File name:

HITLER_RANSOMWARE.bin.zip

Full analysis: https://app.any.run/tasks/89efe362-a297-4797-a350-820a8a8c6c33
Verdict: Malicious activity
Analysis date: February 20, 2021, 20:04:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

0A0C2DBC58C6F973ABDFC9B33AA2752B

SHA1:

A210804D64BC5D8685F822871B1F295A8F4A1C56

SHA256:

EA0F481AC317D20954FA66DE7AEB1B05DAB4AB76A7871D76F168096F2D9369BF

SSDEEP:

3072:k5prT8UlK8LMpAkAoE8kuTAV6O137SpaD5nzKSyMiH/dPoWbO1exu:k5VQU5MKk5Cu0V34paDfyM4/dQWqc4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • HITLER_RANSOMWARE.exe (PID: 1236)
      • HITLER_RANSOMWARE.exe (PID: 3976)
      • chrst.exe (PID: 3152)
    • Drops executable file immediately after starts

      • HITLER_RANSOMWARE.exe (PID: 1236)
    • Writes to a start menu file

      • cmd.exe (PID: 3324)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • HITLER_RANSOMWARE.exe (PID: 1236)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2964)
      • HITLER_RANSOMWARE.exe (PID: 1236)
      • cmd.exe (PID: 3324)
    • Executes scripts

      • cmd.exe (PID: 3324)
    • Creates files in the program directory

      • cmd.exe (PID: 3324)
    • Starts CMD.EXE for commands execution

      • HITLER_RANSOMWARE.exe (PID: 1236)
  • INFO

    • Manual execution by user

      • HITLER_RANSOMWARE.exe (PID: 3976)
      • HITLER_RANSOMWARE.exe (PID: 1236)
      • explorer.exe (PID: 2544)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2019:02:13 17:42:05
ZipCRC: 0x0be3d324
ZipCompressedSize: 190177
ZipUncompressedSize: 286720
ZipFileName: HITLER_RANSOMWARE.bin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe hitler_ransomware.exe no specs hitler_ransomware.exe cmd.exe wscript.exe no specs chrst.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\HITLER_RANSOMWARE.bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
3976"C:\Users\admin\Desktop\HITLER_RANSOMWARE.exe" C:\Users\admin\Desktop\HITLER_RANSOMWARE.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\hitler_ransomware.exe
c:\systemroot\system32\ntdll.dll
1236"C:\Users\admin\Desktop\HITLER_RANSOMWARE.exe" C:\Users\admin\Desktop\HITLER_RANSOMWARE.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\hitler_ransomware.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
3324"C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\1710.tmp\ExtraTools.bat "C:\Users\admin\Desktop\HITLER_RANSOMWARE.exe""C:\Windows\System32\cmd.exe
HITLER_RANSOMWARE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2900"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\1710.tmp\ErOne.vbs" C:\Windows\System32\WScript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3152chrst.exe C:\Users\admin\AppData\Local\Temp\1710.tmp\chrst.execmd.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
chrst
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\1710.tmp\chrst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2544"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
934
Read events
909
Write events
25
Delete events
0

Modification events

(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2964) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HITLER_RANSOMWARE.bin.zip
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
120
Executable files
5
Suspicious files
1
Text files
37
Unknown types
4

Dropped files

PID
Process
Filename
Type
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\__rzi_2964.33305
MD5:
SHA256:
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\HITLER_RANSOMWARE.bin.zipcompressed
MD5:0E767AED9F1530D336C8EC070F7D3611
SHA256:026ED439ED8FCE24A4AF527FF782032964CA1592EFA90FDC0E66DE70545C14C0
3324cmd.exeC:\Users\admin\Pictures\abilitypointimage
MD5:A30490CDE51CC53C52F5A13CCA5B2E4A
SHA256:DDF2C013EFD9760DA9487190D2EF117BE631808F0B5CDC981FD1ED0625F7A4ED
3324cmd.exeC:\Users\admin\Pictures\picturesscienceimage
MD5:DE1BC5DB0720B8765152AE1E3A0F33B0
SHA256:28EF0FDC7D562922E63C7051C7C6DD5AF7632DEA6204FBEA6E8013280E0F05BC
3324cmd.exeC:\Users\admin\Pictures\llcfreeimage
MD5:D537EFF07F477748ECD6270A26EC247F
SHA256:A3FD3F2F673EA433CFB55B2A587887C1352C70F7AF53B9F0E61FF706343893E7
3324cmd.exeC:\Users\Public\Pictures\Sample Pictures\Jellyfishimage
MD5:5A44C7BA5BBE4EC867233D67E4806848
SHA256:6CA0EAFB20496EDF23FC1480E8B545399F484A630698324BE652ED10F45FA2FC
3324cmd.exeC:\Users\Public\Pictures\Sample Pictures\Desertimage
MD5:BA45C8F60456A672E003A875E469D0EB
SHA256:010F60D2927A35D0235490136EF9F4953B7EE453073794BCAF153D20A64544EA
3324cmd.exeC:\Users\admin\Pictures\animalfinanceimage
MD5:7D20F8CB7B0073506FA95A4059A1A67E
SHA256:820D0A90D1D8909AAA2BFA8ADEED98A4E526E9FD9AE2077A48BE604B0E61F6AE
3324cmd.exeC:\Users\admin\Pictures\browseadviceimage
MD5:B01882B18F83C15F6D99F8531C957148
SHA256:CE5FF53145BD553E3B7B5D2A71AA88979C36E5458625CA7F76142EB80950E44D
1236HITLER_RANSOMWARE.exeC:\Users\admin\AppData\Local\Temp\1710.tmp\ErOne.vbstext
MD5:A764FE63C6CC48C851F0D2A8BA73C2B7
SHA256:8C4D90A5343CEA107FAD96E842404522AADFC416E7CF84ADC58FE2BA72BBC919
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info