Analysis
-
max time kernel
947s -
max time network
957s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-06-2021 08:45
Static task
static1
URLScan task
urlscan1
Sample
https://bazaar.abuse.ch/sample/60ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df/
Behavioral task
behavioral1
Sample
https://bazaar.abuse.ch/sample/60ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df/
Resource
win10v20210410
Errors
General
-
Target
https://bazaar.abuse.ch/sample/60ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df/
-
Sample
210611-tt7sfapl96
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Signatures
-
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe -
Registers COM server for autorun 1 TTPs
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 416 winrar-x64-601.exe 2176 uninstall.exe 3716 th.exe 4968 WinRAR.exe 5100 WinRAR.exe 3012 RYUK_SAMPLE_JUNE_2021.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertConnect.tiff RYUK_SAMPLE_JUNE_2021.exe File renamed C:\Users\Admin\Pictures\FormatRemove.png => C:\Users\Admin\Pictures\FormatRemove.png.RYK RYUK_SAMPLE_JUNE_2021.exe File renamed C:\Users\Admin\Pictures\ConvertConnect.tiff => C:\Users\Admin\Pictures\ConvertConnect.tiff.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Users\Admin\Pictures\ConvertConnect.tiff.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Users\Admin\Pictures\FormatRemove.png.RYK RYUK_SAMPLE_JUNE_2021.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\ryukreadme.html taskmgr.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 Process not Found -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2484 icacls.exe 4232 icacls.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI RYUK_SAMPLE_JUNE_2021.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\X: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\Q: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\M: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\K: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\B: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\W: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\U: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\O: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\N: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\I: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\F: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\Y: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\T: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\S: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\R: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\J: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\E: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\V: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\P: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\L: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\H: RYUK_SAMPLE_JUNE_2021.exe File opened (read-only) \??\G: RYUK_SAMPLE_JUNE_2021.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_Subscription-ppd.xrm-ms RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\upsell-2x.png.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_zh_4.4.0.v20140623020002.jar RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.w3c.dom.smil_1.0.0.v200806040011.jar RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\eu\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_es_135x40.svg.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ul-phn.xrm-ms.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ul.xrm-ms.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\office.x-none.msi.16.x-none.vreg.dat RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\common.js RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nb-no\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\faf-main.js RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\THMBNAIL.PNG.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\LICENSE.txt.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluNoSearchResults_180x160.svg.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\root\ui-strings.js RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GARABD.TTF.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_unshare_18.svg.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\ui-strings.js.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt_0.12.100.v20140530-1436.jar RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\nb-no\AppStore_icon.svg RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\orcl7.xsl.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\th\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File created C:\Program Files\WinRAR\Zip64.SFX winrar-x64-601.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.ibm.icu_52.1.0.v201404241930.jar.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ppd.xrm-ms.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\convertpdf-rna-tool-view.js.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\ui-strings.js.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ar-ae\ui-strings.js RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ppd.xrm-ms.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\ADO210.CHM.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1252.TXT.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL010.XML RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft.NET\ADOMD.NET\130\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\rename.svg RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActions.exsd RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL117.XML RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\ui-strings.js.