File name:

RansomwareApp.exe

Full analysis: https://app.any.run/tasks/5f7c96ee-bdc5-431a-90bf-ae0e1b3bee80
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: June 21, 2025, 15:36:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
confuser
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A91FC36EDCEDA99E0426C1E8CB6500F4

SHA1:

CD82712D55DDA3B6346736DC74F6FA83B7778E11

SHA256:

B6840BD1762F0EA72328B9A61C00E9BA929B37AFEF88F66B3902AF7AF63F5E37

SSDEEP:

768:angAn6rGcIDCrq5Y0i3a4aYRb4pBcWEV8LHjsiJ:angYFcseq4aYeXEsJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • RansomwareApp.exe (PID: 6376)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads the computer name

      • RansomwareApp.exe (PID: 6376)
    • Checks supported languages

      • RansomwareApp.exe (PID: 6376)
    • Reads the machine GUID from the registry

      • RansomwareApp.exe (PID: 6376)
    • Confuser has been detected (YARA)

      • RansomwareApp.exe (PID: 6376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:06:06 13:50:52+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 23552
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x7a6e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: RansomwareApp
FileVersion: 1.0.0.0
InternalName: RansomwareApp.exe
LegalCopyright: Copyright © 2025
LegalTrademarks: -
OriginalFileName: RansomwareApp.exe
ProductName: RansomwareApp
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT ransomwareapp.exe slui.exe no specs ransomwareapp.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3908C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5884"C:\Users\admin\AppData\Local\Temp\RansomwareApp.exe" C:\Users\admin\AppData\Local\Temp\RansomwareApp.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
RansomwareApp
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ransomwareapp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6376"C:\Users\admin\AppData\Local\Temp\RansomwareApp.exe" C:\Users\admin\AppData\Local\Temp\RansomwareApp.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
RansomwareApp
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ransomwareapp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
1 147
Read events
1 147
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
34
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6376RansomwareApp.exeC:\Users\admin\Desktop\daycard.rtf.clfbinary
MD5:A07B9F41DEFD93570EEEB9E9534AC578
SHA256:42B4BEB9E23EF462E31B9DCB458EC5EC4FBFE1221905D79C00B470C62198BCB9
6376RansomwareApp.exeC:\Users\admin\Desktop\authorswhose.rtf.clfbinary
MD5:3957FCE31D1CE99E36E2C32FA81E2947
SHA256:455A2E88601AF360A05A998E6A912622E2039E3F1C85B3F648DA662577A9EB1D
6376RansomwareApp.exeC:\Users\admin\Desktop\creategreater.rtf.clfbinary
MD5:FD4A4483267098CD8CF331CC5D15BA00
SHA256:7C0E89005B2AC7E63050106194090C4FFA102C6FA86EE01A459B4D70B5793A23
6376RansomwareApp.exeC:\Users\admin\Desktop\fieldsbob.rtf.clfbinary
MD5:9A17CB75D25694C8653D66C3D9FBF844
SHA256:852875BF32CAAC48521E9C5E6CBFF868AF2032235BBC61BE7D034C89D1E2E1AC
6376RansomwareApp.exeC:\Users\admin\Desktop\writtenconsider.png.clfbinary
MD5:AD2773852B1E588D8396FE5B6125C29C
SHA256:1E791C3F5176C6DC224210C4C6FD12ABFFA28E858E632799AF6C6C430D01F3CA
6376RansomwareApp.exeC:\Users\admin\Pictures\desktop.ini.clfbinary
MD5:B68CB0C2514297877EB685590D36983D
SHA256:25E8A3C4EF455417F154A6A32DB6FE1F4D9C553DA1A889A8090493CD337DBC21
6376RansomwareApp.exeC:\Users\admin\Pictures\completegame.png.clfbinary
MD5:D33579B1A01AE6AA2EFF700AF8D7C8D6
SHA256:61CA5FE52D05156EA7E1D7929657FFA6504B756E9B03C38EFE47F477B4B033B9
6376RansomwareApp.exeC:\Users\admin\Desktop\whichmailing.jpg.clfbinary
MD5:E8E168C505B0DC0B7F2046590B1B864A
SHA256:19F422774D071CD5D0065D89DCA05F6AB58D8633E408D3E4091A4E5FCB780986
6376RansomwareApp.exeC:\Users\admin\Desktop\rentalthinking.rtf.clfbinary
MD5:5EEE8527FDFC3E14CA31425136CA65AC
SHA256:C3D64093A83670426054C3AD6B54DFB7702C1ABE5B1F51E55A17B4E028AD8B5B
6376RansomwareApp.exeC:\Users\admin\Desktop\recentjack.jpg.clfbinary
MD5:94E216BED49C9B1FEC64FD05AC85889B
SHA256:907D81C883954C73A1B4FEED0716EC5D0CD4FBAC1BF91AB9661B344DCB8F4046
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
26
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2764
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.55.104.190:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6228
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6228
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2228
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2764
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2764
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
23.55.104.190:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.131
  • 40.126.31.128
  • 40.126.31.131
  • 20.190.159.4
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.48
whitelisted
crl.microsoft.com
  • 23.55.104.190
  • 23.55.104.172
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info