Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2023 21:37
Behavioral task
behavioral1
Sample
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
Resource
win10v2004-20220812-en
General
-
Target
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
-
Size
542KB
-
MD5
61c19e7ce627da9b5004371f867a47d3
-
SHA1
4f3b4329871ec269043068a98e9cc929f603268d
-
SHA256
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9
-
SHA512
dd919e1dace4e1f246552bbb1b55cd13f38bdac8764afb67624d4331341dff1c3cd75616da26d9deb4e05c04163b78a5ff8b9ffec2f73b2c9b82d5a41e216244
-
SSDEEP
6144:YONNYdX7HkqEHcTY6uoZzFyKAuGnlOOkl8tuGogbOIVmda9J4:YONNoX7HMHcTY6uoZzFyfONlwNB2
Malware Config
Extracted
C:\lf6836a7ng-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/74448695C00D9750
http://decryptor.top/74448695C00D9750
Extracted
sodinokibi
5
367
craftingalegacy.com
g2mediainc.com
brinkdoepke.eu
vipcarrental.ae
autoteamlast.de
hostastay.com
gavelmasters.com
ronaldhendriks.nl
successcolony.com.ng
medicalsupportco.com
kompresory-opravy.com
sveneulberg.de
oththukaruva.com
voetbalhoogeveen.nl
selected-minds.de
log-barn.co.uk
fsbforsale.com
jobkiwi.com.ng
ivancacu.com
11.in.ua
irizar.com
colored-shelves.com
soundseeing.net
scotlandsroute66.co.uk
hawaiisteelbuilding.com
mindfuelers.com
dentourage.com
hekecrm.com
finsahome.co.uk
cormanmarketing.com
morgansconsult.com
dnqa.co.uk
frimec-international.es
worldproskitour.com
csaballoons.com
krishnabrawijaya.com
tatyanakopieva.ru
silkeight.com
publicompserver.de
letsstopsmoking.co.uk
anleggsregisteret.no
arearugcleaningnyc.com
diverfiestas.com.es
lovcase.com
alltagsrassismus-entknoten.de
lassocrm.com
boyfriendsgoal.site
mbuildinghomes.com
santastoy.store
citiscapes-art.com
unislaw-narty.pl
envomask.com
patassociation.com
luvbec.com
keuken-prijs.nl
therapybusinessacademy.com
baikalflot.ru
piestar.com
diakonie-weitramsdorf-sesslach.de
klapanvent.ru
fysiotherapierijnmond.nl
avis.mantova.it
fla.se
sjtpo.org
kroophold-sjaelland.dk
alharsunindo.com
tothebackofthemoon.com
chainofhopeeurope.eu
smartmind.net
akcadagofis.com
bundan.com
graygreenbiomedservices.com
dogsunlimitedguide.com
rvside.com
davedavisphotos.com
johnstonmingmanning.com
mangimirossana.it
welovecustomers.fr
kenmccallum.com
glas-kuck.de
theboardroomafrica.com
slideevents.be
omegamarbella.com
zdrowieszczecin.pl
fotoslubna.com
mursall.de
forextimes.ru
hiddensee-buhne11.de
girlish.ae
motocrosshideout.com
billyoart.com
eafx.pro
patriotcleaning.net
renehartman.nl
xn--80addfr4ahr.dp.ua
speakaudible.com
magrinya.net
der-stempelking.de
trivselsguide.dk
mondolandscapes.com
nginx.com
voice2biz.com
hoteltantra.com
casinodepositors.com
wallflowersandrakes.com
bakingismyyoga.com
traitware.com
avtoboss163.ru:443
hvitfeldt.dk
natturestaurante.com.br
onlinemarketingsurgery.co.uk
brownswoodblog.com
reizenmetkinderen.be
mneti.ru
linkbuilding.life
levencovka.ru
bilius.dk
p-ride.live
tecleados.com
cl0nazepamblog.com
atelierkomon.com
oexebusiness.com
miscbo.it
kickittickets.com
rivermusic.nl
airserviceunlimited.com
pureelements.nl
subyard.com
pinkxgayvideoawards.com
eos-horlogerie.com
craftron.com
nationnewsroom.com
alaskaremote.com
askstaffing.com
springfieldplumbermo.com
ziliak.com
berdonllp.com
citydogslife.com
tradenavigator.ch
witraz.pl
jlwilsonbooks.com
nvisionsigns.com
espaciopolitica.com
singletonfinancial.com
ideamode.com
clinic-beethovenstrasse-ag.ch
precisetemp.com
kellengatton.com
bruut.online
matteoruzzaofficial.com
pourlabretagne.bzh
goeppinger-teppichreinigung.de
rhino-storage.co.uk
xtensifi.com
hm-com.com
vvego.com
startuplive.org
easydental.ae
alisodentalcare.com
weddingceremonieswithtim.com
tutvracks.com
harleystreetspineclinic.com
dantreranch.com
docarefoundation.org
lexced.com
palmecophilippines.com
louiedager.com
digitale-elite.de
sber-biznes.com
stabilisateur.fr
logosindustries.com
azloans.com
customroasts.com
mikegoodfellow.co.uk
annenymus.com
larchwoodmarketing.com
wineandgo.hu
smartspeak.com
nepal-pictures.com
aslog.fr
aceroprime.com
zorgboerderijravensbosch.nl
solutionshosting.co.uk
elex.is
mike.matthies.de
coachpreneuracademy.com
efficiencyconsulting.es
livelai.com
victorvictoria.com
signamedia.de
min-virksomhed.dk
sycamoregreenapts.com
ultimatelifesource.com
purepreprod4.com
kausette.com
luvinsburger.fr
mariamalmahdi.com
acornishstudio.co.uk
nepressurecleaning.com
malevannye.ru
banukumbak.com
metallbau-hartmann.eu
globalskills.pt
denhaagfoodie.nl
cxcompany.com
wordpress.idium.no
bcmets.info
koncept-m.ru
xn--80abehgab4ak0ddz.xn--p1ai
altitudeboise.com
bd2fly.com
foerderverein-vatterschule.de
rhino-turf.com
suitesartemis.gr
thiagoperez.com
kvetymichalovce.sk
netadultere.fr
sololibrerie.it
global-migrate.com
