Analysis
-
max time kernel
113s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe
Resource
win10v2004-20220812-en
General
-
Target
HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe
-
Size
100KB
-
MD5
7fdd3bf8886199e8336f95c88bcaa49a
-
SHA1
77e2019093379de4d5de07dbcf5893831c9bb7ec
-
SHA256
5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc
-
SHA512
9d774eca21fb33f26991cf20f0f6a2f0bce56aa4cc3d17fd769e0bb767ca400cd5c8dd64bb62db23bf5bc112b91b1a26db7bf2f9d85993cb990be5113e527a40
-
SSDEEP
1536:1zmSA404oATJVPHEMXMxa6CO3/k/hdXVyczH+95DfFFjfuEnm:1zxEYsZaLhdlo95DfFFjfuCm
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
Signatures
-
Modifies Windows Firewall 1 TTPs 4 IoCs
pid Process 3040 netsh.exe 1536 netsh.exe 3412 netsh.exe 3128 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1640 icacls.exe 2392 icacls.exe 1964 icacls.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "All your files have been encrypted" HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = " If you want to restore them, write us to the e-mail [email protected]\r\nor\r\[email protected]" HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\ResetRevoke.cab.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\SearchRedo.vstx.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\TestRevoke.tmp.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\TraceAssert.docm.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\MoveDisconnect.ps1.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\PublishConnect.tif.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\ProtectGrant.htm.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\PublishMerge.xps.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\ReadConvert.ram.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\ShowMerge.rtf.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\GroupClose.jpg.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Program Files\InstallRevoke.wps.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\lsasetup.log.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\WindowsShell.Manifest HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\PFRO.log.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\Professional.xml.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\setupact.log.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\system.ini.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\win.ini.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File opened for modification C:\Windows\WindowsUpdate.log.[ID-2C4BFA22].[[email protected]].CRYSTAL HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe File created C:\Windows\RESTORE_FILES_INFO.txt HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4372 sc.exe 680 sc.exe 752 sc.exe 1592 sc.exe 2704 sc.exe 1772 sc.exe 4864 sc.exe 4536 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 48 IoCs
pid Process 1644 taskkill.exe 4048 taskkill.exe 216 taskkill.exe 3796 taskkill.exe 1248 taskkill.exe 2744 taskkill.exe 5084 taskkill.exe 3484 taskkill.exe 3864 taskkill.exe 1556 taskkill.exe 3960 taskkill.exe 704 taskkill.exe 220 taskkill.exe 3356 taskkill.exe 1444 taskkill.exe 3684 taskkill.exe 3612 taskkill.exe 4452 taskkill.exe 1456 taskkill.exe 2236 taskkill.exe 4672 taskkill.exe 4504 taskkill.exe 4892 taskkill.exe 892 taskkill.exe 4360 taskkill.exe 2120 taskkill.exe 2248 taskkill.exe 540 taskkill.exe 1496 taskkill.exe 4036 taskkill.exe 3640 taskkill.exe 2124 taskkill.exe 1556 taskkill.exe 3368 taskkill.exe 400 taskkill.exe 4960 taskkill.exe 1896 taskkill.exe 4968 taskkill.exe 3644 taskkill.exe 4032 taskkill.exe 2060 taskkill.exe 2956 taskkill.exe 2416 taskkill.exe 3332 taskkill.exe 664 taskkill.exe 3720 taskkill.exe 2216 taskkill.exe 4588 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4436 reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4984 notepad.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1180 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe Token: SeDebugPrivilege 2120 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 3332 taskkill.exe Token: SeDebugPrivilege 3796 taskkill.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeDebugPrivilege 1248 taskkill.exe Token: SeDebugPrivilege 4452 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 2216 taskkill.exe Token: SeDebugPrivilege 1896 taskkill.exe Token: SeDebugPrivilege 2744 taskkill.exe Token: SeDebugPrivilege 1644 taskkill.exe Token: SeDebugPrivilege 4036 taskkill.exe Token: SeDebugPrivilege 4672 taskkill.exe Token: SeDebugPrivilege 220 taskkill.exe Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 664 taskkill.exe Token: SeDebugPrivilege 3640 taskkill.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 3720 taskkill.exe Token: SeDebugPrivilege 4504 taskkill.exe Token: SeDebugPrivilege 3644 taskkill.exe Token: SeDebugPrivilege 4048 taskkill.exe Token: SeDebugPrivilege 3356 taskkill.exe Token: SeDebugPrivilege 892 taskkill.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 704 taskkill.exe Token: SeDebugPrivilege 1444 taskkill.exe Token: SeDebugPrivilege 2124 taskkill.exe Token: SeDebugPrivilege 2956 taskkill.exe Token: SeDebugPrivilege 4360 taskkill.exe Token: SeDebugPrivilege 5084 taskkill.exe Token: SeDebugPrivilege 4588 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 2416 taskkill.exe Token: SeDebugPrivilege 4032 taskkill.exe Token: SeDebugPrivilege 3684 taskkill.exe Token: SeDebugPrivilege 3864 taskkill.exe Token: SeDebugPrivilege 3612 taskkill.exe Token: SeDebugPrivilege 3368 taskkill.exe Token: SeDebugPrivilege 3676 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2120 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 83 PID 5080 wrote to memory of 2120 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 83 PID 5080 wrote to memory of 308 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 85 PID 5080 wrote to memory of 308 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 85 PID 5080 wrote to memory of 4436 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 87 PID 5080 wrote to memory of 4436 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 87 PID 5080 wrote to memory of 3628 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 89 PID 5080 wrote to memory of 3628 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 89 PID 5080 wrote to memory of 1772 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 91 PID 5080 wrote to memory of 1772 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 91 PID 5080 wrote to memory of 4864 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 93 PID 5080 wrote to memory of 4864 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 93 PID 5080 wrote to memory of 4536 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 94 PID 5080 wrote to memory of 4536 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 94 PID 5080 wrote to memory of 4372 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 97 PID 5080 wrote to memory of 4372 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 97 PID 5080 wrote to memory of 680 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 99 PID 5080 wrote to memory of 680 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 99 PID 5080 wrote to memory of 752 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 100 PID 5080 wrote to memory of 752 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 100 PID 5080 wrote to memory of 1592 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 103 PID 5080 wrote to memory of 1592 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 103 PID 5080 wrote to memory of 2704 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 105 PID 5080 wrote to memory of 2704 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 105 PID 5080 wrote to memory of 3040 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 107 PID 5080 wrote to memory of 3040 