e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee
e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe
92KB
10-11-2020 15:31
9061d0acb0f5df1844e1c8ba5e2e9078
d608f3c2962dc3d2d5e14e9e9a4f2405452255c7
e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee
Extracted
Path | C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\5DEA0-Readme.txt |
Family | netwalker |
Ransom Note |
Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}
|
Emails |
sevenoneone@cock.li kavariusing@tutanota.com |
Extracted
Path | C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\5DEA0-Readme.txt |
Family | netwalker |
Ransom Note |
Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}
|
Emails |
sevenoneone@cock.li kavariusing@tutanota.com |
Extracted
Path | C:\Program Files\Java\jdk1.7.0_80\jre\lib\5DEA0-Readme.txt |
Family | netwalker |
Ransom Note |
Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}
|
Emails |
sevenoneone@cock.li kavariusing@tutanota.com |
Extracted
Path | C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\5DEA0-Readme.txt |
Family | netwalker |
Ransom Note |
Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}Hi!
Your files are encrypted.
All encrypted files for this computer has extension: .5dea0
--
If for some reason you read this text before the encryption ended,
this can be understood by the fact that the computer slows down,
and your heart rate has increased due to the ability to turn it off,
then we recommend that you move away from the computer and accept that you have been compromised,
rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you,
it could be files on the network belonging to other users, sure you want to take that responsibility?
--
Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help.
The only way to get your files back is to cooperate with us and get the decrypter program.
Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover.
We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned.
For us this is just business and to prove to you our seriousness, we will decrypt you some files for free,
but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision.
Сontact us:
1.sevenoneone@cock.li
2.kavariusing@tutanota.com
Don't forget to include your code in the email:
{code_930589e1_5dea0:
4KseAJeE0L66Q9tB5lB5P8LZVzFWyWL2oLyr4nI33JMDXh0GLe
hAqThBPU89M4Ae6Jjbj+SZNAYBZDRhj5nYBn3TRKxXdjMc4YkF
kxztQ6nhz16wk4k4XLShaATOniXI5vBOHFrPOqiyBSbmkF7o3o
a4uwlhHIpOZrkoTgLDz3G/Am5u4l/Lp9IIuAWODKSLkdKfKdbq
S478MXsDHScVLkTru7vwVDizv7IHJChu/ozTiHQwCHmPcPmto2
Dve3VS7/nH2r5oT7GjeadmYY7TzI86sOo=}
|
Emails |
sevenoneone@cock.li kavariusing@tutanota.com |
Filter: none
-
Detected Netwalker Ransomware
Description
Detected unpacked Netwalker executable.
Reported IOCs
resource yara_rule behavioral1/memory/1628-1-0x0000000000180000-0x000000000019B000-memory.dmp netwalker_ransomware behavioral1/memory/2020-4-0x0000000000450000-0x000000000046B000-memory.dmp netwalker_ransomware -
Netwalker Ransomware
Description
Ransomware family with multiple versions. Also known as MailTo.
Tags
-
Deletes shadow copies
Description
Ransomware often targets backup files to inhibit system recovery.
Tags
TTPs
-
Modifies extensions of user filesexplorer.exe
Description
Ransomware generally changes the extension on encrypted files.
Tags
Reported IOCs
description ioc process File opened for modification C:\Users\Admin\Pictures\MoveFind.tiff explorer.exe File opened for modification C:\Users\Admin\Pictures\WatchUninstall.tiff explorer.exe -
Deletes itselfexplorer.exe
Reported IOCs
pid process 2020 explorer.exe -
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Adds Run key to start applicationexplorer.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5dea063f = "C:\\Program Files (x86)\\5dea063f\\5dea063f.exe" explorer.exe -
Modifies servicevssvc.exe
Tags
TTPs
Reported IOCs
description ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe -
Suspicious use of SetThreadContexte01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exeexplorer.exe
Reported IOCs
description pid process target process PID 1628 set thread context of 2020 1628 e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe explorer.exe PID 2020 set thread context of 1244 2020 explorer.exe explorer.exe -
Drops file in Program Files directoryexplorer.exe
Reported IOCs
description ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Executive.eftx explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Melbourne explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_COL.HXT explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\TAB_OFF.GIF explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\security\local_policy.jar explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher_1.3.0.v20140415-2008.jar explorer.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\5DEA0-Readme.txt explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Johannesburg explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_ja_4.4.0.v20140623020002.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SUMER_01.MID explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STORYVERTBB.DPV explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\SignedComponents.cer explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZCARD.XML explorer.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\5DEA0-Readme.txt explorer.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\5DEA0-Readme.txt explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GREET11.POC explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Couture.thmx explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\Microsoft.Office.InfoPath.xml explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18203_.WMF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Trek.xml explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195260.WMF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_GreenTea.gif explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert.ja_5.5.0.165303.jar explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Belize explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Pitcairn explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\PublicFunctions.js explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tahiti explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveDrop32x32.gif explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dhaka explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Qyzylorda explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00118_.WMF explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\security\javafx.policy explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\AST4 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02746U.BMP explorer.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\5DEA0-Readme.txt explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-attach.xml explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Newsprint.dotx explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0230558.WMF explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyrun.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02214_.GIF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\TaskbarIconImages256Colors.bmp explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15301_.GIF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21340_.GIF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WITHCOMP.DPV explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector_1.0.200.v20131115-1210.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Modern.dotx explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.zh_CN_5.5.0.165303.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveReport.dotx explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-progress-ui_ja.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CG1606.WMF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14579_.GIF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Technic.xml explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0300520.GIF explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Yakutsk explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONENOTE_K_COL.HXK explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Ulaanbaatar explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierWindowMaskRTL.bmp explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vienna explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLNOTER.FAE explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBHD.DPV explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-openide-execution.xml_hidden explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR25F.GIF explorer.exe -
Interacts with shadow copiesvssadmin.exevssadmin.exe
Description
Shadow copies are often targeted by ransomware to inhibit system recovery.