indiebizadvocates.org
juergenblaetz.de
signededenroth.dk
onlinetvgroup.com
fazagostar.co
stagefxinc.com
drbrianhweeks.com
ketomealprep.academy
saberconcrete.com
entdoctor-durban.com
oscommunity.de
chomiksy.net
latteswithleslie.com
annida.it
edrickennedymacfoy.com
midwestschool.org
michal-s.co.il
kartuindonesia.com
claudiakilian.de
thegetawaycollective.com
matthieupetel.fr
condormobile.fr
astrographic.com
marmarabasin.com
kelsigordon.com
forskolinslimeffect.net
cardsandloyalty.com
electricianul.com
buffdaddyblog.com
jandhpest.com
albcleaner.fr
concontactodirecto.com
heuvelland-oaze.nl
fixx-repair.com
awaisghauri.com
kiraribeaute-nani.com
fridakids.com
cascinarosa33.it
3daywebs.com
boloria.de
endstarvation.com
switch-made.com
aoyama.ac
universelle.fr
bodet150ans.com
mazift.dk
aciscomputers.com
mariannelemenestrel.com
explora.nl
haus-landliebe.de
geoweb.software
pansionatblago.ru
1deals.com
stralsund-ansichten.de
projektparkiet.pl
gsconcretecoatings.com
banksrl.co.za
bourchier.org
livedeveloper.com
stressreliefadvice.com
lagschools.ng
m2graph.fr
look.academy
turing.academy
daveystownhouse.com
myfbateam.com
penumbuhrambutkeiskei.com
imaginekithomes.co.nz
devplus.be
ruggestar.ch
proffteplo.com
oro.ae
paprikapod.com
drnelsonpediatrics.com
tramadolhealth.com
thehovecounsellingpractice.co.uk
speiserei-hannover.de
arthakapitalforvaltning.dk
skoczynski.eu
hotjapaneselesbian.com
cssp-mediation.org
cp-bap.de
ygallerysalonsoho.com:443
atma.nl
metcalfe.ca
insane.agency
sochi-okna23.ru
carolynfriedlander.com
liverpoolabudhabi.ae
hartofurniture.com
boomerslivinglively.com
moira-cristescu.com
texanscan.org
bohrlochversicherung.info
birthplacemag.com
primemarineengineering.com
angelsmirrorus.com
qandmmusiccenter.com
die-immo-agentur.de
the-beauty-guides.com
levelseven.be
catalyseurdetransformation.com
mollymccarthydesign.com
hutchstyle.co.uk
oportowebdesign.com
phoenixcrane.com
olry-cloisons.fr
alnectus.com
testitjavertailut.net
monstarrsoccer.com
sellthewrightway.com
cotton-avenue.co.il
lifeinbreaths.com
alwaysdc.com
rsidesigns.com
leadforensics.com
premiumweb.com.ua:443
rozmata.com
opticahubertruiz.com
ntinasfiloxenia.gr
so-sage.fr
polynine.com
k-zubki.ru
pisofare.co
tages-geldvergleich.de
funworx.de
smarttourism.academy
theater-lueneburg.de
bajova.sk
yvesdoin-aquarelles.fr
leatherjees.com
sarahspics.co.uk
yourcosmicbeing.com
rs-danmark.dk
simpleitsolutions.ch
makingmillionaires.net
epsondriversforwindows.com
ayudaespiritualtamara.com
trevi-vl.ru
vapiano.fr
antesacademy.it
rarefoods.ro
belinda.af
dennisverschuur.com
sprintcoach.com
martinipstudios.com
ddmgen.com
block-optic.com
almamidwifery.com
ncn.nl
alpesiberie.com
palmenhaus-erfurt.de
bcabattoirs.org
circlecitydj.com
slotenmakerszwijndrecht.nl
innersurrection.com
aheadloftladders.co.uk
angelika-schwarz.com
lapponiasafaris.com
jonnyhooley.com
oraweb.net
donau-guides.eu
istantidigitali.com
optigas.com
asiaartgallery.jp
limounie.com
rishigangoly.com
taulunkartano.fi
osn.ro
marcandy.com
jacquesgarcianoto.com
thepixelfairy.com
mariajosediazdemera.com
leopoldineroux.com
goodboyscustom.com
energosbit-rp.ru
eatyoveges.com
mac-computer-support-hamburg.de
tilldeeke.de
aberdeenartwalk.org
encounter-p.net
andreaskildegaard.dk
tweedekansenloket.nl
amorbellezaysalud.com
palema.gr
9nar.com
lunoluno.com
betterce.com
beauty-traveller.com
alattekniksipil.com
craftstone.co.nz
alene.co
jollity.hu
chorusconsulting.net
motocrossplace.co.uk
mieleshopping.it
mundo-pieces-auto.fr
richardkershawwines.co.za
salonlamar.nl
fotoeditores.com
axisoflove.org:443
ledyoucan.com
metroton.ru
apiarista.de
cmascd.com
karelinjames.com
gosouldeep.com
nieuwsindeklas.be
mediogiro.com.ar
jax-interim-and-projectmanagement.com
elliemaccreative.wordpress.com
eshop.design
billscars.net
verbouwingsdouche.nl
test-teleachat.fr
mazzaropi.com.br
finnergo.eu
jobscore.com
pedmanson.com
belofloripa.be
littlesaints.academy
eastgrinsteadwingchun.com
pharmeko-group.com
bridalcave.com
georgemuncey.com
glennverschueren.be
jag.me
groovedealers.ru
internalresults.com
wyreforest.net
uncensoredhentaigif.com
centuryvisionglobal.com
skyboundnutrition.co.uk
adedesign.com
thesilkroadny.com
fluzfluzrewards.com
hotelturbo.de
skidpiping.de
gurutechnologies.net
nxtstg.org
chris-anne.com
billigeflybilletter.dk
vitormmcosta.com
newonestop.com
adterium.com
janellrardon.com
crestgood.com
chatterchatterchatter.com
skooppi.fi
sealgrinderpt.com
towelroot.co
janasfokus.com
zuerich-umzug.ch
biketruck.de
iactechnologies.net
artcase.pl
otpusk.zp.ua
lookandseen.com
kristianboennelykke.dk
mahikuchen.com
kryptos72.com
supercarhire.co.uk
acb-gruppe.ch
stathmoulis.gr
globalcompliancenews.com
malzomattalar.com
