| File name: | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.7z |
| Full analysis: | https://app.any.run/tasks/be15edda-8df4-4c0b-8831-06dfdfb60a62 |
| Verdict: | Malicious activity |
| Threats: | Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying. |
| Analysis date: | April 13, 2025, 12:22:34 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 8806450EA6DDDF5495176AAA678199F4 |
| SHA1: | 91FAF857E29B87B8FE8AD02F7A43A38449B1CAA1 |
| SHA256: | EF128D5091A6384E8F8FFA17395E100196539F0C75D73BBDC4A36A5498966C87 |
| SSDEEP: | 24576:+xPBkFZtpkj9RFCa8X6aIEL8k0qDGHli1y7EM/o1kKlV3k8Q4F9Sv3a/vLfS0MWJ:+xPBkFZtpkj9RFCa8X9IEL8k/DGHli1n |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|---|
| ModifyDate: | 2021:04:25 12:05:16+00:00 |
| ArchivedFileName: | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 496 | net stop ΓÇ£Sophos AutoUpdate ServiceΓÇ¥ /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | C:\WINDOWS\system32\net1 stop VeeamDeploymentService /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | net stop SQLSafeOLRService /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | net stop AVP /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | C:\WINDOWS\system32\net1 stop ΓÇ£Sophos Safestore ServiceΓÇ¥ /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 644 | net stop IISAdmin /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 660 | C:\WINDOWS\system32\net1 stop SQLWriter /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 672 | net stop AcrSch2Svc /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 672 | net stop MSSQL$SBSMONITORING /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 672 | net stop BackupExecJobEngine /y | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.7z | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (7316) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7316 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb7316.27364\UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | executable | |
MD5:D63DE35D8CF9B12C28D3D5509DD16AAE | SHA256:B9A33E0225555E2D41582F81A7FA73FE431817F6E169D55540B250907DEC7AAF | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\Users\admin\AppData\Local\Temp\AfterImageApply_BDB0C1E8-6951-46C4-AB7F-C07B29F462FD.cmd | binary | |
MD5:751BEB038E95CA86210EE0CC3FC5F97D | SHA256:BE4D204B18D33F99DDD4F6BB15D39AFDD4B386D2C2E4F8DA06C91D9C1D217B97 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\$WinREAgent\RollbackInfo.ini | binary | |
MD5:66FC2B68E3E7D0438B1C245C6B342773 | SHA256:EC2B68E5CF21CFF168D23E141A3FAF453AC8A52EF09AAFE66E228E08ABCB2F0E | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\Users\admin\AppData\Local\Temp\Rollback.xml | binary | |
MD5:5474AE3426FD4E2F203F68FE6D75A15D | SHA256:80B2DD0D54EAF545C17B41601DD68C933BBE8DE7785759F8238628628C6B1960 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\Users\admin\AppData\Local\Temp\location.txt | binary | |
MD5:8C79056E61B66105514DA12DE437C170 | SHA256:5519A33A39906A15F5B633C115432233B9233FDB7038778A91A2AF0F36B867D5 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\Users\admin\AppData\Local\Temp\ReAgent.xml | binary | |
MD5:A94C68661BB1FA1E794F50C7692EB2A1 | SHA256:699A9038D0C91AEBFCC0FBFA776EB284E4208D2FA9BF52259E7FDAA779D06696 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\Users\admin\AppData\Local\Temp\ResetConfig.xml | binary | |
MD5:CF2E44497C7C4857A4DA837E9FC0B761 | SHA256:B4F511FEFF810AAF97CE6F5E0F33C4CED29143809E71E59F6C7B954AC271E459 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\$WinREAgent\Backup\ReAgent.xml | binary | |
MD5:A94C68661BB1FA1E794F50C7692EB2A1 | SHA256:699A9038D0C91AEBFCC0FBFA776EB284E4208D2FA9BF52259E7FDAA779D06696 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\$WinREAgent\Rollback.xml | binary | |
MD5:5474AE3426FD4E2F203F68FE6D75A15D | SHA256:80B2DD0D54EAF545C17B41601DD68C933BBE8DE7785759F8238628628C6B1960 | |||
| 7996 | UDS-Trojan-Ransom.Win32.Generic-b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf.exe | C:\Users\admin\AppData\Local\Temp\ReAgentOld.xml | binary | |
MD5:6364175FB3B365CF4FBBF0A2060A5232 | SHA256:A9EFFD29A735B18F304872AA9A726B72F5BD6B615AA2127C16F78FE0503F570F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.26:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7772 | SIHClient.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7772 | SIHClient.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.26:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 20.190.159.128:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2112 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7772 | SIHClient.exe | 20.12.23.50:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
config.edge.skype.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |