File name:

5131014234996736.zip

Full analysis: https://app.any.run/tasks/ea3bdeab-c09c-46d6-bd67-76f437019fcc
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 31, 2020, 07:08:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

E50464922CBC96E2BB3F35B33AE51F76

SHA1:

C6A4C438B1CCB332F94B78C2037889E465C4FBEF

SHA256:

E23453AE7354B46D33D5589A05DA9550631B205B7B4D4F3203EFC81D91FC9815

SSDEEP:

12288:jGJsOYBUR03I39fgQTW6tzgCcG/FTW8Lwbmn1XMkktPewbUa1V+ElX7Cae:6JsBB803I39oT6w98LM41XQemUa1VD7u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Changes the autorun value in the registry

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Writes to a start menu file

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Runs app for hidden code execution

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Deletes shadow copies

      • cmd.exe (PID: 3028)
    • Renames files like Ransomware

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Creates files in the Windows directory

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Creates files in the user directory

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
    • Executed as Windows Service

      • vssvc.exe (PID: 3664)
    • Creates files in the program directory

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
  • INFO

    • Manual execution by user

      • 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe (PID: 3292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0xf327daf8
ZipCompressedSize: 656657
ZipUncompressedSize: 979456
ZipFileName: 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs 4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe cmd.exe no specs mode.com no specs vssadmin.exe no specs vssvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1196mode con cp select=1251C:\Windows\system32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mode.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2676"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\5131014234996736.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2808vssadmin delete shadows /all /quietC:\Windows\system32\vssadmin.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3028"C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3292"C:\Users\admin\Desktop\4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe" C:\Users\admin\Desktop\4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe
explorer.exe
User:
admin
Company:
Abbott Laboratories
Integrity Level:
HIGH
Description:
Influences Continually Lipson
Exit code:
0
Modules
Images
c:\users\admin\desktop\4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3664C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
459
Read events
438
Write events
21
Delete events
0

Modification events

(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2676) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\5131014234996736.zip
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(2676) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
0
Suspicious files
365
Text files
30
Unknown types
32

Dropped files

PID
Process
Filename
Type
2676WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2676.37874\4e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\Users\admin\AppData\Local\Temp\4951168
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\branding.xml
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\Setup.xml
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0411-0000-0000000FF1CE}-C\AccessMUI.xml
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccLR.cab.id-C4BA3647.[bitcoin@email.tg].ncov
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0411-0000-0000000FF1CE}-C\branding.xml
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0411-0000-0000000FF1CE}-C\Setup.xml
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0412-0000-0000000FF1CE}-C\AccessMUI.xml
MD5:
SHA256:
32924e3f955aa7816091ccc3a65877bdd91b32747dfe6a375e438157521c04f7f335.exeC:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\AccLR.cab.id-C4BA3647.[bitcoin@email.tg].ncov
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info