Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2022, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Scatter.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Scatter.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Scatter.exe
-
Size
99KB
-
MD5
ff0e42146794f0d080df0467337b2d01
-
SHA1
26ef91a61e0d1bdefd22162c30af92e0fadf00c3
-
SHA256
3fb5af5018d03ff87735c678bef687cd5099e64c8c0636b62919c3b7d2072de9
-
SHA512
9dc93ad2699ab6fc94e1ae85d220a436bad8dd4710a9ee3b8febdd49886bd33994e4b634c8f30725e864d3e8a37ed930686e2406366cd8aae18eee346035696e
-
SSDEEP
1536:yUU9pH+lElvTHDMZHupmW4F6F1WzPnJoP8FHLIgSTa+5zmD6KjkQok:yT7H+EkZO944CzPmP8SG+tmmKjkQok
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\!!_RECOVERY_instructions_!!.html
#660000;">[email protected]</strong></li>
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\!!_RECOVERY_instructions_!!.txt
1NLLrung1MaXucHpAzY5KjdK4y8woodJWt
https://coinatmradar.com
https://bittylicious.com
https://cex.io
https://btcdirect.eu
https://coincorner.com
Signatures
-
Nuke
Ransomware family first discovered in 2016.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Scatter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nuke_html = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\!!_RECOVERY_instructions_!!.html" Trojan-Ransom.Win32.Scatter.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Nuclear55\\desktop_wallpaper.bmp" Trojan-Ransom.Win32.Scatter.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vreg\BaEe+a=c0c=B1dEB.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubAppList.scale-125_contrast-black.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Em1W+c=W=Wf=a=cB.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUECALM\a=d=+dBWccaac00a.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageLargeTile.scale-125.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-32_contrast-black.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxAccountsSplashLogo.scale-180.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Efcd+0ed0ddacBa=.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\Wcca+dEf=Bde=abc.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files\VideoLAN\VLC\eeed+ecmfcEfE=11.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-72_contrast-white.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\ThankYou\GenericIntl-1.jpg.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\2.1.15\0cdc+admBm0adcem.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\LargeTile.scale-125.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\fcmd+0emfa=EWecb.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageLargeTile.scale-100.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideTile.scale-150_contrast-black.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\MedTile.scale-100.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-60_altform-lightunplated.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\EBB1+BWe=cBc=1cb.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\cBEb+ac1d1ab=e0a.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\OrientationControlCone.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\0cme+ceddcEEcdmb.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\Eca=+eeEaeaBaEcb.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\css\cfmd+cb1mWWaaEWb.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\FreeCell.Large.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pl-pl\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-sl\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\Eacb+cfcefa01WBc.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\WideTile.scale-125.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\BE=d+dcE1E1de1Ec.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\aB=d+1dcW=Emcma0.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-150.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_altform-unplated_contrast-black.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-20.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\EcaE+b0BdcmEce1W.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-125_contrast-white.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\m1cb+dbd=aBaBBdW.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hu-hu\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\dEfd+1cEbaEfWcdW.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\cddd+aEma=c0edac.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\Shifter\Relicensing Statement.txt.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fr-fr\WeBe+caW101a1mc=.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\aebm+cE1mBdd1dcd.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-48_altform-unplated_contrast-black.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\aEEb+d1amc==cEad.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-64.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SUMIPNTG\a=d=+dBWccaac00a.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\WideTile.scale-100.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\WideTile.scale-100.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\=c1a+We=1ma=acfa.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailBadge.scale-100.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\d0ed+WmWaEcacfd0.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_contrast-black.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ca-es\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\WdBB+WB1=dcEaBcm.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_altform-unplated_contrast-white.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\BuildInfo.xml.nuclear55 Trojan-Ransom.Win32.Scatter.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\AppPackageStoreLogo.scale-125_contrast-white.png.nuclear55 Trojan-Ransom.Win32.Scatter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Scatter.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Scatter.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Trojan-Ransom.Win32.Scatter.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3872 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2496 Trojan-Ransom.Win32.Scatter.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4812 2496 Trojan-Ransom.Win32.Scatter.exe 97 PID 2496 wrote to memory of 4812 2496 Trojan-Ransom.Win32.Scatter.exe 97 PID 2496 wrote to memory of 2032 2496 Trojan-Ransom.Win32.Scatter.exe 99 PID 2496 wrote to memory of 2032 2496 Trojan-Ransom.Win32.Scatter.exe 99 PID 2496 wrote to memory of 2032 2496 Trojan-Ransom.Win32.Scatter.exe 99 PID 2496 wrote to memory of 4332 2496 Trojan-Ransom.Win32.Scatter.exe 100 PID 2496 wrote to memory of 4332 2496 Trojan-Ransom.Win32.Scatter.exe 100 PID 2496 wrote to memory of 4332 2496 Trojan-Ransom.Win32.Scatter.exe 100 PID 2496 wrote to memory of 3724 2496 Trojan-Ransom.Win32.Scatter.exe 102 PID 2496 wrote to memory of 3724 2496 Trojan-Ransom.Win32.Scatter.exe 102 PID 2496 wrote to memory of 3724 2496 Trojan-Ransom.Win32.Scatter.exe 102 PID 3724 wrote to memory of 3872 3724 cmd.exe 104 PID 3724 wrote to memory of 3872 3724 cmd.exe 104 PID 3724 wrote to memory of 3872 3724 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Scatter.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Scatter.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\Microsoft\!!_RECOVERY_instructions_!!.html2⤵PID:4812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xb0,0x104,0x7ffc547446f8,0x7ffc54744708,0x7ffc547447183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\!!_RECOVERY_instructions_!!.txt2⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Scatter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:3872
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD512c3f9e6e0a31406e2843d417a2c4376
SHA1443e2cbc281a36485c33fefcbbe4558e5d58877b
SHA256445956d8741890a5fa3228a88e5c3c7c5bffae946e9de9b0b565d711ff72460c
SHA51213b6517c235eb21c5fa881f0b763aa24d6d65da5b8c115cc0fb9bb1096d3744250d0431f06df11eafd0c2308e3d9f39f5c6302bffef5cacd4a60b0eb91367286