File name:

_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe

Full analysis: https://app.any.run/tasks/f1fdefa0-c091-4470-b142-414995c9ac45
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: August 01, 2025, 03:50:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
braincipher
ransomware
lockbit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

E990E7571CDB06C5D0F093176CECF414

SHA1:

409FC0816ADBF05AC1586112044401ECB90C8022

SHA256:

A18A6BACC0D8B1DD4544CDF1E178A98A36B575B5BE8B307C27C65455B1307616

SSDEEP:

3072:0mhXodguLP/5qUpfDT6zT73kZdjchgKPv9yRs3wG:MKzEZdgDPv9+GwG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 4036)
    • LOCKBIT icon has been detected

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • BRAINCIPHER has been detected

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • Renames files like ransomware

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • RANSOMWARE has been detected

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • [YARA] LockBit is detected

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
  • SUSPICIOUS

    • Write to the desktop.ini file (may be used to cloak folders)

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 3488)
    • Executable content was dropped or overwritten

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
  • INFO

    • Reads the computer name

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6128)
      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
      • ShellExperienceHost.exe (PID: 3488)
      • SearchApp.exe (PID: 684)
    • Checks supported languages

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6128)
      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
      • ShellExperienceHost.exe (PID: 3488)
      • SearchApp.exe (PID: 684)
    • Reads the machine GUID from the registry

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6128)
      • SearchApp.exe (PID: 684)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 4036)
    • Creates files in the program directory

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • Creates files or folders in the user directory

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • Create files in a temporary directory

      • _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe (PID: 6012)
    • Reads the software policy settings

      • SearchApp.exe (PID: 684)
    • Process checks computer location settings

      • SearchApp.exe (PID: 684)
    • Checks proxy server information

      • SearchApp.exe (PID: 684)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:09:09 01:27:01+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.12
CodeSize: 99328
InitializedDataSize: 98816
UninitializedDataSize: -
EntryPoint: 0x1946f
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe no specs CMSTPLUA #BRAINCIPHER _a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe shellexperiencehost.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
684"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\combase.dll
3488"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
4036C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
6012"C:\Users\admin\Desktop\_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe" C:\Users\admin\Desktop\_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe
dllhost.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\gdi32.dll
c:\windows\syswow64\win32u.dll
6128"C:\Users\admin\Desktop\_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe" C:\Users\admin\Desktop\_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
Total events
7 735
Read events
7 686
Write events
48
Delete events
1

Modification events

(PID) Process:(3488) ShellExperienceHost.exeKey:\REGISTRY\A\{c3b8c95c-b450-521d-fb34-8deb36d59564}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D000000FE5CCD719702DC01
(PID) Process:(684) SearchApp.exeKey:\REGISTRY\A\{3b0e77d5-4cf6-ffa3-0677-11d4fe5d9acc}\LocalState
Operation:writeName:BINGIDENTITY_PROP_USEREMAIL
Value:
0000A3DB11A69702DC01
(PID) Process:(684) SearchApp.exeKey:\REGISTRY\A\{3b0e77d5-4cf6-ffa3-0677-11d4fe5d9acc}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPETEXT
Value:
0000A3DB11A69702DC01
(PID) Process:(684) SearchApp.exeKey:\REGISTRY\A\{3b0e77d5-4cf6-ffa3-0677-11d4fe5d9acc}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
0000A3DB11A69702DC01
(PID) Process:(684) SearchApp.exeKey:\REGISTRY\A\{3b0e77d5-4cf6-ffa3-0677-11d4fe5d9acc}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
4E006F006E0065000000A3DB11A69702DC01
(PID) Process:(684) SearchApp.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\A1hdl50UVDh2ZbG324Nx-6fZgntcGnHOs5kHLdmaJYE\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Recognizers
Operation:writeName:DefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN
(PID) Process:(684) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsMSACloudSearchEnabled
Value:
0
(PID) Process:(684) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsAADCloudSearchEnabled
Value:
0
(PID) Process:(684) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
Operation:writeName:CortanaStateLastRun
Value:
E6398C6800000000
(PID) Process:(684) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:writeName:CachedFeatureString
Value:
Executable files
1
Suspicious files
1 872
Text files
2 223
Unknown types
179

Dropped files

PID
Process
Filename
Type
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\BBBBBBBBBBBbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\JJJJJJJJJJJbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\MIuB4Jpci.README.txttext
MD5:B4709A56B9D7F431DA172316CDA720BE
SHA256:192D1E6078570865531E8A4C9840A483C4A2AC35FE468107284991F6DA813191
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\MMMMMMMMMMMbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\AAAAAAAAAAAbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\DDDDDDDDDDDbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\HHHHHHHHHHHbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\EEEEEEEEEEEbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\FFFFFFFFFFFbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
6012_a18a6bacc0d8b1dd4544cdf1e178a98a36b575b5be8b307c27c65455b1307616.exeC:\$Recycle.Bin\S-1-5-18\CCCCCCCCCCCbinary
MD5:022D602205278D7C98E08A3C0657A379
SHA256:78A4D1CF64554B2DD13AFAEE5A90ABFCB48A942DDA217F695AD256BD0B22E3E9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
57
TCP/UDP connections
35
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6900
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6900
RUXIMICS.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
92.123.104.38:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
2.97 Kb
whitelisted
GET
200
92.123.104.32:443
https://www.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=DyIrb3t-gQF4cnWyAbUBK6UBK7gB&or=w
unknown
binary
21.3 Kb
whitelisted
GET
200
92.123.104.34:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
unknown
html
132 Kb
whitelisted
GET
200
92.123.104.32:443
https://www.bing.com/rb/16/jnc,nj/-M-8YWX0KlEtdAHVrkTvKQHOghs.js?bu=Dicwe4sBkgGVAYgBgQGFAcABwwEwuAHGAQ&or=w
unknown
binary
22.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6900
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6900
RUXIMICS.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6900
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.6
  • 23.216.77.28
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
self.events.data.microsoft.com
  • 20.189.173.25
whitelisted
www.bing.com
  • 104.126.37.163
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.145
  • 104.126.37.139
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.1
  • 20.190.159.131
  • 20.190.159.64
  • 20.190.159.130
  • 20.190.159.128
  • 20.190.159.68
  • 40.126.31.128
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.165.94.63
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info