File name:

2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.7z

Full analysis: https://app.any.run/tasks/2a94fb95-ab4b-43d2-9334-ad25fbfacfe8
Verdict: Malicious activity
Threats:

BlueSky ransomware, first identified in June 2022, shares code similarities with other well-known ransomware families like Conti and Babuk. It primarily spreads via phishing emails and malicious links and can propagate through networks using SMB protocols. BlueSky uses advanced evasion techniques, such as hiding its processes from debuggers via the NtSetInformationThread API, making it difficult for analysts to detect and mitigate its attacks.

Analysis date: April 13, 2025, 13:15:09
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
bluesky
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

BC95C82F9B26A7BA06D8CE1C04AD71A0

SHA1:

CE4F52CB0EFCF5B9C94AD2379BC8C8A1BBDAED95

SHA256:

91F65C6594EEB4DD12CD4C5B77B84E8AFD71472561DA336F88AA7492BD2EBD86

SSDEEP:

768:a9vjGOCDej/zqCkucLihj51mpCuMRPMjDTfx:a9VKej/lPhDm4RkjDd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bluesky note has been found

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Renames files like ransomware

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • RANSOMWARE has been detected

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Generic archive extractor

      • WinRAR.exe (PID: 4896)
    • Starts CMD.EXE for self-deleting

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Likely accesses (executes) a file from the Public directory

      • notepad.exe (PID: 4696)
    • Hides command output

      • cmd.exe (PID: 6388)
    • Reads security settings of Internet Explorer

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Starts CMD.EXE for commands execution

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6388)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4896)
    • Manual execution by a user

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
      • notepad.exe (PID: 4696)
    • Reads the computer name

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Checks supported languages

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Reads the machine GUID from the registry

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4696)
    • Process checks computer location settings

      • 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe (PID: 4976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2023:07:15 05:59:08+00:00
ArchivedFileName: 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs #BLUESKY 2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe notepad.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
896C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3888\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4220ping 127.0.0.1 -n 3 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4696"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\# DECRYPT FILES BLUESKY #.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4844"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4896"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4976"C:\Users\admin\Desktop\2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe" C:\Users\admin\Desktop\2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6388"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 3 > nul & del "C:\Users\admin\Desktop\2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe"C:\Windows\SysWOW64\cmd.exe2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
2 714
Read events
2 691
Write events
23
Delete events
0

Modification events

(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.7z
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(4896) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
1
Suspicious files
94
Text files
152
Unknown types
0

Dropped files

PID
Process
Filename
Type
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Backup\location.txtbinary
MD5:F937A69F10CD4CA25B3B83EC4D99F0BF
SHA256:1E99A2D7C47CC89A523FBEDEFDF5B7E9FA131CA339110F51F34D5720E8D14235
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Rollback.xmlbinary
MD5:0996C2617D924840B6C43687B42DC919
SHA256:0E1D9F0B90B45769B9B51A62337ED6928C6944289C6874510477E8B8EC7624EF
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\rollback.xml.blueskybinary
MD5:0996C2617D924840B6C43687B42DC919
SHA256:0E1D9F0B90B45769B9B51A62337ED6928C6944289C6874510477E8B8EC7624EF
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Rollback\# DECRYPT FILES BLUESKY #.htmlhtml
MD5:24EEC9D30962CDA3EAD9E9C0981936E3
SHA256:87ABDD6A6FB85A22BAA975562566A3C2BF23A84E2C1D29C8DF32AD36CEABE949
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\# DECRYPT FILES BLUESKY #.htmlhtml
MD5:24EEC9D30962CDA3EAD9E9C0981936E3
SHA256:87ABDD6A6FB85A22BAA975562566A3C2BF23A84E2C1D29C8DF32AD36CEABE949
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\Users\# DECRYPT FILES BLUESKY #.txttext
MD5:F1A7EAB449D77A0CE5179F6481D17ED4
SHA256:18BDFAF88CF3871D8409908B561E8BAABD63BE2FAC0D99F6723A399A5CAFDEC5
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Backup\location.txt.blueskybinary
MD5:F937A69F10CD4CA25B3B83EC4D99F0BF
SHA256:1E99A2D7C47CC89A523FBEDEFDF5B7E9FA131CA339110F51F34D5720E8D14235
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Scratch\WimTempPath\# DECRYPT FILES BLUESKY #.txttext
MD5:F1A7EAB449D77A0CE5179F6481D17ED4
SHA256:18BDFAF88CF3871D8409908B561E8BAABD63BE2FAC0D99F6723A399A5CAFDEC5
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Backup\# DECRYPT FILES BLUESKY #.txttext
MD5:F1A7EAB449D77A0CE5179F6481D17ED4
SHA256:18BDFAF88CF3871D8409908B561E8BAABD63BE2FAC0D99F6723A399A5CAFDEC5
49762280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exeC:\$WinREAgent\Rollback\# DECRYPT FILES BLUESKY #.txttext
MD5:F1A7EAB449D77A0CE5179F6481D17ED4
SHA256:18BDFAF88CF3871D8409908B561E8BAABD63BE2FAC0D99F6723A399A5CAFDEC5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.15:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.216.77.15:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1128
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1128
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.15:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4976
2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe
192.168.100.1:445
unknown
4976
2280898cb29faf1785e782596d8029cb471537ec38352e5c17cc263f1f52b8ef.exe
192.168.100.2:445
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.216.77.15
  • 23.216.77.36
  • 23.216.77.6
  • 23.216.77.8
  • 23.216.77.38
  • 23.216.77.42
  • 23.216.77.25
  • 23.216.77.41
  • 23.216.77.22
whitelisted
google.com
  • 216.58.206.46
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.3
  • 40.126.31.130
  • 40.126.31.0
  • 40.126.31.1
  • 20.190.159.73
  • 20.190.159.75
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info