File name:

lynx.exe

Full analysis: https://app.any.run/tasks/210f72cd-5127-4db4-83c2-9d8b8b00cac6
Verdict: Malicious activity
Threats:

Lynx is a double extortion ransomware: attackers encrypt important and sensitive data and demand a ransom for decryption simultaneously threatening to publish or sell the data. Active since mid-2024. Among techniques are terminating processes and services, privilege escalation, deleting shadow copies. Distribution by phishing, malvertising, exploiting vulnerabilities.

Analysis date: March 19, 2025, 07:24:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
lynx
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

57F45C0738AF9CD49C61984EA99F83CA

SHA1:

5338CAE40E5419A0567B8162C52484F390284F15

SHA256:

B378B7EF0F906358EEC595777A50F9BB5CC7BB6635E0F031D65B818A26BDC4EE

SSDEEP:

3072:U4BBDFFFb1jQRbLuZJ3hbUXe1FXkutxL4HBc6XwYUbgxFwxtMMeX4dPHhdse:UG1jYePWXAPxL4Hm6XwYUsAtBdse

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LYNX has been found (auto)

      • lynx.exe (PID: 4428)
    • LYNX has been detected (YARA)

      • lynx.exe (PID: 4428)
    • RANSOMWARE has been detected

      • lynx.exe (PID: 4428)
    • LYNX has been detected

      • lynx.exe (PID: 4428)
    • Renames files like ransomware

      • lynx.exe (PID: 4428)
    • Scans artifacts that could help determine the target

      • ONENOTE.EXE (PID: 11056)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • lynx.exe (PID: 4428)
    • There is functionality for taking screenshot (YARA)

      • lynx.exe (PID: 4428)
    • Changes the desktop background image

      • lynx.exe (PID: 4428)
    • Executes as Windows Service

      • FXSSVC.exe (PID: 10940)
    • Detected use of alternative data streams (AltDS)

      • ONENOTE.EXE (PID: 11056)
    • Reads security settings of Internet Explorer

      • ONENOTE.EXE (PID: 11056)
  • INFO

    • Creates files in the program directory

      • lynx.exe (PID: 4428)
      • FXSSVC.exe (PID: 10940)
    • Checks supported languages

      • lynx.exe (PID: 4428)
      • ONENOTE.EXE (PID: 11056)
    • Reads the machine GUID from the registry

      • lynx.exe (PID: 4428)
      • ONENOTE.EXE (PID: 11056)
    • Reads the computer name

      • lynx.exe (PID: 4428)
    • Create files in a temporary directory

      • lynx.exe (PID: 4428)
      • ONENOTE.EXE (PID: 11056)
    • Reads security settings of Internet Explorer

      • printfilterpipelinesvc.exe (PID: 10832)
    • Disables trace logs

      • FXSSVC.exe (PID: 10940)
    • Creates files or folders in the user directory

      • printfilterpipelinesvc.exe (PID: 10832)
      • ONENOTE.EXE (PID: 11056)
    • Reads Microsoft Office registry keys

      • ONENOTE.EXE (PID: 11056)
    • Checks proxy server information

      • ONENOTE.EXE (PID: 11056)
    • Reads the software policy settings

      • ONENOTE.EXE (PID: 11056)
    • Process checks computer location settings

      • ONENOTE.EXE (PID: 11056)
    • Reads CPU info

      • ONENOTE.EXE (PID: 11056)
    • Reads Environment values

      • ONENOTE.EXE (PID: 11056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:04 06:49:12+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.37
CodeSize: 119808
InitializedDataSize: 49664
UninitializedDataSize: -
EntryPoint: 0x9de7
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
7
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #LYNX lynx.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs printfilterpipelinesvc.exe no specs fxssvc.exe no specs onenote.exe

