File name:

Pe32-v4.0.1.exe

Full analysis: https://app.any.run/tasks/93a94856-9c3a-4e23-84a1-2cd83f0fe3a8
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: February 12, 2025, 13:57:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
telegram
ims-api
generic
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 5 sections
MD5:

1289A867FAFE321B51A93AA47AFAFFC9

SHA1:

221D0CBD5C7A0C84BB86B4351C552F6EFCD4F3B6

SHA256:

C6DDC9C2852EDDF30F945A50183E28D38F6B9B1BBAD01AAC52E9D9539482A433

SSDEEP:

49152:WkpV7eOOhjIXwUJkrKddtJi8F4+uhH2en:pb7efjLF0i8G5Ae

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RANSOMWARE has been detected

      • Pe32-v4.0.1.exe (PID: 6308)
  • SUSPICIOUS

    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Pe32-v4.0.1.exe (PID: 6308)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • Pe32-v4.0.1.exe (PID: 6308)
    • Creates file in the systems drive root

      • Pe32-v4.0.1.exe (PID: 6308)
  • INFO

    • Checks supported languages

      • Pe32-v4.0.1.exe (PID: 6308)
    • Reads the computer name

      • Pe32-v4.0.1.exe (PID: 6308)
    • Reads the software policy settings

      • Pe32-v4.0.1.exe (PID: 6308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(6308) Pe32-v4.0.1.exe
Telegram-Responses
oktrue
result
message_id1516
from
id8179978828
is_bottrue
first_namemypersonalbot
usernamemypersonal83247bot
chat
id-4785122270
titlePe32 Reports Armin
typegroup
all_members_are_administratorstrue
date1739368694
text[PE32 v4.0.1] [Armin] [Wed, 12 Feb 2025 13:58:09] [] NEW RUN ID: 4A7D246430680653
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:02:10 05:32:16+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 1605632
InitializedDataSize: 568832
UninitializedDataSize: -
EntryPoint: 0x16fc50
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT pe32-v4.0.1.exe conhost.exe no specs rundll32.exe no specs openwith.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2756C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3812C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6308"C:\Users\admin\AppData\Local\Temp\Pe32-v4.0.1.exe" C:\Users\admin\AppData\Local\Temp\Pe32-v4.0.1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\pe32-v4.0.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
ims-api
(PID) Process(6308) Pe32-v4.0.1.exe
Telegram-Responses
oktrue
result
message_id1516
from
id8179978828
is_bottrue
first_namemypersonalbot
usernamemypersonal83247bot
chat
id-4785122270
titlePe32 Reports Armin
typegroup
all_members_are_administratorstrue
date1739368694
text[PE32 v4.0.1] [Armin] [Wed, 12 Feb 2025 13:58:09] [] NEW RUN ID: 4A7D246430680653
6316\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exePe32-v4.0.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
1 296
Read events
1 296
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
666
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
6308Pe32-v4.0.1.exeC:\PE32-KEY\context.pe32c
MD5:
SHA256:
6308Pe32-v4.0.1.exeC:\Program Files\Mozilla Firefox\omni.ja
MD5:
SHA256:
6308Pe32-v4.0.1.exeC:\PE32-KEY\IDtext
MD5:8E4CBEEA267DF5BA76317BF0AFC8A761
SHA256:B045AD78209596C8A19B86B268860EF9EA9CEEBBB37D4BBBACA43E011C5E78D6
6308Pe32-v4.0.1.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\profile_count_308046B0AF4A39CB.jsonbinary
MD5:E1CB8A67FA9D918B9DA8E609A692902D
SHA256:15986884642653B382EA7195147FD1852C0700E32F0E02114B28617D5BB9E2C5
6308Pe32-v4.0.1.exeC:\Users\admin\Desktop\bodyagreement.jpgbinary
MD5:8CB0AA8B09E8AFC9C34EE8088FCC595F
SHA256:E403A6927A7516521E5D4E39C5122038190A0F7E212E288538C90D0F7AA91F13
6308Pe32-v4.0.1.exeC:\Users\admin\Desktop\africaintroduction.rtfbinary
MD5:46A2EE703C758FE887D42A3178FAB312
SHA256:EF0A0F8D927051D639F176A58D923F024F00EC94C3EE855556324E8A418D2489
6308Pe32-v4.0.1.exeC:\Users\admin\Desktop\[africaintroduction].[4A7D246430680653].[rtf].pe32sbinary
MD5:46A2EE703C758FE887D42A3178FAB312
SHA256:EF0A0F8D927051D639F176A58D923F024F00EC94C3EE855556324E8A418D2489
6308Pe32-v4.0.1.exeC:\ProgramData\Microsoft\User Account Pictures\admin.datbinary
MD5:8C4C3ADFD0CE992E23271D00A393952F
SHA256:95B8ED7053C95F15A9C271F497BC70B8F4064C5F6FAE1C8792B4F5761379C30D
6308Pe32-v4.0.1.exeC:\Users\admin\Desktop\[acceptedhall].[4A7D246430680653].[png].pe32sbinary
MD5:A77BDEB5922D3F6F29D425B9338C22B5
SHA256:B7D865EAC8232786C4B47C6BF41B7A395C5830B12D72F155FE578D1DF02F5A75
6308Pe32-v4.0.1.exeC:\Users\admin\Desktop\citiesthird.jpgbinary
MD5:07504E833F6E138037554121DE0C44DE
SHA256:3CFCBDA225A10BB451CA334CAB0CCE9F3D5549B778064DBF61EC01C3D0FECC3D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
30
DNS requests
15
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
23.40.158.218:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
23.40.158.218:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6172
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6572
backgroundTaskHost.exe
GET
200
23.40.158.218:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6172
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2.16.110.171:443
Akamai International B.V.
DE
unknown
6308
Pe32-v4.0.1.exe
149.154.167.220:443
api.telegram.org
Telegram Messenger Inc
GB
whitelisted
1864
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.16.110.202:443
Akamai International B.V.
DE
unknown
1176
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
23.40.158.218:80
ocsp.digicert.com
AKAMAI-AS
MX
whitelisted
5064
SearchApp.exe
23.40.158.218:80
ocsp.digicert.com
AKAMAI-AS
MX
whitelisted
1076
svchost.exe
2.18.97.227:443
go.microsoft.com
Akamai International B.V.
FR
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
api.telegram.org
  • 149.154.167.220
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.128
  • 20.190.160.17
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.72
  • 20.190.160.2
  • 20.190.160.131
whitelisted
ocsp.digicert.com
  • 23.40.158.218
whitelisted
go.microsoft.com
  • 2.18.97.227
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 23.209.214.100
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
6308
Pe32-v4.0.1.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
6308
Pe32-v4.0.1.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
6308
Pe32-v4.0.1.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
6308
Pe32-v4.0.1.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
No debug info