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\vstoee100.tlb.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-disabled.svg RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_folder-focus_32.svg RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pt-br\RyukReadMe.html RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\selector.js.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\plugin.js.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.ui.ja_5.5.0.165303.jar RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_KMS_Client-ppd.xrm-ms RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-awt.xml.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator.nl_zh_4.4.0.v20140623020002.jar RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\icons.png RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\sat_logo.png.RYK RYUK_SAMPLE_JUNE_2021.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-output2.xml RYUK_SAMPLE_JUNE_2021.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3788 3716 WerFault.exe 89 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 SCHTASKS.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 339704ea112ed701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\th.exe = "1" th.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b27000000000200000000001066000000010000200000007e22a7d902a64079d3b2741ad9ef87995d91a1219a4092d02f5aad691a14a4ea000000000e80000000020000200000002529482b5076089804a04e0bc651c185d273821dde269a1e3a574b6555c6d61c20000000984627e3dc820c6ef8687229b377b1db1d30cd181ffd513a7e7b4435978a52ae4000000049848f6c99b213f6917d46840cc390ec5741ce173fb58d78cc1ce499a3b0154743383eca6fe19d89e1941ebbbc580754613118b95388d42fb4830af7c04e9e19 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING \th.exe = "1" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI \WinRAR.exe = "0" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\th.exe = "0" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\th.exe = "1" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\th.exe = "1" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\th.exe = "0" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\WinRAR.exe = "0" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3447089338" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\WinRAR.exe = "0" th.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\th.exe = "11000" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\WinRAR.exe = "1" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI \th.exe = "0" th.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\th.exe = "0" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{374509B0-CA93-11EB-A11C-5E750A496B7A}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\th.exe = "1" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\WinRAR.exe = "1" th.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\WinRAR.exe = "0" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\WinRAR.exe = "1" th.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS th.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d022bcca9e5ed701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\WinRAR.exe = "1" th.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3459590670" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b2700000000020000000000106600000001000020000000a7138eaaf2926d5381561878d787261b88ecbcaeb8fec307e7a143d63db60b56000000000e80000000020000200000001c6772c16198b8f5a1964b0f0367b36629bd26a8e07e0106662fb0c9e6a690de700100006d5a77d93dfc67908fdf05fa0ec2badfffe4bd21a64778c827f7270eadafe534d752fe6fd64b763a2a5166704c3d24f3bb72f5763932526edc5ce927c7a601b47f8c3fc178e0f54138a87de7eeb9f163c6602489e10f63f9486264d9b8af120bad0a9a2e0bd929757a8e3ba001055995e9bc9ac89f1f9a6608c95bb4bf978e0fb61a0c083c154db4812640940dceec701775af24bfd1276f50155ec34d40de6fe3e37ffa49d239f3f5153cd9a7cd1c2daf90dacba2b2d78c1e1d669c3f0bab830d35b4becd6d1aa7c2e4fc41608de3e5a1825aa02024920e5d30293c870478bc782b043a20c5a37ea7a892402d78deb398a99d03000cc991a4d2cd4ef42b4c9164038d9a688039df43636a6ded39e8040835c4a3b5e095af407f927fa4b6cf147538f5cd5aad858c0974e757eb5584bdf98ce4b4fc971fb67f5412572e0698ffd8fc6a28d5183691de54a4f50a43e9803ba4f406ced9dbef33c08a5a3c93d1e7fbdf7acd3cf7e84dc8b74f2f02c340b040000000531832bd79eac4ff9ab8d851fe639d1142f60c51debde40dde910f5ac7ee0e8a94a707bbde561e8744cb1a03d72c764ba00f61cb161175d8128f871199a5df41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch th.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING\WinRAR.exe = "0" th.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30891678" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30891678" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{80E63C72-088A-4FEB-AA0C-8C9AB9AFD0C6}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "330182955" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\th.exe = "1" th.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\th.exe = "1" th.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Keyboard Layout\Preload regedit.exe Set value (str) \REGISTRY\USER\.DEFAULT\Keyboard Layout\Preload\1 = "00000409" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Keyboard Layout\Preload\2 = "00000419" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{F25AEBC1-599E-4B90-9D39-D3CD791532D6}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r22 uninstall.