peninggibadan.co.id
slotspinner.com
galaniuklaw.com
deziplan.ru
toranjtuition.org
loysonbryan.com
physio-lang.de
husetsanitas.dk
ced-elec.com
bescomedical.de
omnicademy.com
angeleyezstripclub.com
sppdstats.com
the3-week-diet.net
furland.ru
carmel-york.com
schlagbohrmaschinetests.com
golfclublandgoednieuwkerk.nl
maryairbnb.wordpress.com
legundschiess.de
schroederschoembs.com
subquercy.fr
chatberlin.de
happylublog.wordpress.com
fitnessblenderstory.com
schulz-moelln.de
justaroundthecornerpetsit.com
clemenfoto.dk
tanatek.com
rino-gmbh.com
soncini.ch
anchelor.com
shortysspices.com
charlottelhanna.com
avisioninthedesert.com
spartamovers.com
cmeow.com
transifer.fr
futurenetworking.com
theatre-embellie.fr
plbinsurance.com
adabible.org
zwemofficial.nl
triplettagaite.fr
fidelitytitleoregon.com
racefietsenblog.nl
keyboardjournal.com
a-zpaperwork.eu
relevantonline.eu
secrets-clubs.co.uk
utilisacteur.fr
ya-elka.ru
paardcentraal.nl
charlesfrancis.photos
floweringsun.org
b3b.ch
photographycreativity.co.uk
pro-gamer.pl
dentallabor-luenen.de
modamarfil.com
alabamaroofingllc.com
noda.com.ua
pajagus.fr
cincinnatiphotocompany.org
nevadaruralhousingstudies.org
eksperdanismanlik.com
kombi-dress.com
gardenpartner.pl
lesyeuxbleus.net
broccolisoep.nl
putzen-reinigen.com
nykfdyrehospital.dk
bringmehope.org
tetameble.pl
k-v-f.de
pinthelook.com
epicjapanart.com
apmollerpension.com
laaisterplakky.nl
protoplay.ca
gatlinburgcottage.com
tchernia-conseil.fr
biblica.com
prodentalblue.com
from02pro.com
brighthillgroup.com
mediabolmong.com
galatee-couture.com
humanviruses.org
katherinealy.com
cookinn.nl
sshomme.com
innovationgames-brabant.nl
limmortelyouth.com
theintellect.edu.pk
triplettabordeaux.fr
tbalp.co.uk
thisprettyhair.com
webforsites.com
parisschool.ru
mind2muscle.nl
laylavalentine.com
allinonecampaign.com
spirello.nl
heimdalbygg.no
kosten-vochtbestrijding.be
brisbaneosteopathic.com.au
margaretmcshane.com
adaduga.info
jayfurnitureco.com
agrifarm.dk
neolaiamedispa.com
redpebblephotography.com
poems-for-the-soul.ch
phukienbepthanhdat.com
forumsittard.nl
hnkns.com
dentalcircle.com
elitkeramika-shop.com.ua
rossomattonecase.it
direitapernambuco.com
catchup-mag.com
pubcon.com
cainlaw-okc.com
napisat-pismo-gubernatoru.ru:443
line-x.co.uk
riffenmattgarage.ch
liveyourheartout.co
yayasanprimaunggul.org
itheroes.dk
babysitting-hk.helpergo.co
skolaprome.eu
hepishopping.com
sytzedevries.com
xn--billigafrgpatroner-stb.se
stoneridgemontessori.com
buerocenter-butzbach-werbemittel.de
topvijesti.net
bluemarinefoundation.com
akwaba-safaris.com
studionumerik.fr
hawthornsretirement.co.uk
mamajenedesigns.com
grancanariaregional.com
campinglaforetdetesse.com
molade.nl
jeanmonti.com
valiant-voice.com
dr-vita.de
altocontatto.net
nicksrock.com
profibersan.com
agenceassemble.fr
c-sprop.com
jalkapuu.net
walterman.es
nrgvalue.com
web865.com
haard-totaal.nl
buzzneakers.com
5pointpt.com
dieetuniversiteit.nl
parksideseniorliving.net
teamsegeln.ch
ciga-france.fr
tellthebell.website
zealcon.ae
ramirezprono.com
ronielyn.com
jimprattmediations.com
mrmac.com
eventosvirtualesexitosos.com
egpu.fr
ikadomus.com
t3brothers.com
masecologicos.com
initconf.com
jlgraphisme.fr
ykobbqchicken.ca
dierenambulancealkmaar.nl
business-basic.de
leansupremegarcinia.net
uci-france.fr
leloupblanc.gr
saint-malo-developpement.fr
lmmont.sk
outstandingminialbums.com
advanced-removals.co.uk
bumbipdeco.site
augen-praxisklinik-rostock.de
vdolg24.online
circuit-diagramz.com
specialtyhomeservicesllc.com
onesynergyinternational.com
fi-institutionalfunds.com
apogeeconseils.fr
yournextshoes.com
campusescalade.com
mrcar.nl
kafkacare.com
metriplica.academy
narca.net
ikzoekgod.be
pvandambv.nl
auto-opel.ro
bellesiniacademy.org
yuanshenghotel.com
sweetz.fr
bonitabeachassociation.com
sambaglow.com
druktemakersheerenveen.nl
renderbox.ch
latableacrepes-meaux.fr
neonodi.be
lovetzuchia.com
cc-experts.de
awaitspain.com
schluesseldienste-hannover.de
cap29010.it
alcye.com
kookooo.com
richardmaybury.co.uk
cesep2019.com
rubyaudiology.com
smartercashsystem.com
bagaholics.in
loparnille.se
cuadc.org
mensemetgesigte.co.za
terraflair.de
triavlete.com
baita.ac
rtc24.com
pixelhealth.net
molinum.pt
randyabrown.com
imajyuku-sozoku.com
rattanwarehouse.co.uk
imagine-entertainment.com
brannbornfastigheter.se
chinowarehousespace.com
go.labibini.ch
tesisatonarim.com
enews-qca.com
ahgarage.com
reygroup.pt
artvark.nl
production-stills.co.uk
directique.com
skinkeeper.li
pankiss.ru
silverbird.dk
raeoflightmusic.com
computer-place.de
nbva.co.uk
volta.plus
jefersonalessandro.com
rename.kz
myplaywin3.com
rentingwell.com
muller.nl
operativadigital.com
perceptdecor.com
greatofficespaces.net
stanleyqualitysystems.com
