File name:

ViperRansomware.zip

Full analysis: https://app.any.run/tasks/e90e0d1d-c5ba-4443-8964-a7767e57d63d
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: June 06, 2025, 10:46:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

FDC36FA26AD101D8EF6474E93769B0F7

SHA1:

CBC30F4CE19AE39B72F4236384A3C3235C32B779

SHA256:

C1563DC7766670D61C0EC9B0CD263AB9C53EA0D1457B7C2BA778715010828A1D

SSDEEP:

96:G1BjZnGA8wrMdKSyf2ZN+im4k+sUaMd0MpCJIiHAPdKYU3oc44WIBg0ztmXLW1gL:cn0KJwHRs2eMpSfHAPd4IStKLk8vdn/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4620)
    • RANSOMWARE has been detected

      • ViperRansomware.exe (PID: 6048)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4620)
    • Write to the desktop.ini file (may be used to cloak folders)

      • ViperRansomware.exe (PID: 6048)
  • INFO

    • Checks supported languages

      • ViperRansomware.exe (PID: 6048)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4620)
    • Reads the computer name

      • ViperRansomware.exe (PID: 6048)
    • Reads the machine GUID from the registry

      • ViperRansomware.exe (PID: 6048)
    • Reads the software policy settings

      • slui.exe (PID: 7256)
    • Manual execution by a user

      • notepad.exe (PID: 1268)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 1268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:16 05:04:58
ZipCRC: 0x31ec89ac
ZipCompressedSize: 5080
ZipUncompressedSize: 11776
ZipFileName: ViperRansomware.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe viperransomware.exe no specs THREAT viperransomware.exe conhost.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1268"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Viper_README.RW-SK.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2616"C:\Users\admin\AppData\Local\Temp\Rar$EXa4620.11204\ViperRansomware.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4620.11204\ViperRansomware.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ConsoleApp1
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4620.11204\viperransomware.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3208C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4620"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\ViperRansomware.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6044\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeViperRansomware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6048"C:\Users\admin\AppData\Local\Temp\Rar$EXa4620.11204\ViperRansomware.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4620.11204\ViperRansomware.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Description:
ConsoleApp1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4620.11204\viperransomware.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7256"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 181
Read events
2 173
Write events
8
Delete events
0

Modification events

(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\ViperRansomware.zip
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4620) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
1
Suspicious files
0
Text files
114
Unknown types
0

Dropped files

PID
Process
Filename
Type
6048ViperRansomware.exeC:\Users\admin\Viper_README.RW-SK.txttext
MD5:D4A9C2AAEE623F4C35F66B55140AC4B8
SHA256:B7C1FF4984DE04352E135A0A3DE7657C59768B4F302F0E5487B46C213319E9B5
6048ViperRansomware.exeC:\Users\admin\Desktop\bushprojects.jpgtext
MD5:1853B92296FF9EE40E905EC167716254
SHA256:A426B068990699D28CD029D0ADE6A49B61B7D37F34BB29EC6D0FC1C1290F352F
6048ViperRansomware.exeC:\Users\admin\3D Objects\Viper_README.RW-SK.txttext
MD5:D4A9C2AAEE623F4C35F66B55140AC4B8
SHA256:B7C1FF4984DE04352E135A0A3DE7657C59768B4F302F0E5487B46C213319E9B5
6048ViperRansomware.exeC:\Users\admin\Contacts\Viper_README.RW-SK.txttext
MD5:D4A9C2AAEE623F4C35F66B55140AC4B8
SHA256:B7C1FF4984DE04352E135A0A3DE7657C59768B4F302F0E5487B46C213319E9B5
6048ViperRansomware.exeC:\Users\admin\Desktop\infosome.rtftext
MD5:1853B92296FF9EE40E905EC167716254
SHA256:A426B068990699D28CD029D0ADE6A49B61B7D37F34BB29EC6D0FC1C1290F352F
6048ViperRansomware.exeC:\Users\admin\3D Objects\desktop.initext
MD5:1853B92296FF9EE40E905EC167716254
SHA256:A426B068990699D28CD029D0ADE6A49B61B7D37F34BB29EC6D0FC1C1290F352F
6048ViperRansomware.exeC:\Users\admin\Contacts\desktop.initext
MD5:1853B92296FF9EE40E905EC167716254
SHA256:A426B068990699D28CD029D0ADE6A49B61B7D37F34BB29EC6D0FC1C1290F352F
6048ViperRansomware.exeC:\Users\admin\Desktop\awardsselect.pngtext
MD5:1853B92296FF9EE40E905EC167716254
SHA256:A426B068990699D28CD029D0ADE6A49B61B7D37F34BB29EC6D0FC1C1290F352F
6048ViperRansomware.exeC:\Users\admin\Desktop\desktop.initext
MD5:1853B92296FF9EE40E905EC167716254
SHA256:A426B068990699D28CD029D0ADE6A49B61B7D37F34BB29EC6D0FC1C1290F352F
4620WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4620.11204\ViperRansomware.exeexecutable
MD5:5B1DE907E275300FFD9A931CF42D0E36
SHA256:69BB81A8FF5522FDDFA253B908BABCB1D7B745FD2BC70E5CB85F38EE7CE24A1D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
29
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7508
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7508
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.129
  • 20.190.159.64
  • 20.190.159.128
  • 40.126.31.128
  • 40.126.31.67
  • 20.190.159.129
  • 40.126.31.71
  • 40.126.31.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 23.219.150.101
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info