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 2a653a9ba05ed701 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r18 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell uninstall.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\NextUpdateDate = "330175940" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\Total\ = "66" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r08\ = "WinRAR" uninstall.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\msn.com\Total = "2023" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\Total\ = "39" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP archive" uninstall.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open uninstall.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r07\ = "WinRAR" uninstall.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.z uninstall.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$WordPress MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xxe uninstall.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 4424 NOTEPAD.EXE 4660 NOTEPAD.EXE 4900 NOTEPAD.EXE -
Runs .reg file with regedit 1 IoCs
pid Process 4584 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 680 iexplore.exe 4784 taskmgr.exe 676 OpenWith.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 3008 MicrosoftEdgeCP.exe 3008 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 3788 WerFault.exe Token: SeDebugPrivilege 4784 taskmgr.exe Token: SeSystemProfilePrivilege 4784 taskmgr.exe Token: SeCreateGlobalPrivilege 4784 taskmgr.exe Token: SeDebugPrivilege 3764 MicrosoftEdge.exe Token: SeDebugPrivilege 3764 MicrosoftEdge.exe Token: SeDebugPrivilege 3764 MicrosoftEdge.exe Token: SeDebugPrivilege 3764 MicrosoftEdge.exe Token: SeDebugPrivilege 2388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3764 MicrosoftEdge.exe Token: SeDebugPrivilege 4356 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4356 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 5332 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5332 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5332 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5332 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5496 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5496 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5496 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4192 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 680 iexplore.exe 680 iexplore.exe 680 iexplore.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4968 WinRAR.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4968 WinRAR.exe 4968 WinRAR.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 5100 WinRAR.exe 4784 taskmgr.exe 4784 taskmgr.exe 5100 WinRAR.exe 5100 WinRAR.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe 4784 taskmgr.exe -
Suspicious use of SetWindowsHookEx 59 IoCs
pid Process 680 iexplore.exe 680 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 680 iexplore.exe 680 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 416 winrar-x64-601.exe 416 winrar-x64-601.exe 416 winrar-x64-601.exe 2176 uninstall.exe 3716 th.exe 3716 th.exe 3716 th.exe 3716 th.exe 3716 th.exe 680 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 3764 MicrosoftEdge.exe 3008 MicrosoftEdgeCP.exe 3008 MicrosoftEdgeCP.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 676 OpenWith.exe 4636 MicrosoftEdge.exe 3788 MicrosoftEdgeCP.exe 3788 MicrosoftEdgeCP.exe 4744 firefox.exe 4192 firefox.exe 5332 MicrosoftEdgeCP.exe 5332 MicrosoftEdgeCP.exe 2120 LogonUI.exe 2120 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 1540 680 iexplore.exe 74 PID 680 wrote to memory of 1540 680 iexplore.exe 74 PID 680 wrote to memory of 1540 680 iexplore.exe 74 PID 680 wrote to memory of 416 680 iexplore.exe 85 PID 680 wrote to memory of 416 680 iexplore.exe 85 PID 416 wrote to memory of 2176 416 winrar-x64-601.exe 87 PID 416 wrote to memory of 2176 416 winrar-x64-601.exe 87 PID 416 wrote to memory of 3716 416 winrar-x64-601.exe 89 PID 416 wrote to memory of 3716 416 winrar-x64-601.exe 89 PID 3012 wrote to memory of 2484 3012 RYUK_SAMPLE_JUNE_2021.exe 112 PID 3012 wrote to memory of 2484 3012 RYUK_SAMPLE_JUNE_2021.exe 112 PID 3012 wrote to memory of 2484 3012 RYUK_SAMPLE_JUNE_2021.exe 112 PID 3012 wrote to memory of 4232 3012 RYUK_SAMPLE_JUNE_2021.exe 114 PID 3012 wrote to memory of 4232 3012 RYUK_SAMPLE_JUNE_2021.exe 114 PID 3012 wrote to memory of 4232 3012 RYUK_SAMPLE_JUNE_2021.exe 114 PID 3008 wrote to memory of 2388 3008 MicrosoftEdgeCP.exe 123 PID 3008 wrote to memory of 2388 3008 MicrosoftEdgeCP.exe 123 PID 3008 wrote to memory of 2388 3008 MicrosoftEdgeCP.exe 123 PID 3008 wrote to memory of 2388 3008 MicrosoftEdgeCP.exe 123 PID 3008 wrote to memory of 2388 3008 MicrosoftEdgeCP.exe 123 PID 3008 wrote to memory of 2388 3008 MicrosoftEdgeCP.exe 123 PID 3012 wrote to memory of 4424 3012 RYUK_SAMPLE_JUNE_2021.exe 127 PID 3012 wrote to memory of 4424 3012 RYUK_SAMPLE_JUNE_2021.exe 127 PID 3012 wrote to memory of 4424 3012 RYUK_SAMPLE_JUNE_2021.exe 127 PID 676 wrote to memory of 4900 676 OpenWith.exe 129 PID 676 wrote to memory of 4900 676 OpenWith.exe 129 PID 3788 wrote to memory of 3960 3788 MicrosoftEdgeCP.exe 133 PID 3788 wrote to memory of 3960 3788 MicrosoftEdgeCP.exe 133 PID 3788 wrote to memory of 3960 3788 MicrosoftEdgeCP.exe 133 PID 3788 wrote to memory of 3960 3788 MicrosoftEdgeCP.exe 133 PID 3788 wrote to memory of 3960 3788 MicrosoftEdgeCP.exe 133 PID 3788 wrote to memory of 3960 3788 MicrosoftEdgeCP.exe 133 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 4936 wrote to memory of 4192 4936 firefox.exe 136 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 1560 wrote to memory of 4744 1560 firefox.exe 138 PID 4744 wrote to memory of 2288 4744 firefox.exe 141 PID 4744 wrote to memory of 2288 4744 firefox.exe 141 PID 4192 wrote to memory of 4628 4192 firefox.exe 142 PID 4192 wrote to memory of 4628 4192 firefox.exe 142 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143 PID 4192 wrote to memory of 2644 4192 firefox.exe 143