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 107 PID 5080 wrote to memory of 400 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 108 PID 5080 wrote to memory of 400 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 108 PID 5080 wrote to memory of 4960 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 113 PID 5080 wrote to memory of 4960 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 113 PID 5080 wrote to memory of 1556 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 112 PID 5080 wrote to memory of 1556 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 112 PID 5080 wrote to memory of 3332 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 115 PID 5080 wrote to memory of 3332 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 115 PID 5080 wrote to memory of 3796 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 117 PID 5080 wrote to memory of 3796 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 117 PID 5080 wrote to memory of 2248 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 118 PID 5080 wrote to memory of 2248 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 118 PID 5080 wrote to memory of 1248 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 121 PID 5080 wrote to memory of 1248 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 121 PID 5080 wrote to memory of 4452 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 122 PID 5080 wrote to memory of 4452 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 122 PID 5080 wrote to memory of 1456 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 125 PID 5080 wrote to memory of 1456 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 125 PID 5080 wrote to memory of 2236 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 127 PID 5080 wrote to memory of 2236 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 127 PID 5080 wrote to memory of 540 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 129 PID 5080 wrote to memory of 540 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 129 PID 5080 wrote to memory of 2216 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 132 PID 5080 wrote to memory of 2216 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 132 PID 5080 wrote to memory of 1896 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 131 PID 5080 wrote to memory of 1896 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 131 PID 5080 wrote to memory of 2744 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 135 PID 5080 wrote to memory of 2744 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 135 PID 5080 wrote to memory of 1644 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 137 PID 5080 wrote to memory of 1644 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 137 PID 5080 wrote to memory of 4672 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 139 PID 5080 wrote to memory of 4672 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 139 PID 5080 wrote to memory of 4036 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 142 PID 5080 wrote to memory of 4036 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 142 PID 5080 wrote to memory of 220 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 143 PID 5080 wrote to memory of 220 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 143 PID 5080 wrote to memory of 3960 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 145 PID 5080 wrote to memory of 3960 5080 HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe 145 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "All your files have been encrypted" HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = " If you want to restore them, write us to the e-mail [email protected]\r\nor\r\[email protected]" HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe"1⤵
- Checks computer location settings
- Drops startup file
- Modifies WinLogon
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5080 -
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\SYSTEM32\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F2⤵PID:308
-
-
C:\Windows\SYSTEM32\reg.exe"reg" delete HKCU\Software\Raccine /F2⤵
- Modifies registry key
PID:4436
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:3628
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config FDResPub start= auto2⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config Dnscache start= auto2⤵
- Launches sc.exe
PID:4864
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵
- Launches sc.exe
PID:4536
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SSDPSRV start= auto2⤵
- Launches sc.exe
PID:4372
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵
- Launches sc.exe
PID:680
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵
- Launches sc.exe
PID:752
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config upnphost start= auto2⤵
- Launches sc.exe
PID:1592
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵
- Modifies Windows Firewall
PID:3040
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM synctime.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM onenote.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM encsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM excel.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM thebat.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM thebat64.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM msaccess.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM outlook.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM steam.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocomm.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" IM thunderbird.exe /F2⤵
- Kills process with taskkill
PID:4892
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM wordpad.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM infopath.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM msftesql.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM zoolz.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocssd.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM visio.exe /F2⤵
- Kills process with taskkill
PID:3484
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM oracle.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM winword.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls" "C:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1640
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls" "D:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2392
-
-
C:\Windows\SYSTEM32\icacls.exe"icacls" "Z:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1964
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵
- Modifies Windows Firewall
PID:1536
-
-
C:\Windows\SYSTEM32\arp.exe"arp" -a2⤵PID:3248
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:1000
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c rd /s /q D:\\$Recycle.bin2⤵PID:1324
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵
- Modifies Windows Firewall
PID:3412
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes2⤵
- Modifies Windows Firewall
PID:3128
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4984
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”2⤵PID:3936
-
C:\Windows\system32\PING.EXEping 127.0.0.7 -n 33⤵
- Runs ping.exe
PID:1180
-
-
C:\Windows\system32\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”3⤵PID:4032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Encoder.gen-5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe2⤵PID:2392
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:4612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f3dc4193bab2599f08b987d977d37c1f
SHA175b9843e0a47f8c6e9c9f1993cf0673d5d5b9222
SHA256841b5221834f6aa5f5e37625da413af2d603adf51d6fca8e724b0ca630831e67
SHA512f016c226181fed76e76c4c845e5d2bd2e4b68db41385ca2d3cff215928ea6c6f7575051df7b1a9c15aabc168389925b10e617c919cab8cd2d31347e979510b6d