yourhappyevents.fr
perfectgrin.com
wasnederland.nl
inewsstar.com
arazi.eus
xn--ziinoapte-6ld.ro
gazelle-du-web.com
lumturo.academy
innervisions-id.com
memphishealthandwellness.com
90nguyentuan.com
andermattswisswatches.ch
promus.ca
bayshoreelite.com
mesajjongeren.nl
agencewho-aixenprovence.fr
qwikcoach.com
pazarspor.org.tr
creohn.de
kamin-somnium.de
kuriero.pro
maxcube24.com.ua
expohomes.com
mayprogulka.ru
mgimalta.com
spectamarketingdigital.com.br
alexwenzel.de
fskhjalmar.se
oncarrot.com
pokemonturkiye.com
bg.szczecin.pl
werkzeugtrolley.net
5thactors.com
geitoniatonaggelon.gr
muni.pe
aktivfriskcenter.se
dmlcpa.com
frankgoll.com
devus.de
landgoedspica.nl
handyman-silkeborg.dk
queertube.net
gratiocafeblog.wordpress.com
techybash.com
karmeliterviertel.com
parentsandkids.com
grupoexin10.com
shrinkingplanet.com
hom-frisor.dk
bluelakevision.com
grafikstudio-visuell.de
pxsrl.it
mindsparkescape.com
iexpert99.com
lyricalduniya.com
animation-pro.co.uk
site.markkit.com.br
bluetenreich-brilon.de
mslp.org
licensed-public-adjuster.com
vedsegaard.dk
drvoip.com
satoblog.org
flossmoordental.com
bmw-i-pure-impulse.com
biodentify.ai
iron-mine.ru
redctei.co
bjornvanvulpen.nl
breakluckrecords.com
fta-media.com
domaine-des-pothiers.com
invela.dk
cymru.futbol
hinotruckwreckers.com.au
profiz.com
auberives-sur-vareze.fr
glende-pflanzenparadies.de
advancedeyecare.com
fanuli.com.au
bychowo.pl
catering.com
111firstdelray.com
mercadodelrio.com
interlinkone.com
greeneyetattoo.com
rapid5kloan.org
hensleymarketing.com
stage-infirmier.fr
ebible.co
lashandbrowenvy.com
sharonalbrightdds.com
collegetennis.info
photonag.com
ravage-webzine.nl
spacebel.be
johnkoen.com
unexplored.gr
thegrinningmanmusical.com
martha-frets-ceramics.nl
basindentistry.com
scietech.academy
wademurray.com
tzn.nu
bratek-immobilien.de
letterscan.de
n-newmedia.de
gta-jjb.fr
bodymindchallenger.com
veggienessa.com
suonenjoen.fi
dinedrinkdetroit.com
acumenconsultingcompany.com
hameghlim.com
quitescorting.com
dcc-eu.com
solidhosting.nl
ceocenters.com
hospitalitytrainingsolutions.co.uk
amyandzac.com
radishallgood.com
lgiwines.com
factorywizuk.com
dibli.store
lollachiro.com
goodherbalhealth.com
dinecorp.com
stitch-n-bitch.com
kdbrh.com
wribrazil.com
bubbalucious.com
rechtenplicht.be
aquacheck.co.za
buonabitare.com
framemyballs.com
campusce.com
datatri.be
eyedoctordallas.com
holocine.de
lisa-poncon.fr
designimage.ae
descargandoprogramas.com
jdscenter.com
blucamp.com
liepertgrafikweb.at
beandrivingschool.com.au
ludoil.it
acibademmobil.com.tr
brunoimmobilier.com
jglconsultancy.com
ingresosextras.online
wirmuessenreden.com
sachainchiuk.com
airvapourbarrier.com
lattalvor.com
powershell.su
advance-refle.com
housesofwa.com
blueridgeheritage.com
advesa.com
jaaphoekzema.nl
ox-home.com
sunsolutions.es
ufovidmag.com
markseymourphotography.co.uk
wrinstitute.org
focuskontur.com
comoserescritor.com
blavait.fr
evsynthacademy.org
pilotgreen.com
leijstrom.com
janmorgenstern.com
gaearoyals.com
nalliasmali.net
2020hindsight.info
scentedlair.com
greenrider.nl
lsngroupe.com
orchardbrickwork.com
rokthetalk.com
prometeyagro.com.ua
ijsselbeton.nl
kryddersnapsen.dk
baumfinancialservices.com
mjk.digital
corporacionrr.com
o2o-academy.com
manzel.tn
smartworkplaza.com
christopherhannan.com
carsten.sparen-it.de
peppergreenfarmcatering.com.au
reputation-medical.online
christianscholz.de
delegationhub.com
hostingbangladesh.net
nauticmarine.dk
ocduiblog.com
jakubrybak.com
teutoradio.de
zaczytana.com
zumrutkuyutemel.com
duthler.nl
dayenne-styling.nl
cleanroomequipment.ie
naukaip.ru
activeterroristwarningcompany.com
breathebettertolivebetter.com
tastevirginia.com
awag-blog.de
watchsale.biz
whoopingcrane.com
ilovefullcircle.com
bulyginnikitav.000webhostapp.com
saboboxtel.uk
zinnystar.com
factoriareloj.com
internestdigital.com
cops4causes.org
affligemsehondenschool.be
achetrabalhos.com
curtsdiscountguns.com
lidkopingsnytt.nu
cac2040.com
khtrx.com
barbaramcfadyenjewelry.com
agora-collectivites.com
nuohous.com
agendatwentytwenty.com
goddardleadership.org
fascaonline.com
opt4cdi.com
domilivefurniture.com
amelielecompte.wordpress.com
burg-zelem.de
mustangmarketinggroup.com
strauchs-wanderlust.info
aidanpublishing.co.uk
johnsonweekly.com
bavovrienden.nl
skyscanner.ro
jobstomoveamerica.org
etgdogz.de
abulanov.com
nourella.com
ncjc.ca
mrkluttz.com
ilveshistoria.com
frameshift.it
eurethicsport.eu
paradigmlandscape.com
jmmartinezilustrador.com
ninjaki.com
unboxtherapy.site
enactusnhlstenden.com
afbudsrejserallinclusive.dk
deduktia.fi
endlessrealms.net
fire-space.com
qrs-international.com
tieronechic.com
nutriwell.com.sg
trainiumacademy.com
kerstliedjeszingen.nl
bendel-partner.de
