B39A20ACF66B133582020C34913
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\easyschool.rtf.cyberbinary
MD5:7B08FF45122405E49FB7FE3B6A5E2D91
SHA256:8C97DD84A4723DA444E4FAA2D6883EBFA2FB1246A1297705A37D249C3DCA6F72
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Pictures\everyowner.png.cyberbinary
MD5:2D044E173CEAFF684ECF41FD7C1545BE
SHA256:B1505DFED07ACAE36495953E13C2CF8D4C10CFF4DD18ADB7D3752EBDBACD1227
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\godcare.rtf.cyberbinary
MD5:935C69EE732C23CD83D6A454470354F8
SHA256:95E820C95CADEB99785FC0180B2009EF23D93973355C130EBA844D2B74B1B449
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Pictures\desktop.ini.cyberbinary
MD5:5C0F5D02E924C126DDDD252376E7B613
SHA256:62366C1D0FC6B84A95CAFB70537D11D8DB5B0C45CB7239AAC34034614E85D5A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7020
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.18
  • 23.216.77.20
  • 23.216.77.27
  • 23.216.77.22
  • 23.216.77.26
  • 23.216.77.21
  • 23.216.77.29
  • 23.216.77.17
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.2
  • 20.190.159.128
  • 20.190.159.0
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.64
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info