Edit tour

Windows Analysis Report
89.exe

Overview

General Information

Sample name:89.exe
(renamed file extension from none to exe)
Original sample name:89
Analysis ID:1663699
MD5:4cfa467224eecfe2890caebe8b923639
SHA1:dec7ace60a0a3169618f415d0fa8f66eeb60d7c1
SHA256:89b520833df09cba0960171efd064ded7306bd8b9b83ca1d9291c9486c9800c5
Infos:

Detection

BlackSuit
Score:68
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected BlackSuit Ransomware
Deletes shadow drive data (may be related to ransomware)
Program does not show much activity (idle)
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • 89.exe (PID: 7332 cmdline: "C:\Users\user\Desktop\89.exe" MD5: 4CFA467224EECFE2890CAEBE8B923639)
    • cmd.exe (PID: 7356 cmdline: cmd.exe /c vssadmin delete shadows /all /quiet MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: 89.exe PID: 7332JoeSecurity_BlackSuitYara detected BlackSuit RansomwareJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 89.exeAvira: detected
    Source: 89.exeReversingLabs: Detection: 87%
    Source: 89.exeVirustotal: Detection: 76%Perma Link
    Source: 89.exe, 00000000.00000000.1179212080.0000000000FBE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN RSA PUBLIC KEY-----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-----END RSA PUBLIC KEY-----memstr_756a87f5-f
    Source: 89.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 89.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: Yara matchFile source: Process Memory Space: 89.exe PID: 7332, type: MEMORYSTR
    Source: 89.exe, 00000000.00000002.1180162578.00000000025AD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: cmd.exe /c vssadmin delete shadows /all /quietD
    Source: 89.exe, 00000000.00000002.1180162578.00000000025AD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: cmd.exe /c vssadmin delete shadows /all /quiet`
    Source: 89.exe, 00000000.00000002.1179833814.00000000006F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quietC:\Windows\SYSTEM32\cmd.exeWinsta0\Default=::=::\ALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataFPS_BROWSER_APP_PROFILE_STRING=Internet ExplorerFPS_BROWSER_USER_PROFILE_STRING=DefaultHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 143 Stepping 8, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=8f08ProgramData=C:\ProgramDataProgramFiles=C:\Program FilesProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows
    Source: 89.exe, 00000000.00000002.1179915804.00000000007EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\SYSTEM32\cmd.execmd.exe /c vssadmin delete shadows /all /quietC:\Windows\SYSTEM32\cmd.exeWinsta0\Default=::=::\ALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeDriverData=C:\Windows\System32\Drivers\DriverDataFPS_BROWSER_APP_PROFILE_STRING=Internet ExplorerFPS_BROWSER_USER_PROFILE_STRING=DefaultHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=x86PROCESSOR_ARCHITEW6432=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 143 Stepping 8, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=8f08ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows
    Source: 89.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.rans.winEXE@3/0@0/0
    Source: 89.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\89.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 89.exeReversingLabs: Detection: 87%
    Source: 89.exeVirustotal: Detection: 76%
    Source: unknownProcess created: C:\Users\user\Desktop\89.exe "C:\Users\user\Desktop\89.exe"
    Source: C:\Users\user\Desktop\89.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c vssadmin delete shadows /all /quiet
    Source: C:\Users\user\Desktop\89.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c vssadmin delete shadows /all /quietJump to behavior
    Source: C:\Users\user\Desktop\89.exeSection loaded: apphelp.dllJump to behavior
    Source: 89.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    1
    Process Injection
    OS Credential Dumping1
    System Information Discovery
    Remote Services1
    Archive Collected Data
    Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    DLL Side-Loading
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    File Deletion
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1663699 Sample: 89 Startdate: 12/04/2025 Architecture: WINDOWS Score: 68 11 Antivirus / Scanner detection for submitted sample 2->11 13 Multi AV Scanner detection for submitted file 2->13 15 Yara detected BlackSuit Ransomware 2->15 6 89.exe 2->6         started        process3 signatures4 17 Deletes shadow drive data (may be related to ransomware) 6->17 9 cmd.exe 6->9         started        process5