Process information

PID
CMD
Path
Indicators
Parent process
4428"C:\Users\admin\AppData\Local\Temp\lynx.exe" C:\Users\admin\AppData\Local\Temp\lynx.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\lynx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
6988\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exelynx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7712C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7760"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
10832C:\WINDOWS\system32\printfilterpipelinesvc.exe -EmbeddingC:\Windows\System32\printfilterpipelinesvc.exesvchost.exe
User:
LOCAL SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Print Filter Pipeline Host
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\printfilterpipelinesvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
10940C:\WINDOWS\system32\fxssvc.exeC:\Windows\System32\FXSSVC.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Fax Service
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fxssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shlwapi.dll
11056/insertdoc "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\{E9A63B30-0E5B-4BB6-8209-A60308745B62}.xps" 133868427034720000C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
printfilterpipelinesvc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneNote
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\onenote.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\combase.dll
Total events
9 678
Read events
9 571
Write events
85
Delete events
22

Modification events

(PID) Process:(4428) lynx.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:Wallpaper
Value:
C:\Users\admin\AppData\Local\Temp\\background-image.jpg
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax
Operation:writeName:RedirectionGuard
Value:
1
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts
Operation:writeName:Password
Value:
00
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts
Operation:delete valueName:Password
Value:
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Security
Operation:writeName:Descriptor
Value:
010004805C000000680000000000000014000000020048000300000000001800E7020E000102000000000005200000002002000000001400030002000101000000000001000000000000140027020200010100000000000504000000010100000000000514000000010100000000000514000000
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts
Operation:writeName:Server
Value:
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts
Operation:writeName:From
Value:
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts
Operation:writeName:User
Value:
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Outbound Routing\Groups\<All devices>
Operation:writeName:Devices
Value:
(PID) Process:(10940) FXSSVC.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Outbound Routing\Rules\0:0
Operation:writeName:CountryCode
Value:
0
Executable files
0
Suspicious files
209
Text files
123
Unknown types
0

Dropped files

PID
Process
Filename
Type
4428lynx.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\AcroRdrDCx64Upd2300820470_MUI.msp
MD5:
SHA256:
4428lynx.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\AcroRdrDCx64Upd2300820470_MUI.msp.LYNX
MD5:
SHA256:
4428lynx.exeC:\ProgramData\Microsoft\User Account Pictures\admin.dat
MD5:
SHA256:
4428lynx.exeC:\ProgramData\Microsoft OneDrive\setup\refcount.ini
MD5:
SHA256:
4428lynx.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\README.txttext
MD5:9DEE6455AF149BAFC938E38FB5C535E1
SHA256:20E4303FD2A1EA16C03BC66130EAA8CF19A61C49C8B3B15F7BB2BDABFA8071E6
4428lynx.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\UpdateLock-308046B0AF4A39CB
MD5:
SHA256:
4428lynx.exeC:\ProgramData\Microsoft\DataMart\PaidWiFi\README.txttext
MD5:9DEE6455AF149BAFC938E38FB5C535E1
SHA256:20E4303FD2A1EA16C03BC66130EAA8CF19A61C49C8B3B15F7BB2BDABFA8071E6
4428lynx.exeC:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\README.txttext
MD5:9DEE6455AF149BAFC938E38FB5C535E1
SHA256:20E4303FD2A1EA16C03BC66130EAA8CF19A61C49C8B3B15F7BB2BDABFA8071E6
4428lynx.exeC:\ProgramData\Adobe\ARM\S\388\README.txttext
MD5:9DEE6455AF149BAFC938E38FB5C535E1
SHA256:20E4303FD2A1EA16C03BC66130EAA8CF19A61C49C8B3B15F7BB2BDABFA8071E6
4428lynx.exeC:\ProgramData\Adobe\Temp\README.txttext
MD5:9DEE6455AF149BAFC938E38FB5C535E1
SHA256:20E4303FD2A1EA16C03BC66130EAA8CF19A61C49C8B3B15F7BB2BDABFA8071E6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
25
DNS requests
8
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
11056
ONENOTE.EXE
52.109.76.240:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
11056
ONENOTE.EXE
52.123.130.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.181.238
whitelisted
officeclient.microsoft.com
  • 52.109.76.240
whitelisted
ecs.office.com
  • 52.123.130.14
  • 52.123.131.14
whitelisted
self.events.data.microsoft.com
  • 52.168.117.170
whitelisted

Threats

No threats detected
No debug info