File name:

HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.7z

Full analysis: https://app.any.run/tasks/15db95f2-17f5-45ed-a9fd-c1fd1bf1490b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 12, 2025, 17:54:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

4CFB1DAA2F6B0324B41FE17AA3379560

SHA1:

A3CA588443E6A602CDDB2819686BCB6F3CC2AC1E

SHA256:

8B4BEA2875C142B35B9DA18DD7CB57CDAD6AF0408F897E4551A9C861DC5930CE

SSDEEP:

49152:hGpoZUk1Tys8EZ1s929osX+0Ehywh2Bpj53NIsyQzzY6MKFcqzp9lfkaTgq91Fj8:RZUwmNEZ1s9mosei953/yQzzY6b9lpTG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Manual execution by a user

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4300)
    • Reads the computer name

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
    • Reads the machine GUID from the registry

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
    • Checks supported languages

      • HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe (PID: 5228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2021:06:20 12:11:06+00:00
ArchivedFileName: HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs THREAT heur-trojan-ransom.msil.crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe

Process information

PID
CMD
Path
Indicators
Parent process
4300"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\15db95f2-17f5-45ed-a9fd-c1fd1bf1490b.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5228"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApp1
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.msil.crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5548C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6512"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 458
Read events
1 439
Write events
19
Delete events
0

Modification events

(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\15db95f2-17f5-45ed-a9fd-c1fd1bf1490b.7z
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4300) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
1
Suspicious files
50
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4300WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb4300.29895\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeexecutable
MD5:A87DAB3A9DB347EE99882D8D075A6871
SHA256:B81EB2589B6FF68546891A15655E43D4F89FF2122B29E7A1D4D91430B2A21867
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\blocksec.jpg.cyberbinary
MD5:5DDD45414E4F8227E1160DE25B9505E1
SHA256:79B71387F091A0352522A13FB6DB35C69F7D23796AA090C39C5F806663C885E0
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\15db95f2-17f5-45ed-a9fd-c1fd1bf1490b.7z.cyberbinary
MD5:2B4B4BD7C9C422AB02A1013B6C5BA72B
SHA256:853CC55B39BA67407939390CE151D4F7A7E84C3D2D7E55672FBA36465BF8F12B
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\dueregulations.jpg.cyberbinary
MD5:246758CAC74E292E0E1DCA4953A00A43
SHA256:B1296E51F92C143711EA1365B9A2EF5C54841B39A20ACF66B133582020C34913
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\departmentcourses.jpg.cyberbinary
MD5:4520CA3EA40A1D098AFD141CF92151EA
SHA256:62F3ADD66AC8D73103E9599CE05F1E96AE10957880E96A1F14091FB69C6B2FD6
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\desktop.ini.cyberbinary
MD5:D0342C2C70C097CED38D640BD4026429
SHA256:89DA423433F087C462BFBED00433E8B32273ED212FDF6717B84E8EFF10E5C721
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exe.cyberbinary
MD5:281D2FD8448F7F180FC3E5F2601D35AD
SHA256:BE4A5EC2E7BB5F00C66EDC95B80B44D0288F4D12C93C35E0ED9A99FEE1A423BC
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Desktop\godcare.rtf.cyberbinary
MD5:935C69EE732C23CD83D6A454470354F8
SHA256:95E820C95CADEB99785FC0180B2009EF23D93973355C130EBA844D2B74B1B449
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Pictures\basishear.png.cyberbinary
MD5:B2A4EBA36EBD72381C5638113CB40847
SHA256:35B895B4A93F258C6F04ABD2125D92A456871EB65A403D9D811EA925C332CADE
5228HEUR-Trojan-Ransom.MSIL.Crypren.gen-b81eb2589b6ff68546891a15655e43d4f89ff2122b29e7a1d4d91430b2a21867.exeC:\Users\admin\Pictures\desktop.ini.cyberbinary
MD5:5C0F5D02E924C126DDDD252376E7B613
SHA256:62366C1D0FC6B84A95CAFB70537D11D8DB5B0C45CB7239AAC34034614E85D5A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7020
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.18
  • 23.216.77.20
  • 23.216.77.27
  • 23.216.77.22
  • 23.216.77.26
  • 23.216.77.21
  • 23.216.77.29
  • 23.216.77.17
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.2
  • 20.190.159.128
  • 20.190.159.0
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.64
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info