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    89.exe88%ReversingLabsWin32.Ransomware.BlackSuit
    89.exe76%VirustotalBrowse
    89.exe100%AviraTR/Dropper.Gen
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1663699
    Start date and time:2025-04-12 07:54:43 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 38s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:11
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:89.exe
    (renamed file extension from none to exe)
    Original Sample Name:89
    Detection:MAL
    Classification:mal68.rans.winEXE@3/0@0/0
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 184.28.213.193, 204.79.197.222, 4.245.163.56
    • Excluded domains from analysis (whitelisted): fp.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.187813526144552
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:89.exe
    File size:68'608 bytes
    MD5:4cfa467224eecfe2890caebe8b923639
    SHA1:dec7ace60a0a3169618f415d0fa8f66eeb60d7c1
    SHA256:89b520833df09cba0960171efd064ded7306bd8b9b83ca1d9291c9486c9800c5
    SHA512:6229eadf51bebe5f0cc8075069df99e4933605da6cc5fe614707a540dd8239e0becb1b417799052d793c7baacf50fa2b1495ca2c5588bc630c78c6a790e118c8
    SSDEEP:768:b7ht8FTVOEX0kBzoHq9secAZzim3dl7J74vPo+n3rx02uHosqAA/RHIFUnAqNw3r:bcLXMq+edzDJ2oy0b1O6UAqNSQAeN
    TLSH:DE637C01E9AEC8F4F2654EB5B54E472141F3AC2203AD1EF363949B1396B39D0F93A59C
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................;.................................!.............Rich....................PE..L....e;g...............$...........
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x406730
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x673B65C8 [Mon Nov 18 16:05:28 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:ecc488e51fbb2e01a7aac2b35d5f10bd
    Instruction
    call 00007F1A70EFD770h
    retn 0010h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    push 00000000h
    push dword ptr [esp+08h]
    call 00007F1A70F024FAh
    add esp, 08h
    ret
    int3
    push esi
    mov esi, dword ptr [esp+08h]
    push dword ptr [esi]
    call 00007F1A70F024E9h
    push 00000000h
    push esi
    call 00007F1A70F024E1h
    add esp, 0Ch
    pop esi
    ret
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    sub esp, 1Ch
    push ebx
    push ebp
    mov ebp, dword ptr [00455C94h]
    push esi
    push edi
    test ebp, ebp
    jne 00007F1A70EFDAC8h
    mov edx, 00406740h
    call 00007F1A70EFD59Ah
    mov ebp, eax
    mov dword ptr [00455C94h], ebp
    test ebp, ebp
    je 00007F1A70EFDAD1h
    cmp dword ptr [ebp+04h], 00000000h
    je 00007F1A70EFDACBh
    mov ecx, ebp
    call 00007F1A70EFD641h
    mov edx, 00406740h
    call 00007F1A70EFD577h
    mov ebp, eax
    mov dword ptr [00455C94h], ebp
    push 00000118h
    mov dword ptr [esp+20h], 00000118h
    call 00007F1A70F0245Dh
    mov esi, eax
    add esp, 04h
    mov dword ptr [esp+20h], esi
    test esi, esi
    je 00007F1A70EFDB2Fh
    mov edx, 00000047h
    push 00002C96h
    push 58A16547h
    lea ecx, dword ptr [edx-41h]
    call 00007F1A70EF9AC9h
    add esp, 08h
    lea ecx, dword ptr [esp+1Ch]
    push 00000000h
    push ecx
    push esi
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1169c0x64.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x1e8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000x2c8.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0xea2c0x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xe0000x70.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xc54a0xc60093db1e17da8a81f0d57f1fe3b576de44False0.5111268939393939data6.265270099926119IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0xe0000x38fc0x3a0091d75af66bcdd09f3393ef8f7b71611dFalse0.49191810344827586data5.518321138477226IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x120000x43ef00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .CRT0x560000x180x200fb17f86eeadcc21b5a95b49cd91cac97False0.060546875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "@"0.2797047950073886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x570000x1e80x200ac3199c3f5c2959d8efbd1d6f1cbe96fFalse0.529296875data4.728472067285766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x580000x2c80x400c405af49870e4d6f291a481fa821e289False0.6396484375data4.87803345640166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x570600x181XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5922077922077922
    DLLImport
    KERNEL32.dllMultiByteToWideChar, EnterCriticalSection, lstrlenW, WaitForMultipleObjects, LeaveCriticalSection, InitializeCriticalSection, FindClose, GetLastError, TerminateThread, WideCharToMultiByte, ExitProcess, lstrcatW, lstrcpyW, LocalFree, HeapFree, SetLastError, HeapAlloc, GetProcessHeap
    USER32.dllCharLowerW
    SHLWAPI.dllStrCmpNIW, StrCpyNW
    WS2_32.dllhtons, WSAGetLastError
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found
    050100s020406080100

    Click to jump to process

    050100sMB

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:01:55:41
    Start date:12/04/2025
    Path:C:\Users\user\Desktop\89.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\89.exe"
    Imagebase:0xfb0000
    File size:68'608 bytes
    MD5 hash:4CFA467224EECFE2890CAEBE8B923639
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:01:55:41
    Start date:12/04/2025
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /c vssadmin delete shadows /all /quiet
    Imagebase:0xc70000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly