Analysis
-
max time kernel
89s -
max time network
131s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24/11/2020, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
Cyborg Builder Ransomware V 1.0.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Cyborg Builder Ransomware V 1.0.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
Cyborg Builder Ransomware V 1.0.exe
-
Size
2.5MB
-
MD5
5ad1631fe97a0345cbccf8802468fa7a
-
SHA1
8599c32e71d39bbd89b7fcae419fdf4619a6d2f3
-
SHA256
7f5efdf9e9273ed21f90bb095a34140e70d6f38d074c3f0aebfa2e919d4a82cc
-
SHA512
2acd63d433d33d5a98710da732cddc873655f97848fa4f9672632f956f14e594da96a0e63af39fcf948cc078eb44ea26e424af6eabb771c4acdb97e4f7150814
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\Desktop\Cyborg_DECRYPT.txt
Ransom Note
------------------------ ALL YOUR FILES ARE ENCRYPTED BY CYBORG RANSOMWARE ------------------------
Don't worry, you can return all your files!
All your files like documents, photos, databases and other important are encrypted
What guarantees do we give to you?
You can send one of your encrypted file and we decrypt it for free.
You must follow these steps To decrypt your files :
1) Send $500 bitcoin to wallet :bnar4p9anklap09ahg7aghak6gabai8a
2) write on our e-mail :cyborg-protonmail.com
Your personal ID :NP2M97NJ17L3AFR8KP0OQ2L9RJQKMRCMRN1CRC2LAN991RR0O3
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1576 Ransom.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\PushMount.crw => C:\Users\Admin\Pictures\PushMount.crw.Cyborg1 Ransom.exe File renamed C:\Users\Admin\Pictures\SetConvertFrom.raw => C:\Users\Admin\Pictures\SetConvertFrom.raw.Cyborg1 Ransom.exe File renamed C:\Users\Admin\Pictures\UninstallReceive.raw => C:\Users\Admin\Pictures\UninstallReceive.raw.Cyborg1 Ransom.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\Cyborg_DECRYPT.jpg" Ransom.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Cyborg Builder Ransomware V 1.0.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Cyborg Builder Ransomware V 1.0.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\WallpaperStyle = "2" Ransom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\TileWallpaper = "0" Ransom.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "893" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "899" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39D26F51-2E3E-11EB-BA33-6280D915632E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000032845eb225f708dfa8f5f4701bff9093bac65be220d348b5582269b186c8ca2e000000000e80000000020000200000005f03aed441bd34f8624b1da3d7493ffb4734fc5097ce7575a3fe60858af5ac8c200000003c07ac17336bf0640c5ebbcb07bc0a4606ee46bbf566a244d29db8d4b2354fc040000000c3b4d1f64d43092bf2857c7235b735c94b6221ccffa2ff08d22a7f3260db0e1929cbdc2c5cbc9de62b934f228e3353df63f45180fe835e12c29f038dc0c5d6a5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "893" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c327004bc2d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "899" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "893" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000002000000030000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "899" IEXPLORE.EXE -
Modifies registry class 177 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Cyborg Builder Ransomware V 1.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Preview OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bmp\ = "OISbmpfile" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Open\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Cyborg Builder Ransomware V 1.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Preview OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Open\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.gif OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\ = "Bitmap Image" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Preview\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Preview\command OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\ = "JPEG Image" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\ = "PNG Image" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Edit OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tiff\ = "OIStiffile" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Preview OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Cyborg Builder Ransomware V 1.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\DefaultIcon OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tif OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Open\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jpg\ = "OISjpegfile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",1" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Open OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Edit\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\ = "EMF Image" OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Edit OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\ = "GIF Image" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\DefaultIcon OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\ = "TIF Image" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jpe OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jfif OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Open\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell OIS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jpeg\ = "OISjpegfile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gif\ = "OISgiffile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616257" Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Cyborg Builder Ransomware V 1.0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Open OIS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\DefaultIcon OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bmp OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Edit\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Preview OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jpeg OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Open OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Edit OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tiff OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.emf\ = "OISemffile" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell OIS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Preview OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "2" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\DefaultIcon OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Edit OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Open OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Preview\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.png OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.emf OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Edit OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dib OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dib\ = "OISbmpfile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\ = "WMF Image" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Open\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Preview\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Edit\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",4" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmf OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Preview\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Edit OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\DefaultIcon OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Cyborg Builder Ransomware V 1.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Edit\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",3" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Preview OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Open OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Preview\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellPreview \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Preview\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Edit\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellEdit \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Edit\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Open OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\DefaultIcon OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",2" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Open\command OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISpngfile\shell\Edit OIS.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jpe\ = "OISjpegfile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tif\ = "OIStiffile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",7" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Open\command OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" Cyborg Builder Ransomware V 1.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Preview\MuiVerb = "@shimgvw.dll,-550" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISjpegfile\shell OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Preview\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISemffile\shell\Edit\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\shell\Open\command\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\" /shellOpen \"%1\"" OIS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",6" OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg Cyborg Builder Ransomware V 1.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Preview OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISbmpfile\shell\Open OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jfif\ = "OISjpegfile" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISgiffile\shell OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.png\ = "OISpngfile" OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\DefaultIcon\ = "\"C:\\PROGRA~2\\MICROS~1\\Office14\\OIS.EXE\",5" OIS.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Cyborg Builder Ransomware V 1.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Cyborg Builder Ransomware V 1.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jpg OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Open OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OIStiffile\shell\Edit\command OIS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wmf\ = "OISwmffile" OIS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OISwmffile\DefaultIcon OIS.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Ransom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Ransom.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 744 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1344 OIS.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2036 Cyborg Builder Ransomware V 1.0.exe 1532 iexplore.exe 1532 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1344 OIS.EXE 1344 OIS.EXE 1344 OIS.EXE 1344 OIS.EXE 1344 OIS.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1532 1576 Ransom.exe 33 PID 1576 wrote to memory of 1532 1576 Ransom.exe 33 PID 1576 wrote to memory of 1532 1576 Ransom.exe 33 PID 1576 wrote to memory of 1532 1576 Ransom.exe 33 PID 1532 wrote to memory of 1928 1532 iexplore.exe 35 PID 1532 wrote to memory of 1928 1532 iexplore.exe 35 PID 1532 wrote to memory of 1928 1532 iexplore.exe 35 PID 1532 wrote to memory of 1928 1532 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cyborg Builder Ransomware V 1.0.exe"C:\Users\Admin\AppData\Local\Temp\Cyborg Builder Ransomware V 1.0.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2036
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:344
-
C:\Users\Admin\Desktop\Ransom.exe"C:\Users\Admin\Desktop\Ransom.exe"1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://2no.co/2f8nx52⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Cyborg_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:744
-
C:\PROGRA~2\MICROS~1\Office14\OIS.EXE"C:\PROGRA~2\MICROS~1\Office14\OIS.EXE" /shellOpen "C:\Users\Admin\Desktop\Cyborg_DECRYPT.jpg"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1344