File name:

e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.7z

Full analysis: https://app.any.run/tasks/af8b577a-20fe-4471-8556-a45f8911ebc7
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 18, 2024, 18:37:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
blacksnake
ransomware
stealer
crypto-regex
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

156FC5CCDE0AF5326DFBAC139BF55AAF

SHA1:

FF8247B693DBAC72225BF88927BD4FD51E02BA1C

SHA256:

CF95BBE5FF905C83F5B8D91E8B1CF387800C0BA050E6FA9E3670C1F43005F94E

SSDEEP:

98304:PRotb99N1tNxdXvZjnwxXkUF3sImIM13EXfQcQwLmfyqLin3Zji7XuJeR/v2cPZE:lolhWxJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 7044)
      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 4612)
    • Steals credentials from Web Browsers

      • svchost.exe (PID: 4612)
    • Create files in the Startup directory

      • svchost.exe (PID: 4612)
    • Modifies files in the Chrome extension folder

      • svchost.exe (PID: 4612)
    • BlackSnake note has been found

      • svchost.exe (PID: 4612)
    • Actions looks like stealing of personal data

      • svchost.exe (PID: 4612)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7044)
      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Application launched itself

      • Taskmgr.exe (PID: 7476)
    • Starts a Microsoft application from unusual location

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Reads the date of Windows installation

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Starts itself from another location

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Reads security settings of Internet Explorer

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • The process creates files with name similar to system file names

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Executable content was dropped or overwritten

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Found regular expressions for crypto-addresses (YARA)

      • svchost.exe (PID: 4612)
    • Start notepad (likely ransomware note)

      • svchost.exe (PID: 4612)
  • INFO

    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 7476)
      • Taskmgr.exe (PID: 7588)
    • Manual execution by a user

      • Taskmgr.exe (PID: 5520)
      • Taskmgr.exe (PID: 7476)
      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
      • notepad.exe (PID: 7016)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7044)
    • Checks supported languages

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
      • svchost.exe (PID: 4612)
    • Reads the machine GUID from the registry

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
      • svchost.exe (PID: 4612)
    • Reads the computer name

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
      • svchost.exe (PID: 4612)
    • Creates files or folders in the user directory

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
      • svchost.exe (PID: 4612)
    • Creates files in the program directory

      • svchost.exe (PID: 4612)
    • Process checks computer location settings

      • e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe (PID: 5768)
    • Create files in a temporary directory

      • svchost.exe (PID: 4612)
    • Dropped object may contain TOR URL's

      • svchost.exe (PID: 4612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe taskmgr.exe no specs taskmgr.exe taskmgr.exe no specs e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe slui.exe no specs #BLACKSNAKE svchost.exe notepad.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2072C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4612"C:\Users\admin\AppData\Roaming\svchost.exe" C:\Users\admin\AppData\Roaming\svchost.exe
e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Assistive Technology Manager
Version:
10.0.19041.1023 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\roaming\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5520"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
5768"C:\Users\admin\Desktop\e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe" C:\Users\admin\Desktop\e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Assistive Technology Manager
Exit code:
1
Version:
10.0.19041.1023 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\desktop\e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7016"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\UNLOCK_MY_FILES.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7044"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7160"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Roaming\UNLOCK_MY_FILES.txtC:\Windows\System32\notepad.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
7476"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
7588"C:\WINDOWS\system32\taskmgr.exe" /1C:\Windows\System32\Taskmgr.exeTaskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
18 315
Read events
18 259
Write events
48
Delete events
8

Modification events

(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.7z
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7044) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
2
Suspicious files
552
Text files
1 027
Unknown types
0

Dropped files

PID
Process
Filename
Type
4612svchost.exeC:\$WinREAgent\Rollback.xml.pay2unlockbinary
MD5:1B4BCDACD8D1F1E7D42AE8CCEB9A4214
SHA256:0B66D3CDCCDDBAF620FC8FE76E0FF7187F9DA8307B12E3A7212B58DA31A6E076
4612svchost.exeC:\$WinREAgent\UNLOCK_MY_FILES.txttext
MD5:1025530A0A25D61C5B506BDBBB936F36
SHA256:5E93C81C90C2053F4D0DB8DC4AF5E1EDD714EC54FEA52BF7DC6168F8A360F3A2
4612svchost.exeC:\$WinREAgent\RollbackInfo.ini.pay2unlockbinary
MD5:D8FA15B12B24B3E4C5BF61414D49009E
SHA256:465427C7CFAF466BFDDE95ACA82BACDB80837BE9D4E1AA0AB797794B57974388
4612svchost.exeC:\$WinREAgent\Rollback.xmlbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
5768e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exeC:\Users\admin\AppData\Roaming\svchost.exeexecutable
MD5:AFA9D7C88C28E9B8CCA140413CFB32E4
SHA256:E4C2E0AF462EBF12B716B52C681648D465F6245EC0AC12D92D909CA59662477B
7476Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\3534848bb9f4cb71\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
7044WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb7044.14611\e4c2e0af462ebf12b716b52c681648d465f6245ec0ac12d92d909ca59662477b.exeexecutable
MD5:AFA9D7C88C28E9B8CCA140413CFB32E4
SHA256:E4C2E0AF462EBF12B716B52C681648D465F6245EC0AC12D92D909CA59662477B
4612svchost.exeC:\$WinREAgent\RollbackInfo.inibinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
4612svchost.exeC:\$WinREAgent\Backup\ReAgent.xmlbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
4612svchost.exeC:\$WinREAgent\Backup\UNLOCK_MY_FILES.txttext
MD5:1025530A0A25D61C5B506BDBBB936F36
SHA256:5E93C81C90C2053F4D0DB8DC4AF5E1EDD714EC54FEA52BF7DC6168F8A360F3A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
7
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5968
backgroundTaskHost.exe
20.74.47.205:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
4716
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
7856
svchost.exe
4.209.32.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
2760
svchost.exe
40.113.103.199:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5968
backgroundTaskHost.exe
20.223.36.55:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5948
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4716
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
arc.msn.com
  • 20.74.47.205
whitelisted
login.live.com
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.134
  • 20.190.160.14
whitelisted
google.com
  • 172.217.18.14
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 104.126.37.153
  • 104.126.37.171
  • 104.126.37.170
  • 104.126.37.139
  • 104.126.37.145
  • 104.126.37.155
  • 104.126.37.163
  • 104.126.37.160
  • 104.126.37.161
whitelisted
licensing.mp.microsoft.com
  • 4.208.221.206
whitelisted

Threats

No threats detected
No debug info