URL: | https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/7ev3n.zip |
Full analysis: | https://app.any.run/tasks/8faaf4f9-52e7-4456-9aa5-f3fa9ba1b3dd |
Verdict: | Malicious activity |
Analysis date: | August 11, 2024, 16:44:26 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 09DABCD6A4480E01C5F419CC31E01389 |
SHA1: | C61E9ABD34525CC15EE7D42D569D4BF99EA3ECDA |
SHA256: | FB31AC008C536DE57C8BECAF2F8463EFFA0C029691DCE6B65819E9D07088FABA |
SSDEEP: | 3:N8tEdegLaKoEJ3PqkzEHcEie+m/lV:2ufLtfnz+cEizm/lV |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
804 | dw20.exe -x -s 828 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe | RtlDriver32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Error Reporting Shim Exit code: 0 Version: 2.0.50727.9149 (WinRelRS6.050727-9100) Modules
| |||||||||||||||
840 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1168 | "C:\WINDOWS\system32\ipconfig.exe" /flushdns | C:\Windows\SysWOW64\ipconfig.exe | — | Windowsu.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: IP Configuration Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1184 | "C:\WINDOWS\system32\cmd.exe" /c del C:\Users\admin\AppData\Local\Temp\EN.EXE > nul | C:\Windows\SysWOW64\cmd.exe | — | EN.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
2636 | "C:\Users\admin\AppData\Local\Temp\AV.EXE" | C:\Users\admin\AppData\Local\Temp\AV.EXE | [email protected] | ||||||||||||
User: admin Company: Realtek Inc Integrity Level: HIGH Description: Realtek Audio Driver Exit code: 0 Version: 2.0.5.0 Modules
| |||||||||||||||
3268 | "C:\Users\admin\AppData\Local\Temp\DB.EXE" | C:\Users\admin\AppData\Local\Temp\DB.EXE | [email protected] | ||||||||||||
User: admin Company: Prjfeusek Vdceboszrya Integrity Level: HIGH Description: Internet Connection Wizard Exit code: 0 Version: 6.00.3790.3959 (srv03_sp2_rtm.070216-1710) Modules
| |||||||||||||||
3272 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6908 -s 520 | C:\Windows\SysWOW64\WerFault.exe | AV2.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
3560 | "C:\Program Files\RUXIM\PLUGscheduler.exe" | C:\Program Files\RUXIM\PLUGScheduler.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Update LifeCycle Component Scheduler Exit code: 0 Version: 10.0.19041.3623 (WinBuild.160101.0800) Modules
| |||||||||||||||
3972 | "C:\Users\admin\AppData\Roaming\RtlDriver32.exe" | C:\Users\admin\AppData\Roaming\RtlDriver32.exe | AV.EXE | ||||||||||||
User: admin Company: Realtek Inc Integrity Level: HIGH Description: Realtek Audio Driver Exit code: 0 Version: 2.0.5.0 Modules
| |||||||||||||||
4076 | "C:\Users\admin\AppData\Roaming\RtlDriver32.exe" | C:\Users\admin\AppData\Roaming\RtlDriver32.exe | explorer.exe | ||||||||||||
User: admin Company: Realtek Inc Integrity Level: MEDIUM Description: Realtek Audio Driver Exit code: 3762507597 Version: 2.0.5.0 Modules
|
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
Operation: | write | Name: | failed_count |
Value: 0 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 2 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty |
Operation: | write | Name: | StatusCodes |
Value: | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty |
Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 1 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
Operation: | write | Name: | dr |
Value: 1 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics |
Operation: | write | Name: | user_experience_metrics.stability.exited_cleanly |
Value: 0 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Chrome |
Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
Operation: | write | Name: | usagestats |
Value: 0 | |||
(PID) Process: | (6460) chrome.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
Operation: | write | Name: | metricsid |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RFe5c06.TMP | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RFe5c16.TMP | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\5825e0f5-2f55-400e-878f-a600326e2be2.tmp | binary | |
MD5:5058F1AF8388633F609CADB75A75DC9D | SHA256:— | |||
6460 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Variations | binary | |
MD5:961E3604F228B0D10541EBF921500C86 | SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5336 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
3276 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6284 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6236 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
