File name:

b11ab58788529d4c96fbe01980eb76138026275e33914e3c624c1a97bc9eeb23.zip

Full analysis: https://app.any.run/tasks/2a47c341-1164-44b9-91bd-f05c604da3d7
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: September 30, 2020, 07:14:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
sodinokibi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

37B9FBD21B583909E4343504544AF132

SHA1:

CB942DB24FB2B763CE0285A99CDB0638E05AC464

SHA256:

9501A92B0097577CC88D0A39EFB4D0B1701C8A84755D5988536B680030F55CF0

SSDEEP:

6144:ezmeppvY8Dx4bOFWOvkB27SEUrYvpz8LVvE0YB8U2c93RTk+0czF:KppvY8ubUp7SpERzenYXhz5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 23.exe (PID: 3196)
    • Deletes shadow copies

      • cmd.exe (PID: 3472)
    • Sodinokibi keys found

      • Regasm.exe (PID: 2100)
    • Starts BCDEDIT.EXE to disable recovery

      • cmd.exe (PID: 3472)
    • Renames files like Ransomware

      • Regasm.exe (PID: 2100)
    • Sodinokibi ransom note found

      • Regasm.exe (PID: 2100)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 2696)
    • Executed as Windows Service

      • vssvc.exe (PID: 2264)
    • Starts CMD.EXE for commands execution

      • Regasm.exe (PID: 2100)
    • Creates files like Ransomware instruction

      • Regasm.exe (PID: 2100)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 552)
  • INFO

    • Manual execution by user

      • 23.exe (PID: 3196)
    • Dropped object may contain TOR URL's

      • Regasm.exe (PID: 2100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0003
ZipCompression: Unknown (99)
ZipModifyDate: 2020:09:30 07:13:27
ZipCRC: 0x828848d6
ZipCompressedSize: 348338
ZipUncompressedSize: 348263
ZipFileName: b11ab58788529d4c96fbe01980eb76138026275e33914e3c624c1a97bc9eeb23.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe 23.exe no specs #SODINOKIBI regasm.exe cmd.exe vssadmin.exe no specs vssvc.exe no specs bcdedit.exe no specs bcdedit.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
552"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIb2696.41223\b11ab58788529d4c96fbe01980eb76138026275e33914e3c624c1a97bc9eeb23.zipC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
996vssadmin.exe Delete Shadows /All /Quiet C:\Windows\system32\vssadmin.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2100"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe
23.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.7.3062.0 built by: NET472REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\winspool.drv
2104bcdedit /set {default} recoveryenabled No C:\Windows\system32\bcdedit.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2264C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2696"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\b11ab58788529d4c96fbe01980eb76138026275e33914e3c624c1a97bc9eeb23.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2716bcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\system32\bcdedit.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3196"C:\Users\admin\Desktop\23.exe" C:\Users\admin\Desktop\23.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\23.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3472"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\cmd.exe
Regasm.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 019
Read events
950
Write events
69
Delete events
0

Modification events

(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2696) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\b11ab58788529d4c96fbe01980eb76138026275e33914e3c624c1a97bc9eeb23.zip
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
1
Suspicious files
98
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
2100Regasm.exeC:\Users\admin\Desktop\f444e61nt-readme.txtbinary
MD5:
SHA256:
2100Regasm.exeC:\Users\Public\f444e61nt-readme.txtbinary
MD5:
SHA256:
2100Regasm.exeC:\Users\admin\f444e61nt-readme.txtbinary
MD5:
SHA256:
2100Regasm.exeC:\Users\admin\Documents\f444e61nt-readme.txtbinary
MD5:
SHA256:
2100Regasm.exeC:\Users\admin\Contacts\f444e61nt-readme.txtbinary
MD5:
SHA256:
2100Regasm.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp
MD5:
SHA256:
552WinRAR.exeC:\Users\admin\Desktop\23.binexecutable
MD5:
SHA256:
2100Regasm.exeC:\Users\admin\Desktop\benefitsbenefit.rtf
MD5:
SHA256:
2100Regasm.exeC:\Users\admin\Contacts\admin.contact
MD5:
SHA256:
2696WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb2696.41223\b11ab58788529d4c96fbe01980eb76138026275e33914e3c624c1a97bc9eeb23.zipcompressed
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
43
DNS requests
28
Threats
16

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2100
Regasm.exe
35.225.43.3:443
paradigmlandscape.com
US
suspicious
2100
Regasm.exe
184.168.131.233:443
stagefxinc.com
GoDaddy.com, LLC
US
suspicious
2100
Regasm.exe
87.230.106.31:443
cp-bap.de
PlusServer GmbH
DE
suspicious
104.27.130.109:443
redctei.co
Cloudflare Inc
US
unknown
2100
Regasm.exe
85.128.222.169:443
skoczynski.eu
Nazwa.pl Sp.z.o.o.
PL
suspicious
2100
Regasm.exe
192.99.236.66:443
breathebettertolivebetter.com
OVH SAS
CA
suspicious
2100
Regasm.exe
91.195.240.13:443
janasfokus.com
SEDO GmbH
DE
malicious
94.231.107.137:443
trivselsguide.dk
Zitcom A/S
DK
suspicious
2100
Regasm.exe
104.26.13.244:443
qwikcoach.com
Cloudflare Inc
US
shared
2100
Regasm.exe
167.99.54.169:443
berdonllp.com
US
suspicious

DNS requests

Domain
IP
Reputation
breathebettertolivebetter.com
  • 192.99.236.66
suspicious
scietech.academy
  • 209.59.176.87
malicious
janasfokus.com
  • 91.195.240.13
malicious
thestudio.academy
  • 35.228.55.150
suspicious
pajagus.fr
  • 107.191.63.1
suspicious
trivselsguide.dk
  • 94.231.107.137
suspicious
mangimirossana.it
  • 80.240.20.142
suspicious
kiraribeaute-nani.com
malicious
nexstagefinancial.com
  • 74.208.236.75
malicious
paradigmlandscape.com
  • 35.225.43.3
malicious

Threats

PID
Process
Class
Message
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2100
Regasm.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info