download:

/MalwareStudio/Worm-Locker2.0/raw/refs/heads/main/Worm%20Locker2.0(ransomware).zip

Full analysis: https://app.any.run/tasks/f2f7609f-62f4-47b6-bec8-8a992c8a76f6
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: May 15, 2025, 20:07:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
wormlocker
ransomware
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

883752FED229F8A2E871296D217FB6C5

SHA1:

AA730BA4B3191CD935EA8D7D1FDA9EFB3D89C44F

SHA256:

995DF061CEC051F1964775932BE424EE3DA5A4EE91E2B9A17F7A625894088DBF

SSDEEP:

6144:RBXiVkkxr3hZuhwSWVGhVkYXSiaiJh4CXKEmf:XXi++xZpV5YiiaiX4CFmf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6036)
    • Disables task manager

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • WORMLOCKER has been detected

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • WORMLOCKER has been detected (YARA)

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • Changes the login/logoff helper path in the registry

      • WormLocker2.0.exe (PID: 8060)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6036)
      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
      • WormLocker2.0.exe (PID: 8060)
    • Reads the date of Windows installation

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
      • WormLocker2.0.exe (PID: 8060)
    • Starts CMD.EXE for commands execution

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • Takes ownership (TAKEOWN.EXE)

      • cmd.exe (PID: 7444)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 7444)
    • The process checks if it is being run in the virtual environment

      • icacls.exe (PID: 7524)
    • Executable content was dropped or overwritten

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • Process drops legitimate windows executable

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • The process executes VB scripts

      • WormLocker2.0.exe (PID: 8060)
    • Start notepad (likely ransomware note)

      • WinRAR.exe (PID: 6036)
  • INFO

    • Checks supported languages

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
      • WormLocker2.0.exe (PID: 8060)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6036)
    • Reads the computer name

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
      • WormLocker2.0.exe (PID: 8060)
    • Reads the machine GUID from the registry

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
      • WormLocker2.0.exe (PID: 8060)
    • Process checks computer location settings

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
      • WormLocker2.0.exe (PID: 8060)
    • The sample compiled with english language support

      • Automatic_converter_rff_to_mp4.exe (PID: 7372)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 6036)
      • WormLocker2.0.exe (PID: 8060)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 1812)
    • Reads the software policy settings

      • slui.exe (PID: 7256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:12:16 14:24:44
ZipCRC: 0xba549ebb
ZipCompressedSize: 209145
ZipUncompressedSize: 330240
ZipFileName: Automatic_converter_rff_to_mp4.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
13
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe automatic_converter_rff_to_mp4.exe no specs #WORMLOCKER automatic_converter_rff_to_mp4.exe cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs wormlocker2.0.exe notepad.exe no specs wscript.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1812"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa6036.705\README.txtC:\Windows\System32\notepad.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5868C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5968"C:\WINDOWS\System32\WScript.exe" "C:\Windows\System32\ransom_voice.vbs" C:\Windows\System32\wscript.exeWormLocker2.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6036"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\f2f7609f-62f4-47b6-bec8-8a992c8a76f6.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7224C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7256"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7324"C:\Users\admin\AppData\Local\Temp\Rar$EXa6036.48863\Automatic_converter_rff_to_mp4.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6036.48863\Automatic_converter_rff_to_mp4.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
SysWOW64
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6036.48863\automatic_converter_rff_to_mp4.exe
c:\windows\system32\ntdll.dll
7372"C:\Users\admin\AppData\Local\Temp\Rar$EXa6036.48863\Automatic_converter_rff_to_mp4.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6036.48863\Automatic_converter_rff_to_mp4.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Description:
SysWOW64
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6036.48863\automatic_converter_rff_to_mp4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7444"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant "%username%:F"C:\Windows\System32\cmd.exeAutomatic_converter_rff_to_mp4.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
7452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 353
Read events
5 140
Write events
213
Delete events
0

Modification events

(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\f2f7609f-62f4-47b6-bec8-8a992c8a76f6.zip
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6036) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7372) Automatic_converter_rff_to_mp4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:DisableTaskMgr
Value:
1
(PID) Process:(8060) WormLocker2.0.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:Shell
Value:
empty
Executable files
5
Suspicious files
19
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
7372Automatic_converter_rff_to_mp4.exeC:\Windows\System32\ransom_voice.vbstext
MD5:C1F9613622F740C2F00C2FA8881BA7BA
SHA256:D200A1E942B8CFDCD8190D1AD59F92E27E39B919BA230F2DD88D70C3DF428C7B
6036WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6036.48863\Automatic_converter_rff_to_mp4.exeexecutable
MD5:1B4F89BDB12A349DE92CA7F1261E67A0
SHA256:D4C83205CF6F3098AB6A757312525F4D14A57A819306EEEA5C0D022B00B38CF3
7372Automatic_converter_rff_to_mp4.exeC:\Windows\System32\LogonUIinf.exeexecutable
MD5:31618202EB911F6606405D237E098AD0
SHA256:7944285565408818FAE6F861D45D7A722F5AC630DA98FB762826F061831E46F4
6036WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6036.48863\README.txttext
MD5:1B5E62F0E3DFB4A4F1FB56E7DA453305
SHA256:ED828C1EDC4BE8CFCA8F1138D897D9730386FB4F9E57DE4FDE491EC73A845474
8060WormLocker2.0.exeC:\Users\admin\Desktop\homeoffered.pngbinary
MD5:CE58F6D851FF75AC9FFA4F4DE8D6085C
SHA256:1A232305C784CE1BCFAAC7329FF844C067E4A32FB61D95A53629EC48D3E7A442
6036WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa6036.705\README.txttext
MD5:1B5E62F0E3DFB4A4F1FB56E7DA453305
SHA256:ED828C1EDC4BE8CFCA8F1138D897D9730386FB4F9E57DE4FDE491EC73A845474
8060WormLocker2.0.exeC:\Users\admin\Desktop\marketsb.jpgbinary
MD5:7ED845419B06C3524B920C836EFCC809
SHA256:8743DF578EDAA3DB20DC604EF8B5061454001E3C5ACBFD35A90B2679A31C9F3C
8060WormLocker2.0.exeC:\Users\admin\Desktop\trymap.pngbinary
MD5:1066E1CB18A82A0935C8DE32954CD628
SHA256:9EE625042E2ACAF2537107338656C675B1EF976402941C6DBDF4EAF093FB5C94
8060WormLocker2.0.exeC:\Users\admin\Desktop\fridayaustralian.rtfbinary
MD5:7662F025B4077EC94F76CB20782B4FFA
SHA256:BF32D81676B6E7546516F76BEA3ADDBC4B188F358EA4D8A7C5AEF97BECA6A81B
8060WormLocker2.0.exeC:\Users\admin\Desktop\forumsnice.jpgbinary
MD5:ACE241525AB64D68A701C7F35C6E0751
SHA256:3294CC04D411C353CB21F811EFF69D1842BD92AAAD85B020B243C4D9192C286D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.174:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1228
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1228
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.174:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.174
  • 23.48.23.175
  • 23.48.23.183
  • 23.48.23.181
  • 23.48.23.186
  • 23.48.23.177
  • 23.48.23.189
  • 23.48.23.179
  • 23.48.23.190
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.66
  • 40.126.32.72
  • 20.190.160.67
  • 20.190.160.2
  • 20.190.160.128
  • 40.126.32.138
  • 20.190.160.4
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info