Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30/01/2021, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe
Resource
win10v20201028
General
-
Target
772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe
-
Size
31.3MB
-
MD5
fa9649ba7f76190701b2f1ffaaf4d0df
-
SHA1
dac66a285e89ee98cb84488df21f8c43c4acb5d3
-
SHA256
772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae
-
SHA512
9868a1cc7e9bf361c1d93bad871b88fae0f3c3fa1f15dce1d386f1e78fbda913d30ffd3d407706a34043357727e7db560924ffbd7e1ec4bc5dada7c9e74f6c11
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts vgf5XHUcCaEzeQun.tmp -
Executes dropped EXE 3 IoCs
pid Process 1716 vgf5XHUcCaEzeQun.exe 916 vgf5XHUcCaEzeQun.tmp 612 uTorrent.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompressStop.tif.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\PushMount.crw.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\RemoveStop.tiff.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\SetConvertFrom.raw.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\UninstallReceive.raw.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\WaitFind.tif.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\AddUnlock.tif.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe File created C:\Users\Admin\Pictures\BackupInvoke.tiff.vovalex 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe -
resource yara_rule behavioral1/files/0x00030000000130f6-18.dat upx behavioral1/files/0x00030000000130f6-19.dat upx behavioral1/files/0x00030000000130f6-29.dat upx behavioral1/files/0x00030000000130f6-32.dat upx -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine uTorrent.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine uTorrent.exe -
Loads dropped DLL 3 IoCs
pid Process 1716 vgf5XHUcCaEzeQun.exe 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main uTorrent.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\utorrentie.exe = "1" uTorrent.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CROSS_DOMAIN_REDIRECT_MITIGATION\utorrentie.exe = "0" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION uTorrent.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\utorrentie.exe = "11000" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CROSS_DOMAIN_REDIRECT_MITIGATION uTorrent.exe -
Modifies registry class 124 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.torrent vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\maindoc.ico" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\Content Type vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-app vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\shell\open\command = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\DefaultIcon vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\DefaultIcon vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\shell\open\command vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\Content Type\ = "application/x-bittorrent" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\DefaultIcon = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe,0" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\ = "bittorrent URI" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\shell vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\Content Type = "application/x-bittorrent-appinst" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\ = "uTorrent" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\Content Type vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\maindoc.ico" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\Content Type\ = "application/x-bittorrent-key" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\Content Type = "application/x-bittorrent-protocol" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\Content Type\ = "application/x-bittorrent-appinst" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\shell\open\command = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\shell\open\command = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\shell vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\FalconBetaAccount uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\Content Type vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\maindoc.ico" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\shell\open\command = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell\open = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\" /SHELLASSOC" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\shell\open\command vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\Content Type vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell\open\command vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\DefaultIcon = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe,0" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.torrent\ = "uTorrent" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\Content Type\ = "application/x-bittorrent" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-key\Extension = ".btkey" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\Content Type vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.torrent\Content Type = "application/x-bittorrent" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\Content Type = "application/x-bittorrent-app" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\Content Type = "application/x-bittorrent" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\shell vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\ = "uTorrent" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\Content Type = "application/x-bittorrent-skin" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\shell vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\Content Type = "application/x-magnet" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\shell vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\URL Protocol vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\ = "Magnet URI" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\Content Type = "application/x-bittorrentsearchdescription+xml" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\ = "uTorrent" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-skin vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\URL Protocol vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\DefaultIcon = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe,0" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\FalconBetaAccount\remote_access_client_id = "6927694329" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\Content Type = "application/x-bittorrent-key" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-skin\Extension = ".btskin" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrentsearchdescription+xml\Extension = ".btsearch" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\ = "uTorrent" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\ = "uTorrent" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\DefaultIcon vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btapp\uTorrent\Content Type\ = "application/x-bittorrent-app" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-appinst\Extension = ".btinstall" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\Content Type vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\ = "bittorrent URI" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-app\Extension = ".btapp" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell\open\command = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\shell\ = "open" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrentsearchdescription+xml vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\utorrent\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\" /SHELLASSOC" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\shell\open\command = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\URL Protocol vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\shell vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\shell vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-key vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent\shell vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\DefaultIcon = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe,0" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell = "open" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\Content Type vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\shell\open\command vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\shell\open vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btinstall\uTorrent vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent\Extension = ".torrent" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent\Content Type\ = "application/x-bittorrentsearchdescription+xml" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\" /SHELLASSOC" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btkey\uTorrent\DefaultIcon = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe,0" vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btskin\uTorrent\Content Type\ = "application/x-bittorrent-skin" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Applications\uTorrent.exe\shell\open vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\bittorrent\shell\open vgf5XHUcCaEzeQun.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Magnet\shell\ = "open" vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-appinst vgf5XHUcCaEzeQun.tmp Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.btsearch\uTorrent vgf5XHUcCaEzeQun.tmp -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 1920 NOTEPAD.EXE 1992 notepad.exe 1644 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 612 uTorrent.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeManageVolumePrivilege 612 uTorrent.exe Token: 33 1100 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1100 AUDIODG.EXE Token: 33 1100 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1100 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 916 vgf5XHUcCaEzeQun.tmp 612 uTorrent.exe 612 uTorrent.exe 612 uTorrent.exe 612 uTorrent.exe 1992 notepad.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 612 uTorrent.exe 612 uTorrent.exe 612 uTorrent.exe 612 uTorrent.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1716 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 26 PID 2028 wrote to memory of 1716 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 26 PID 2028 wrote to memory of 1716 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 26 PID 2028 wrote to memory of 1716 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 26 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 1716 wrote to memory of 916 1716 vgf5XHUcCaEzeQun.exe 27 PID 2028 wrote to memory of 1992 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 32 PID 2028 wrote to memory of 1992 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 32 PID 2028 wrote to memory of 1992 2028 772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe 32 PID 916 wrote to memory of 760 916 vgf5XHUcCaEzeQun.tmp 34 PID 916 wrote to memory of 760 916 vgf5XHUcCaEzeQun.tmp 34 PID 916 wrote to memory of 760 916 vgf5XHUcCaEzeQun.tmp 34 PID 916 wrote to memory of 760 916 vgf5XHUcCaEzeQun.tmp 34 PID 916 wrote to memory of 1540 916 vgf5XHUcCaEzeQun.tmp 36 PID 916 wrote to memory of 1540 916 vgf5XHUcCaEzeQun.tmp 36 PID 916 wrote to memory of 1540 916 vgf5XHUcCaEzeQun.tmp 36 PID 916 wrote to memory of 1540 916 vgf5XHUcCaEzeQun.tmp 36 PID 916 wrote to memory of 1648 916 vgf5XHUcCaEzeQun.tmp 38 PID 916 wrote to memory of 1648 916 vgf5XHUcCaEzeQun.tmp 38 PID 916 wrote to memory of 1648 916 vgf5XHUcCaEzeQun.tmp 38 PID 916 wrote to memory of 1648 916 vgf5XHUcCaEzeQun.tmp 38 PID 916 wrote to memory of 1604 916 vgf5XHUcCaEzeQun.tmp 40 PID 916 wrote to memory of 1604 916 vgf5XHUcCaEzeQun.tmp 40 PID 916 wrote to memory of 1604 916 vgf5XHUcCaEzeQun.tmp 40 PID 916 wrote to memory of 1604 916 vgf5XHUcCaEzeQun.tmp 40 PID 916 wrote to memory of 612 916 vgf5XHUcCaEzeQun.tmp 42 PID 916 wrote to memory of 612 916 vgf5XHUcCaEzeQun.tmp 42 PID 916 wrote to memory of 612 916 vgf5XHUcCaEzeQun.tmp 42 PID 916 wrote to memory of 612 916 vgf5XHUcCaEzeQun.tmp 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe"C:\Users\Admin\AppData\Local\Temp\772c627fc0b70e0454ff2e5464b9ee713a44a35298deba43f420e4fd21a0aeae.bin.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\vgf5XHUcCaEzeQun.exeC:\Users\Admin\AppData\Local\Temp\vgf5XHUcCaEzeQun.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\is-3DVSF.tmp\vgf5XHUcCaEzeQun.tmp"C:\Users\Admin\AppData\Local\Temp\is-3DVSF.tmp\vgf5XHUcCaEzeQun.tmp" /SL5="$40156,31402076,326656,C:\Users\Admin\AppData\Local\Temp\vgf5XHUcCaEzeQun.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule protocol=TCP name="uTorrent" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exe" enable=yes profile=public4⤵PID:760
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule protocol=UDP name="uTorrent" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exe" enable=yes profile=public4⤵PID:1540
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule protocol=TCP name="uTorrent (TCP-In)" program="C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exe" dir=in action=allow4⤵PID:1648
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule protocol=UDP name="uTorrent (UDP-In)" program="C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exe" dir=in action=allow4⤵PID:1604
-
-
C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exe"C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:612
-
-
-
-
C:\Windows\system32\notepad.exenotepad C:\Users\Admin\Desktop\README.VOVALEX.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:1992
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}1⤵PID:1028
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}1⤵PID:1632
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SendSelect.mpeg.vovalex1⤵
- Modifies registry class
PID:1620
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SelectTrace.sql.vovalex1⤵PID:1208
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.VOVALEX.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1644
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.VOVALEX.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1920
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100