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bazaar.abuse.ch/sample/60ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df/1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:680 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Users\Admin\Downloads\winrar-x64-601.exe"C:\Users\Admin\Downloads\winrar-x64-601.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup3⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
C:\Program Files\WinRAR\th.exe"C:\Program Files\WinRAR\th.exe" -lng English -src wrr -lp thankyou -ver 601 -arch 64 -dom notifier.win-rar.com3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3716 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3716 -s 25444⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:2804
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3872
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:4192
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Russian_KB.reg.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4424
-
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\Desktop\Russian_KB.reg"1⤵
- Modifies data under HKEY_USERS
- Runs .reg file with regedit
PID:4584
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\TEST.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4660
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4784
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -imon1 -- "C:\Users\Admin\Desktop\PACO_RYUK_JUNE_202160ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df.zip" C:\Users\Admin\Desktop\PACO_RYUK_JUNE_202160ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df\1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4968
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -imon1 -- "C:\Users\Admin\Desktop\PACO_RYUK_JUNE_202160ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df\60ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df.zip" C:\Users\Admin\Desktop\PACO_RYUK_JUNE_202160ef0ca5e6e7d62a7750cfe1c0b08d473cb19a6817a799f035ac56e0d27ce3df\1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5100
-
C:\Users\Admin\Desktop\RYUK_SAMPLE_JUNE_2021.exe"C:\Users\Admin\Desktop\RYUK_SAMPLE_JUNE_2021.exe"1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2484
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:4232
-
-
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /CREATE /NP /SC DAILY /TN "PrintbO" /TR "C:\Windows\System32\cmd.exe /c for /l %x in (1,1,50) do start wordpad.exe /p C:\users\Public\wiqu6.dll" /ST 10:25 /SD 06/12/2021 /ED 06/19/20212⤵
- Creates scheduled task(s)
PID:4424
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3764
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\TEST.txt.RYK2⤵
- Opens file in notepad (likely ransom note)
PID:4900
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4636
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3504
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3960
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4116
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4192.0.1533490825\898158025" -parentBuildID 20200403170909 -prefsHandle 1500 -prefMapHandle 1492 -prefsLen 1 -prefMapSize 219680 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4192 "\\.\pipe\gecko-crash-server-pipe.4192" 1632 gpu3⤵PID:4628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4192.3.612209685\780632339" -childID 1 -isForBrowser -prefsHandle 2240 -prefMapHandle 2236 -prefsLen 156 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4192 "\\.\pipe\gecko-crash-server-pipe.4192" 2252 tab3⤵PID:2644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4192.13.1381272862\1560309462" -childID 2 -isForBrowser -prefsHandle 3392 -prefMapHandle 3388 -prefsLen 7014 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4192 "\\.\pipe\gecko-crash-server-pipe.4192" 3400 tab3⤵PID:5668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4192.20.1460987936\1455311794" -childID 3 -isForBrowser -prefsHandle 4208 -prefMapHandle 3980 -prefsLen 7719 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4192 "\\.\pipe\gecko-crash-server-pipe.4192" 4020 tab3⤵PID:5356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4192.27.1215119779\635988098" -childID 4 -isForBrowser -prefsHandle 4124 -prefMapHandle 3656 -prefsLen 8853 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4192 "\\.\pipe\gecko-crash-server-pipe.4192" 4076 tab3⤵PID:4728
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.0.10109999\1740172439" -parentBuildID 20200403170909 -prefsHandle 1348 -prefMapHandle 1340 -prefsLen 1 -prefMapSize 214080 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 1428 gpu3⤵PID:2288
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3516
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5332
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5944
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5496
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4620
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3a43055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2120