File name:

HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.7z

Full analysis: https://app.any.run/tasks/46e2b7c0-f734-40d5-8105-9123513ea2fc
Verdict: Malicious activity
Analysis date: April 26, 2025, 19:38:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

8026A615F78DAE2177CD784B30EA897E

SHA1:

DBE6197FE4B514FF26FF3C39A902558DAD934650

SHA256:

93CCC1995CDAA4249CAE1EAD835095B08DB87A4F68363D42D8CB4D728BB1F7BC

SSDEEP:

49152:lMP61nYdIVUC91xJaVCYYtNcyXCbPLSQ9dFqqkT5vFum/iC6nB8NK/Wm6FtLFKF+:G61YdaUg1yiQXZkT/umvQB8NPCjYMy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6040)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Executable content was dropped or overwritten

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Executes application which crashes

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Application launched itself

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6040)
    • Create files in a temporary directory

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Manual execution by a user

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Checks supported languages

      • HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe (PID: 7724)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 7912)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2016:12:03 10:30:02+00:00
ArchivedFileName: HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs heur-trojan-ransom.nsis.shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe heur-trojan-ransom.nsis.shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6040"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7216C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7248"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7724"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.nsis.shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7836"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeHEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
User:
admin
Integrity Level:
HIGH
7912C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7724 -s 716C:\Windows\SysWOW64\WerFault.exeHEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 161
Read events
3 136
Write events
22
Delete events
3

Modification events

(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.7z
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6040) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:psize
Value:
80
Executable files
2
Suspicious files
5
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
7912WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_HEUR-Trojan-Rans_538dfb6983caf6b3188cc7a54ba63fc281ced6_af2dbfa7_ced8f4bd-ab0e-4519-8365-2875cde488c0\Report.wer
MD5:
SHA256:
7724HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeC:\Users\admin\AppData\Local\Temp\new1455625491.htmlhtml
MD5:8FB033F3398FF63868ACC84292127039
SHA256:547A7285E774CF430DB826F1C750021920090ADB8C61C526F596BC1A3E43558A
7724HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeC:\Users\admin\AppData\Local\Temp\wap.htmhtml
MD5:9ADBB60CBAF6F0D9A0C3BC6AB5A17D60
SHA256:4DF590C59076EB93A1271056C59CC45A3CB938A655CF0CC5A1826EDA6025271B
6040WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb6040.15700\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeexecutable
MD5:D2FDF1966B09FB6C527AA173ADC85A43
SHA256:D1F89325958075F2C5844522563CBC91019828B9E29758DE4E2B621548D4CB65
7912WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER11C1.tmp.WERInternalMetadata.xmlbinary
MD5:91B7D6D420C1ECE103E640FCCFD220AB
SHA256:F71091C79F3069B8DBDDB03EDEE405C609481F4F89ABC993741FDCBC81C99EEE
7912WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER10F5.tmp.dmpbinary
MD5:913480F72087C4AFF79AE0C84C0C4D1B
SHA256:13BFB1D282068175C90BF022BFBD29F3915CBE8670BA06EED16767405F97257F
7912WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER11F1.tmp.xmlxml
MD5:E36CDE0EFCC564E243A3CF44682AEB63
SHA256:4C21D6572AE680451047543AE51ED22274F3A52CEE56FBE1CB409D33F7EAA088
7724HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeC:\Users\admin\AppData\Local\Temp\jmgpddcel1uG0JMX.16Cbinary
MD5:3F35AC524C9AA992EC5026A9B4472894
SHA256:B626FE8D82F3246148651E9715521BADBA51247C8934E8EADC3939A762F78FBC
7724HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeC:\Users\admin\AppData\Local\Temp\story.jsp468773399.htmlhtml
MD5:EBBA330CB2DD6E80AD7B8498D3C229BC
SHA256:E71C269C5470A62618F2343A4E6611C4B435B72012348F717BF6BD4A9FA9B7EB
7724HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeC:\Users\admin\AppData\Local\Temp\nsgEC48.tmp\System.dllexecutable
MD5:3E6BF00B3AC976122F982AE2AADB1C51
SHA256:4FF9B2678D698677C5D9732678F9CF53F17290E09D053691AAC4CC6E6F595CBE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
92.122.244.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8068
SIHClient.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8068
SIHClient.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
92.122.244.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.63.118.230:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 92.122.244.42
  • 92.122.244.32
whitelisted
www.microsoft.com
  • 23.59.18.102
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.128
  • 40.126.32.72
  • 20.190.160.17
  • 20.190.160.20
  • 40.126.32.76
  • 20.190.160.65
  • 40.126.32.74
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info