placermonticello.com
andrealuchesi.it
professionetata.com
happycatering.de
rolleepollee.com
thestudio.academy
linearete.com
magnetvisual.com
richardiv.com
baptistdistinctives.org
stringnosis.academy
vitoriaecoturismo.com.br
fbmagazine.ru
agriturismocastagneto.it
xrresources.com
atrgroup.it
premier-iowa.com
pays-saint-flour.fr
o90.dk
four-ways.com
scholarquotes.com
the5thquestion.com
shortsalemap.com
hostaletdelsindians.es
michaelfiegel.com
drbenveniste.com
arabianmice.com
the-cupboard.co.uk
benchbiz.com
cyberpromote.de
edvestors.org
rentsportsequip.com
fann.ru
nexstagefinancial.com
bookingwheel.com
dreamvoiceclub.org
jameswilliamspainting.com
ownidentity.com
thenalpa.com
denverwynkoopdentist.com
gbk-tp1.de
animalfood-online.de
hypogenforensic.com
parseport.com
azerbaycanas.com
mediahub.co.nz
julielusktherapy.com
topautoinsurers.net
bertbutter.nl
distrifresh.com
guohedd.com
amco.net.au
teethinadaydentalimplants.com
kemtron.fr
sbit.ag
wg-heiligenstadt.de
rizplakatjaya.com
-
net
true
-
pid
5
-
prc
wordpad.exe
outlook.exe
tbirdconfig.exe
agntsvc.exe
thebat.exe
mydesktopservice.exe
sqbcoreservice.exe
thunderbird.exe
ocomm.exe
excel.exe
thebat64.exe
steam.exe
xfssvccon.exe
firefoxconfig.exe
sqlagent.exe
ocssd.exe
mydesktopqos.exe
msaccess.exe
isqlplussvc.exe
mspub.exe
winword.exe
sqlbrowser.exe
dbeng50.exe
sqlservr.exe
oracle.exe
encsvc.exe
powerpnt.exe
dbsnmp.exe
infopath.exe
ocautoupds.exe
mysqld_opt.exe
visio.exe
msftesql.exe
mysqld_nt.exe
synctime.exe
sqlwriter.exe
mysqld.exe
onenote.exe
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
367
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exedescription ioc process File opened for modification \??\c:\users\admin\pictures\ResizeRepair.tiff bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File renamed C:\Users\Admin\Pictures\CopyMove.png => \??\c:\users\admin\pictures\CopyMove.png.lf6836a7ng bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File renamed C:\Users\Admin\Pictures\JoinInvoke.crw => \??\c:\users\admin\pictures\JoinInvoke.crw.lf6836a7ng bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File renamed C:\Users\Admin\Pictures\RegisterUse.tif => \??\c:\users\admin\pictures\RegisterUse.tif.lf6836a7ng bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File renamed C:\Users\Admin\Pictures\SkipAdd.tif => \??\c:\users\admin\pictures\SkipAdd.tif.lf6836a7ng bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File renamed C:\Users\Admin\Pictures\ResizeRepair.tiff => \??\c:\users\admin\pictures\ResizeRepair.tiff.lf6836a7ng bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File renamed C:\Users\Admin\Pictures\TraceCopy.raw => \??\c:\users\admin\pictures\TraceCopy.raw.lf6836a7ng bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exedescription ioc process File opened (read-only) \??\A: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\L: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\N: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\O: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\P: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\V: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\K: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\M: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\Q: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\S: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\U: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\Z: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\D: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\F: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\I: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\R: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\T: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\W: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\X: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\Y: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\B: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\E: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\G: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\H: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened (read-only) \??\J: bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\77s41.bmp" bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe -
Drops file in Program Files directory 35 IoCs
