File name:

f_000011

Full analysis: https://app.any.run/tasks/6c53bebe-ca58-4aca-9685-0c99906be7fc
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 19, 2024, 10:09:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows, UPX compressed
MD5:

5A131B48F147586AFA20B0A1A00A1533

SHA1:

35D0125D8CA6457FF4604D5E245B2102A9EC4A6E

SHA256:

F5D893AFC4AD2E98606B597DF186657B57F3D1E3A5ABE51F800DE6086AAB84E9

SSDEEP:

6144:KzLr0iArBI4BdswFu+eW/9QF6nJ9/SAtKOqKojDEjm7Bx3A4vhvGGnCA9CJYNc4T:kXAik2yuRe9BXrTyDnBxLZmA9C1e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • f_000011.exe (PID: 6892)
    • Renames files like ransomware

      • f_000011.exe (PID: 6892)
  • SUSPICIOUS

    • Write to the desktop.ini file (may be used to cloak folders)

      • f_000011.exe (PID: 6892)
    • Creates file in the systems drive root

      • f_000011.exe (PID: 6892)
  • INFO

    • Reads the machine GUID from the registry

      • f_000011.exe (PID: 6892)
    • Checks supported languages

      • f_000011.exe (PID: 6892)
    • Reads the computer name

      • f_000011.exe (PID: 6892)
    • UPX packer has been detected

      • f_000011.exe (PID: 6892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (76)
.exe | Win32 Executable (generic) (12.6)
.exe | Generic Win/DOS Executable (5.6)
.exe | DOS Executable Generic (5.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:10:04 23:36:48+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 409600
InitializedDataSize: 4096
UninitializedDataSize: 602112
EntryPoint: 0xf6f80
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT f_000011.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6364C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6892"C:\Users\admin\AppData\Local\Temp\f_000011.exe" C:\Users\admin\AppData\Local\Temp\f_000011.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\f_000011.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7588\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exef_000011.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
590
Read events
590
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
158
Text files
10
Unknown types
1

Dropped files

PID
Process
Filename
Type
6892f_000011.exeC:\bootTel.datbinary
MD5:5C95D04D8A6FEF2C823E9538BD0A1B38
SHA256:FDD46368879C37E8002FE3CD17BF800A066B3D5A870DCE8B8D69D19C4513D485
6892f_000011.exeC:\Users\admin\Desktop\desktop.inibinary
MD5:8FCB8063659CFDC017F8AD58462FDDAE
SHA256:8DF11D6C713B97BF26C097CED8D5E27CD2F5ACC948C9C4BE22F111BC76AB59AC
6892f_000011.exeC:\Users\admin\Contacts\desktop.ini.altdelete@cock.li.districtbinary
MD5:99095AC33133ADE60898037A442EF8C4
SHA256:BA952515CB93F3EB7942C3DA99CBA6B2F88F9757719320ECCB874C78E8BACAC1
6892f_000011.exeC:\Users\admin\Desktop\desktop.ini.altdelete@cock.li.districtbinary
MD5:8FCB8063659CFDC017F8AD58462FDDAE
SHA256:8DF11D6C713B97BF26C097CED8D5E27CD2F5ACC948C9C4BE22F111BC76AB59AC
6892f_000011.exeC:\Users\admin\Desktop\READ_IT.districtbinary
MD5:1341A2E766B0D226874C48E7BC1D079A
SHA256:4048F98595D096AAA286846ACF6D31A23E68C1FEBF091D1E7EDDFB2A1374ADD6
6892f_000011.exeC:\Users\admin\Desktop\calendardie.jpg.altdelete@cock.li.districtbinary
MD5:A6EDFC9E4D765A5F097168BE767D1B12
SHA256:2164CFC6028F44DFACA4B2848B717F6D8227F6D794C66B01C58CCFADE0351BA5
6892f_000011.exeC:\Users\admin\Desktop\calendardie.jpgbinary
MD5:A6EDFC9E4D765A5F097168BE767D1B12
SHA256:2164CFC6028F44DFACA4B2848B717F6D8227F6D794C66B01C58CCFADE0351BA5
6892f_000011.exeC:\Users\admin\Desktop\historicalvillage.jpgbinary
MD5:4DC0804F7AE3A3E88E7F6EBB84642FA7
SHA256:B12ECD3D61DA941559761CB033A30A59B11B771BF96BA1BDDD263C68D2B0ED2D
6892f_000011.exeC:\Users\admin\Desktop\historicalvillage.jpg.altdelete@cock.li.districtbinary
MD5:4DC0804F7AE3A3E88E7F6EBB84642FA7
SHA256:B12ECD3D61DA941559761CB033A30A59B11B771BF96BA1BDDD263C68D2B0ED2D
6892f_000011.exeC:\Users\admin\Desktop\increasebritish.png.altdelete@cock.li.districtbinary
MD5:FC7A633EB8EF8D2CAAF7EA4C6972C678
SHA256:0BE7E40C1418FEB3ACFB35308E1EB974F7F4F6843D4214825B93B10213D5F11C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
19
DNS requests
11
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4032
svchost.exe
239.255.255.250:1900
whitelisted
5968
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4716
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
7856
svchost.exe
4.209.32.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2760
svchost.exe
40.115.3.253:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5968
backgroundTaskHost.exe
20.103.156.88:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
2720
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4716
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
arc.msn.com
  • 20.223.36.55
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.2
  • 20.190.159.23
  • 20.190.159.71
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.73
  • 40.126.31.67
whitelisted
google.com
  • 142.250.184.206
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
www.bing.com
  • 23.36.162.84
  • 23.36.162.68
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted

Threats

No threats detected
No debug info