File name:

Trojan-Ransom.Win32.Foreign.oep-2d4255383e33066e1b6b71247728848ec01b41f5afab6be2a405294791642022.7z

Full analysis: https://app.any.run/tasks/3e49573f-e487-4a48-89a4-cb65c2a19cf9
Verdict: Malicious activity
Analysis date: April 19, 2025, 17:03:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

4D98714A63D5B398709723A6DA526362

SHA1:

78D71AB1B3EA69F5AD589D63BC128154F506EFA1

SHA256:

AB83768372B9E3172F3E84062123A0EFFC314370092B01976C39ACE0573A0BA2

SSDEEP:

3072:pAaFpeZqxrD7eqjIhsoIxwqC9EK6nEZdZ7sWumqYx/EKc8LqsC0OnIKyYFXQxX1m:7OZqt3jIgxwlEK0EZdnZNpLqsgIYqxlm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Disables task manager

      • rundll32.exe (PID: 3800)
      • notepad.exe (PID: 3296)
      • notepad.exe (PID: 4072)
      • iexplore.exe (PID: 3204)
    • Task Manager has been disabled (taskmgr)

      • notepad.exe (PID: 3296)
      • notepad.exe (PID: 4072)
      • iexplore.exe (PID: 3204)
    • Create files in the Startup directory

      • rundll32.exe (PID: 3800)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • pwsh.exe (PID: 2652)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 2956)
    • Changes internet zones settings

      • rundll32.exe (PID: 3800)
      • notepad.exe (PID: 3296)
      • notepad.exe (PID: 4072)
    • Starts CMD.EXE for commands execution

      • pwsh.exe (PID: 2652)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2692)
    • Manual execution by a user

      • pwsh.exe (PID: 2652)
    • Creates files or folders in the user directory

      • rundll32.exe (PID: 3800)
    • Checks supported languages

      • pwsh.exe (PID: 2652)
    • Reads the computer name

      • pwsh.exe (PID: 2652)
    • Application launched itself

      • iexplore.exe (PID: 3204)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2012:06:16 11:19:20+00:00
ArchivedFileName: Trojan-Ransom.Win32.Foreign.oep-2d4255383e33066e1b6b71247728848ec01b41f5afab6be2a405294791642022.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
9
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe pwsh.exe cmd.exe no specs rundll32.exe notepad.exe no specs explorer.exe no specs iexplore.exe iexplore.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2652"C:\Program Files\PowerShell\7\pwsh.exe" -WorkingDirectory ~C:\Program Files\PowerShell\7\pwsh.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
pwsh
Version:
7.2.11.500
Modules
Images
c:\program files\powershell\7\pwsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2692"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Foreign.oep-2d4255383e33066e1b6b71247728848ec01b41f5afab6be2a405294791642022.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2956"C:\Windows\system32\cmd.exe"C:\Windows\System32\cmd.exepwsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2992"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3204 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3204"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3296notepad.exeC:\Windows\System32\notepad.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3632explorer.exeC:\Windows\explorer.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3800rundll32 a.dll, #1C:\Windows\System32\rundll32.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
4072notepad.exeC:\Windows\System32\notepad.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
22 634
Read events
22 292
Write events
324
Delete events
18

Modification events

(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2692) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Trojan-Ransom.Win32.Foreign.oep-2d4255383e33066e1b6b71247728848ec01b41f5afab6be2a405294791642022.7z
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2692) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
1
Suspicious files
7
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2652pwsh.exeC:\Users\admin\AppData\Local\Microsoft\PowerShell\7.2.11\update1_v7.5.0_2025-01-23
MD5:
SHA256:
2692WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2692.1226\Trojan-Ransom.Win32.Foreign.oep-2d4255383e33066e1b6b71247728848ec01b41f5afab6be2a405294791642022.dllexecutable
MD5:66FCFA90B354B5022CC9F1E8ACF6D655
SHA256:2D4255383E33066E1B6B71247728848EC01B41F5AFAB6BE2A405294791642022
2652pwsh.exeC:\Users\admin\AppData\Local\Microsoft\PowerShell\StartupProfileData-Interactivebinary
MD5:A38AE9F36E51E9621D0AD589FDD91C45
SHA256:E0883D68C9A7C96767EFD3DB8637C3372A16C7644FA43B147342ADA8380E8F70
2652pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\e1a648060a327b80.customDestinations-msbinary
MD5:A20A86C096ADCB3F2B94729E95AC8359
SHA256:9B6C50119EFA806C4BD1CD2C2B0A8524F261AA19EC2B882AD52677A2A0ADC273
2652pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\e1a648060a327b80.customDestinations-ms~RF187c8e.TMPbinary
MD5:A20A86C096ADCB3F2B94729E95AC8359
SHA256:9B6C50119EFA806C4BD1CD2C2B0A8524F261AA19EC2B882AD52677A2A0ADC273
2652pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RW5Y9W3CI5T3WBMJEZWL.tempbinary
MD5:A20A86C096ADCB3F2B94729E95AC8359
SHA256:9B6C50119EFA806C4BD1CD2C2B0A8524F261AA19EC2B882AD52677A2A0ADC273
3800rundll32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.dll.lnkbinary
MD5:5B1ECE85696748FA266B7961489211E5
SHA256:CBC46E8734A3DFEAF030782D1655778137BABD355D0EEFE11E342E23F9FE6C10
2652pwsh.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0u05lwhy.rpb.ps1text
MD5:1502353AA88DE581E87DA70A4A16FA59
SHA256:4A6C3C5EB717C24D8DFB687C988BFD262063C266C6F624092A3294A397306E13
2652pwsh.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_duvka5xg.1se.psm1text
MD5:1502353AA88DE581E87DA70A4A16FA59
SHA256:4A6C3C5EB717C24D8DFB687C988BFD262063C266C6F624092A3294A397306E13
3204iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:B52DD8AD45A837013069F181574C2532
SHA256:CE3505CE15C4B84039ED1D5FD2153AE3EE880E0F30A2093DC1F1D897F22F38F1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
16
DNS requests
9
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3204
iexplore.exe
GET
200
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?653aa7bc651cdf0a
unknown
whitelisted
3204
iexplore.exe
GET
200
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b9a76800a9b7dc19
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
2652
pwsh.exe
23.193.246.7:443
aka.ms
Akamai International B.V.
MX
whitelisted
2652
pwsh.exe
13.107.246.45:443
powershellinfraartifacts-gkhedzdeaghdezhr.z01.azurefd.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
malicious
2992
iexplore.exe
91.195.254.35:80
WEB LLC
AM
unknown
3204
iexplore.exe
92.123.104.32:443
www.bing.com
Akamai International B.V.
DE
whitelisted
3204
iexplore.exe
23.50.131.200:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
whitelisted
2652
pwsh.exe
20.50.88.244:443
dc.services.visualstudio.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
aka.ms
  • 23.193.246.7
whitelisted
powershellinfraartifacts-gkhedzdeaghdezhr.z01.azurefd.net
  • 13.107.246.45
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 92.123.104.32
  • 92.123.104.33
  • 92.123.104.17
  • 92.123.104.47
  • 92.123.104.43
  • 92.123.104.11
  • 92.123.104.34
  • 92.123.104.52
  • 92.123.104.7
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.200
  • 23.50.131.216
whitelisted
dc.services.visualstudio.com
  • 20.50.88.244
whitelisted

Threats

PID
Process
Class
Message
2652
pwsh.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
Process
Message
pwsh.exe
Profiler was prevented from loading notification profiler due to app settings. Process ID (decimal): 2652. Message ID: [0x2509].