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exedescription ioc process File opened for modification \??\c:\program files\ApproveOptimize.emf bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\OpenConnect.M2T bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ResolveReceive.wvx bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File created \??\c:\program files (x86)\d60dff40.lock bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\CloseStep.edrwx bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\EnableSync.rm bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\RenameStart.mp2 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File created \??\c:\program files (x86)\lf6836a7ng-readme.txt bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\BackupDeny.gif bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\CheckpointApprove.pcx bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\JoinSearch.wmf bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\MergeRegister.png bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\RepairRestore.mpeg bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\SyncSkip.ttc bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ExportRevoke.vstm bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\DisableExport.ttc bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\EditLimit.vdx bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\EnableClear.rtf bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ReceiveRestart.jpeg bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\WaitResolve.midi bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\AddDisable.mpe bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\CompareEnable.cfg bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\StartReset.xml bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ApproveRequest.xlt bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\CheckpointResolve.xlsm bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ClearConvertTo.contact bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\RegisterSwitch.vssm bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\RestartExport.dib bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File created \??\c:\program files\lf6836a7ng-readme.txt bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File created \??\c:\program files\d60dff40.lock bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\BackupMerge.pps bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\DebugLimit.wax bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ReadMerge.otf bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\ReceiveMove.pptm bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification \??\c:\program files\UnregisterOpen.midi bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe -
Drops file in Windows directory 64 IoCs
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exedescription ioc process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lsa-minwin_31bf3856ad364e35_10.0.19041.1_none_f35caf2131abed9a.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_10.0.19041.1_de-de_6b17c8d06620d760.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1_none_b555e41d4684ddec.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_10.0.19041.1_de-de_d431d440f6bef2b0_rasautou.exe.mui_55686a97 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_2d3b6ea159ff4dae_ncprov.dll.mui_40240de1 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-dns-client-minwin_31bf3856ad364e35_10.0.19041.1266_none_14a631980cb7b20a.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-t..services-publicapis_31bf3856ad364e35_10.0.19041.546_none_af7edcb05985488d.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lua.resources_31bf3856ad364e35_10.0.19041.1_en-us_a47bd7860bac9950.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_b641f2883587d6aa_axinstui.exe.mui_aea34130 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.906_sr-..-rs_b2c524b47939e030_msimsg.dll.mui_72e8994f bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fa84bcd97ed5458c_vds.exe.mui_2268d934 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-eventlog.resources_31bf3856ad364e35_10.0.19041.1_es-es_53c339fa60537c35.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.19041.1_en-us_313221c95b98e24b.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_et-ee_5acfcbd46d6163cc_comctl32.dll.mui_0da4e682 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_d88727f57b0f135a_scdeviceenum.dll.mui_815e7662 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.19041.1_de-de_af1113fd9cfe31c0_vdsutil.dll.mui_0caf9b0e bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_pt-br_ccfd6386dfdf0d78.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_5af0d35f5d5822e9_apphelp.dll.mui_59096153 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_da-dk_02d56f028cfc5e3f.