7208 | DB.EXE | GET | 404 | 66.96.162.135:80 | http://middlechrist.com/html/license_43EC922A3D0E1F403834ED436BA90C5A686E606FE2C68C471F4CE42C93524A733C47010287CE9159E8D69FE5469D45CA6C2FF9970E4D13204AFCEB8A1C5A9D2924CF3F64589D6F4B3AEC76D3E9738A14F1ADD835BCB38CA101474E71EF1FEBE0D05B64D42BC1DF893E55EC01B14ED11EFA7D0FE3579860B4CE1454B4FD71AD155CE82075E84258727574468CA7B8E4750D0588C28010352C78091FE5FA59B3FCA76E237593366C3FDCE3427F6F805148EB96D9AA98435DD76B4AD29E9BA3051370DA8987DF04ACEB11E09B0ADE1883B3A5A839883C57BC594BA4757D547CFC1704914694CBE42A9D6DB43CCD406389BA07A85C686F3DE5951982B4FF8180099622488A032274C0E5C4E84EDFF2980FB836A6BBE6A566D9F2A64CC15BCFEF6BD599C003C3C0901749C3B5EC7E18CCEF85E04AD5B01EFE1391DA97947F699819576498A45B485C7DA67D259980984C6245CCAEE3379A81A9917916EF6A3D8E44D044C4A57BC9D1222F1AC88AC78A4B0380001058730E154BB8.html | unknown | — | — | malicious |
7208 | DB.EXE | GET | 404 | 66.96.162.135:80 | http://middlechrist.com/html/license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html | unknown | — | — | malicious |
7884 | svchost.exe | HEAD | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/kfpt3ft3qn5zdit2cqelm5iuke_20240801.659754589.14/obedbbhbpmojnkanicioggnmelmoomoc_20240801.659754589.14_all_ENUS500000_ad7q7ox2phy7bmfr67n2bc3oh2bq.crx3 | unknown | — | — | whitelisted |
7600 | KBDINMARO.exe | GET | 200 | 172.67.139.136:80 | http://imagehut4.cn/update/utu.dat | unknown | — | — | malicious |
7884 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/kfpt3ft3qn5zdit2cqelm5iuke_20240801.659754589.14/obedbbhbpmojnkanicioggnmelmoomoc_20240801.659754589.14_all_ENUS500000_ad7q7ox2phy7bmfr67n2bc3oh2bq.crx3 | unknown | — | — | whitelisted |
7884 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/kfpt3ft3qn5zdit2cqelm5iuke_20240801.659754589.14/obedbbhbpmojnkanicioggnmelmoomoc_20240801.659754589.14_all_ENUS500000_ad7q7ox2phy7bmfr67n2bc3oh2bq.crx3 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3068 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2424 | RUXIMICS.exe | 52.185.211.133:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
2120 | MoUsoCoreWorker.exe | 52.185.211.133:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
6460 | chrome.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
6732 | chrome.exe | 140.82.121.4:443 | github.com | GITHUB | US | unknown |
6732 | chrome.exe | 66.102.1.84:443 | accounts.google.com | GOOGLE | US | unknown |
6732 | chrome.exe | 185.199.111.154:443 | github.githubassets.com | FASTLY | US | unknown |
6732 | chrome.exe | 185.199.108.133:443 | avatars.githubusercontent.com | FASTLY | US | unknown |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
github.com |
| shared |
accounts.google.com |
| whitelisted |
github.githubassets.com |
| whitelisted |
avatars.githubusercontent.com |
| whitelisted |
github-cloud.s3.amazonaws.com |
| shared |
user-images.githubusercontent.com |
| whitelisted |
content-autofill.googleapis.com |
| whitelisted |
collector.github.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
— | — | Malware Command and Control Activity Detected | ET MALWARE Ponmocup C2 Post-infection Checkin |
— | — | A Network Trojan was detected | ET MALWARE Spoofed MSIE 8 User-Agent Likely Ponmocup |
— | — | Malware Command and Control Activity Detected | ET MALWARE Request for utu.dat Likely Ponmocup checkin |
— | — | A Network Trojan was detected | ET MALWARE Spoofed MSIE 8 User-Agent Likely Ponmocup |
— | — | Malware Command and Control Activity Detected | ET MALWARE Ponmocup C2 Post-infection Checkin |
— | — | Malware Command and Control Activity Detected | ET MALWARE Ponmocup C2 Post-infection Checkin |
— | — | A Network Trojan was detected | ET MALWARE Spoofed MSIE 8 User-Agent Likely Ponmocup |
— | — | Malware Command and Control Activity Detected | ET MALWARE Ponmocup C2 Post-infection Checkin |
Process | Message |
---|---|
C:\Users\admin\AppData\Local\Temp\AV.EXE | |
C:\Users\admin\AppData\Local\Temp\AV2.EXE | |
C:\Users\admin\AppData\Local\Temp\DB.EXE | |
C:\Users\admin\AppData\Local\Temp\EN.EXE | |
C:\Users\admin\AppData\Local\Temp\GB.EXE | |
C:\Users\admin\AppData\Local\Temp\SB.EXE | |
C:\Users\admin\AppData\Local\Temp\AV.EXE | |
C:\Users\admin\AppData\Local\Temp\AV2.EXE | |
C:\Users\admin\AppData\Local\Temp\DB.EXE | |
C:\Users\admin\AppData\Local\Temp\EN.EXE | |