Tags
TTPs
Reported IOCs
pid process 1220 vssadmin.exe 1988 vssadmin.exe -
Suspicious behavior: EnumeratesProcessesexplorer.exeexplorer.exe
Reported IOCs
pid process 2020 explorer.exe 2020 explorer.exe 2020 explorer.exe 2020 explorer.exe 2020 explorer.exe 2020 explorer.exe 2020 explorer.exe 2020 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe -
Suspicious behavior: MapViewOfSectione01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exeexplorer.exe
Reported IOCs
pid process 1628 e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe 2020 explorer.exe -
Suspicious use of AdjustPrivilegeTokenexplorer.exeexplorer.exevssvc.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 2020 explorer.exe Token: SeDebugPrivilege 1244 explorer.exe Token: SeBackupPrivilege 928 vssvc.exe Token: SeRestorePrivilege 928 vssvc.exe Token: SeAuditPrivilege 928 vssvc.exe -
Suspicious use of WriteProcessMemorye01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exeexplorer.exeexplorer.exe
Reported IOCs
description pid process target process PID 1628 wrote to memory of 2020 1628 e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe explorer.exe PID 1628 wrote to memory of 2020 1628 e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe explorer.exe PID 1628 wrote to memory of 2020 1628 e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe explorer.exe PID 1628 wrote to memory of 2020 1628 e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe explorer.exe PID 2020 wrote to memory of 1220 2020 explorer.exe vssadmin.exe PID 2020 wrote to memory of 1220 2020 explorer.exe vssadmin.exe PID 2020 wrote to memory of 1220 2020 explorer.exe vssadmin.exe PID 2020 wrote to memory of 1220 2020 explorer.exe vssadmin.exe PID 2020 wrote to memory of 1244 2020 explorer.exe explorer.exe PID 2020 wrote to memory of 1244 2020 explorer.exe explorer.exe PID 2020 wrote to memory of 1244 2020 explorer.exe explorer.exe PID 2020 wrote to memory of 1244 2020 explorer.exe explorer.exe PID 1244 wrote to memory of 1988 1244 explorer.exe vssadmin.exe PID 1244 wrote to memory of 1988 1244 explorer.exe vssadmin.exe PID 1244 wrote to memory of 1988 1244 explorer.exe vssadmin.exe PID 1244 wrote to memory of 1988 1244 explorer.exe vssadmin.exe
-
C:\Users\Admin\AppData\Local\Temp\e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe"C:\Users\Admin\AppData\Local\Temp\e01691e3b7d9d1c6de7e0ef902bf609543cdf084e600fd0a3833deaa501464ee.exe"Suspicious use of SetThreadContextSuspicious behavior: MapViewOfSectionSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"Modifies extensions of user filesDeletes itselfAdds Run key to start applicationSuspicious use of SetThreadContextDrops file in Program Files directorySuspicious behavior: EnumeratesProcessesSuspicious behavior: MapViewOfSectionSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quietInteracts with shadow copies
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quietInteracts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeModifies serviceSuspicious use of AdjustPrivilegeToken
-
memory/1220-2-0x0000000000000000-mapping.dmp
-
memory/1244-3-0x0000000000000000-mapping.dmp
-
memory/1628-1-0x0000000000180000-0x000000000019B000-memory.dmp
-
memory/1988-5-0x0000000000000000-mapping.dmp
-
memory/2020-0-0x0000000000000000-mapping.dmp
-
memory/2020-4-0x0000000000450000-0x000000000046B000-memory.dmp