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-time-service_31bf3856ad364e35_10.0.19041.546_none_66a0aaafcc19efa6_w32time.dll_2a7540a9 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ntosext_31bf3856ad364e35_10.0.19041.1_none_89e4438cceba3f44_ntosext.sys_e9e096c6 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.19041.1_en-us_313221c95b98e24b_iprtrmgr.dll.mui_eb023b92 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rpc-kernel_31bf3856ad364e35_10.0.19041.1288_none_33d42a5f37165008_msrpc.sys_2e252236 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..turalauthentication_31bf3856ad364e35_10.0.19041.153_none_d1a66a77fe3b57f3.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-win32kbase.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_79327b950c3ce978_win32kbase.sys.mui_07d441e9 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_en-us_8ab89bbe670645a7_mofd.dll.mui_793ef98d bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-etw-ese_31bf3856ad364e35_10.0.19041.1_none_854be02225b9bfa7.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.19041.1_none_3947da6a963cb0d8_8514sysr.fon_d6a097a2 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.906_sl-si_0c94bc70042838ff_msimsg.dll.mui_72e8994f bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_be1670627d88fc7f.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-kernel32_31bf3856ad364e35_10.0.19041.1202_none_12d2bc7d3fe2a244_kernel32.dll_ef9eca7e bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_a5f5f155cd89b58d.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-netio-infrastructure_31bf3856ad364e35_10.0.19041.1_none_0c8c7a5954ab0dda.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_10.0.19041.1_de-de_d942b0e37da37953.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_10.0.19041.1_en-us_fb569e49a9e4cc22.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.19041.1_en-us_2c89c78983615cee_winload.efi.mui_35ee487d bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..eservices.resources_31bf3856ad364e35_10.0.19041.1_en-us_8f48a1e2598394c7_sti.dll.mui_00a4f15b bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_cs-cz_659b8edb96b66240_comctl32.dll.mui_0da4e682 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-winlogon.resources_31bf3856ad364e35_10.0.19041.1_it-it_0d9468386d9ee63a_winlogon.exe.mui_3280fc46 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_en-us_8ab89bbe670645a7_wmiutils.dll.mui_42583eaf bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_fr-fr_6de3ffe5662417e0_comctl32.dll.mui_0da4e682 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_da-dk_2544c1cd8276af7a_comctl32.dll.mui_0da4e682 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-userpowermanagement_31bf3856ad364e35_10.0.19041.546_none_8b678fb390086be3_powrprof.dll_480be757 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ncrypt-dll_31bf3856ad364e35_10.0.19041.662_none_3bbdfd78507f28c7_ncrypt.dll_0f36c580 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_sr-..-rs_06d2e219c8bbb7bf.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..-webauthn.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_05fb19d338e44a8b.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..n-cmdline.resources_31bf3856ad364e35_10.0.19041.1_it-it_12393e2b3711dbc6_dsregcmd.exe.mui_8ce2c638 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-msauditevtlog_31bf3856ad364e35_10.0.19041.610_none_afaadb8f0b8a9278_msobjs.dll_052c8a60 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-partitionmanager_31bf3856ad364e35_10.0.19041.1110_none_56683e3b6f9cb252.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-r..intmapper.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_430caa488be6f8ed_rpcepmap.dll.mui_349798e1 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-xmllite_31bf3856ad364e35_10.0.19041.546_none_6734c593021dd8ae.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_3285a4fbe26a9651.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..ndactivitymoderator_31bf3856ad364e35_10.0.19041.1_none_959a3e1eebb4b6e0.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_it-it_21b80f3a6591f527_mofd.dll.mui_793ef98d bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-security-spp.resources_31bf3856ad364e35_10.0.19041.1_en-us_52b90495d63821ca.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid_31bf3856ad364e35_10.0.19041.1202_none_cc0c3d35675da3a1_appidpolicyconverter.exe_83972af0 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-com-base.resources_31bf3856ad364e35_10.0.19041.1_en-us_6e70c9a2dd0624b1.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6acc9b918cd7cb00.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_el-gr_78f993560d286ca3.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-eventlog.resources_31bf3856ad364e35_10.0.19041.1_en-us_53f7dd16602c8a90_wevtsvc.dll.mui_f41bf7b7 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_es-es_61100044695b873d.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_windows-gaming-xbox..e-service-component_31bf3856ad364e35_10.0.19041.789_none_3136b8d712da0334.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ldap-client_31bf3856ad364e35_10.0.19041.546_none_d1358e97b53afe52.manifest bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.19041.1237_none_a9b815907b71fe1a_wowreg32.exe_94fc2d06 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exemsedge.exemsedge.exemsedge.exepid process 1368 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe 1368 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe 2972 msedge.exe 2972 msedge.exe 2484 msedge.exe 2484 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exemsedge.exemsedge.exedescription pid process target process PID 1368 wrote to memory of 2388 1368 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe cmd.exe PID 1368 wrote to memory of 2388 1368 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe cmd.exe PID 1368 wrote to memory of 2388 1368 bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe cmd.exe PID 1832 wrote to memory of 1748 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 1748 1832 msedge.exe msedge.exe PID 3348 wrote to memory of 3160 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 3160 3348 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 1832 wrote to memory of 4752 1832 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 4788 3348 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe"C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\SetRead.shtml1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf8,0x124,0x7fff25b746f8,0x7fff25b74708,0x7fff25b747182⤵PID:3160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:2044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵PID:3136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,7913632502706514171,511067195854747131,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:4780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\SetRead.shtml1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff25b746f8,0x7fff25b74708,0x7fff25b747182⤵PID:1748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1937330518404868480,9131397331278134529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,1937330518404868480,9131397331278134529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5be343d8f8a119b42eeb26b957040410f
SHA1e163b539b0b6ea557eb6c386baa787a30730042b
SHA2563731be50e2445f5385c94571f202dc2a7fce2d40f653a0a57e2d5f849bde3259
SHA512243157fdae77645d822d59e8dfbfed77c61625574562e2dfbb4a63153c96894f96d8f89a9674bd80567c635754008634e276abd8fce01cea67dc91d6fb35e6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize442B
MD593334dbcd984247c4beee9df138efaa1
SHA127dfac2cb97b96ac7fe4ce139bd1f603fb10d046
SHA256f0da4a6802c2913994561450eb6b2b1004a695e63f650f31520f596aa5f16961
SHA51286b3747e2bcd15672e6cfb776b6b09dde52178ca743087521d325d1d244a92bfe8c282246a9b5e48c07856db3015fc41a501b87d29948b413f28a3b259187b4e
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD571b657795f1d63721f304fcf46915016
SHA1d2cabf753a2b8888642a3a26878e7f47784153b2
SHA256f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28
SHA512dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20
-
Filesize
152B
MD571b657795f1d63721f304fcf46915016
SHA1d2cabf753a2b8888642a3a26878e7f47784153b2
SHA256f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28
SHA512dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20
-
Filesize
2KB
MD50ebd8e7b6e3f2337643f1ace8085fafb
SHA185697094ce2cd9b23045e38b7444f50b9add2757
SHA25631004332f2d8ed3bbc36217cd59a05aac700d24263591e2f75124f51546b6842
SHA5125f6c71af18c5c13835d7400bacb85eec8754107a1552aa41717b5ba1666529c7b03b4ec7f322ad4e12cc91bb2cf1220c52487d68d4f81f8ca4e487b99b18c329
-
Filesize
9KB
MD5274037810eab3ab7386510c52b16d6e8
SHA1da6881b666aeae4ca901331936cb5989a325dd30
SHA256681a6bb4255088909a4178383719911c9d0f7b1cc1f1caadd526971779849c4b
SHA5126e377595b6102bfd977ed44233d9c6f3d6a0391f449ee27c316c37edd622a58029d3feba0fec96707ea3e5b5b16f47d37e265ec117da707640ea6a1d810273a1
-
Filesize
2KB
MD50ebd8e7b6e3f2337643f1ace8085fafb
SHA185697094ce2cd9b23045e38b7444f50b9add2757
SHA25631004332f2d8ed3bbc36217cd59a05aac700d24263591e2f75124f51546b6842
SHA5125f6c71af18c5c13835d7400bacb85eec8754107a1552aa41717b5ba1666529c7b03b4ec7f322ad4e12cc91bb2cf1220c52487d68d4f81f8ca4e487b99b18c329
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e