Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2024 20:14

General

  • Target

    https://github.com/pankoza2-pl/malwaredatabase-old

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 4 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/pankoza2-pl/malwaredatabase-old
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5b119758,0x7ffd5b119768,0x7ffd5b119778
      2⤵
        PID:4728
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1248 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:2
        2⤵
          PID:2852
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
          2⤵
            PID:2896
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
            2⤵
              PID:1120
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:1
              2⤵
                PID:4668
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:1
                2⤵
                  PID:1744
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
                  2⤵
                    PID:3136
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
                    2⤵
                      PID:1624
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
                      2⤵
                        PID:4084
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
                        2⤵
                          PID:2780
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3988 --field-trial-handle=1884,i,6456304776686592313,7331038842144053258,131072 /prefetch:8
                          2⤵
                            PID:2912
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:1424
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:3792
                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Covid29 Ransomware.zip\TrojanRansomCovid29.exe
                              "C:\Users\Admin\AppData\Local\Temp\Temp1_Covid29 Ransomware.zip\TrojanRansomCovid29.exe"
                              1⤵
                                PID:4260
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6BD.tmp\TrojanRansomCovid29.bat" "
                                  2⤵
                                  • Checks computer location settings
                                  • Modifies registry class
                                  PID:372
                                  • C:\Windows\SysWOW64\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6BD.tmp\fakeerror.vbs"
                                    3⤵
                                      PID:4684
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping localhost -n 2
                                      3⤵
                                      • Runs ping.exe
                                      PID:1148
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                      3⤵
                                      • Modifies registry key
                                      PID:4056
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f
                                      3⤵
                                      • Modifies registry key
                                      PID:2032
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f
                                      3⤵
                                      • Modifies registry key
                                      PID:2088
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f
                                      3⤵
                                      • Modifies registry key
                                      PID:1288
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f
                                      3⤵
                                      • Modifies registry key
                                      PID:4204
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
                                      3⤵
                                      • UAC bypass
                                      • Modifies registry key
                                      PID:5112
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                      3⤵
                                      • UAC bypass
                                      • Modifies registry key
                                      PID:1556
                                    • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\mbr.exe
                                      mbr.exe
                                      3⤵
                                      • Executes dropped EXE
                                      • Writes to the Master Boot Record (MBR)
                                      PID:1552
                                    • C:\Windows\SysWOW64\shutdown.exe
                                      shutdown /r /t 300 /c "5 minutes to pay until you lose your data and system forever"
                                      3⤵
                                        PID:2400
                                      • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\Cov29Cry.exe
                                        Cov29Cry.exe
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2476
                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                          "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                          4⤵
                                          • Checks computer location settings
                                          • Drops startup file
                                          • Executes dropped EXE
                                          • Drops desktop.ini file(s)
                                          • Sets desktop wallpaper using registry
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1860
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
                                            5⤵
                                              PID:4052
                                              • C:\Windows\system32\vssadmin.exe
                                                vssadmin delete shadows /all /quiet
                                                6⤵
                                                • Interacts with shadow copies
                                                PID:2864
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic shadowcopy delete
                                                6⤵
                                                  PID:2684
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
                                                5⤵
                                                  PID:1880
                                                  • C:\Windows\system32\bcdedit.exe
                                                    bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                    6⤵
                                                    • Modifies boot configuration data using bcdedit
                                                    PID:1924
                                                  • C:\Windows\system32\bcdedit.exe
                                                    bcdedit /set {default} recoveryenabled no
                                                    6⤵
                                                    • Modifies boot configuration data using bcdedit
                                                    PID:4964
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                                                  5⤵
                                                    PID:2380
                                                    • C:\Windows\system32\wbadmin.exe
                                                      wbadmin delete catalog -quiet
                                                      6⤵
                                                      • Deletes backup catalog
                                                      PID:1440
                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\covid29-is-here.txt
                                                    5⤵
                                                    • Suspicious use of FindShellTrayWindow
                                                    PID:3728
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping localhost -n 9
                                                3⤵
                                                • Runs ping.exe
                                                PID:3052
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /f /im explorer.exe
                                                3⤵
                                                • Kills process with taskkill
                                                PID:5060
                                              • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\Cov29LockScreen.exe
                                                Cov29LockScreen.exe
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1572
                                          • C:\Windows\system32\vssvc.exe
                                            C:\Windows\system32\vssvc.exe
                                            1⤵
                                              PID:2216
                                            • C:\Windows\system32\wbengine.exe
                                              "C:\Windows\system32\wbengine.exe"
                                              1⤵
                                                PID:4764
                                              • C:\Windows\System32\vdsldr.exe
                                                C:\Windows\System32\vdsldr.exe -Embedding
                                                1⤵
                                                  PID:3988
                                                • C:\Windows\System32\vds.exe
                                                  C:\Windows\System32\vds.exe
                                                  1⤵
                                                  • Checks SCSI registry key(s)
                                                  PID:3608

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  0d2772aa363e57902ad20266a9140cb4

                                                  SHA1

                                                  84741805828a6e5e8d0c674d68fb8f5340827ae3

                                                  SHA256

                                                  b8645034c3a94e04c2dc93f7ba5250081687a89f186b2f25cc7477e7081820a4

                                                  SHA512

                                                  ec6c10fab9fc7b2f479f2e72fe985c14e8f509f32d3aa1e69a0174853f0dfefc46c237d2e0fa61638e2f46d3e70816a32d08dc6731d349e8889870e32f53e792

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  a69ad969f9fdd8f1eddff38aa681dd8c

                                                  SHA1

                                                  c7a89593120a65a0526d177fd6f6863c10717777

                                                  SHA256

                                                  db5395cb98919bfaef147cf013ec595cb055d8380ff9adbefae3cf113082d1ee

                                                  SHA512

                                                  49033abda2dbdc0e3259bc87eaf95c7aad55ae93a0f4b6019593b1a34ade94ee5c952203bf852a95c2351197a97b29f4b8b9525b5c12adaeb9ef64f6f25a41f7

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  24a3f7a482a04439a1b92824fccac145

                                                  SHA1

                                                  6c1259fbad48239cbac0dc673ca8e0281617ab89

                                                  SHA256

                                                  7fbaa3e41b32fe370e36764d1e6811b1f16e6d2e6bacac9a6b2e424b36eb772c

                                                  SHA512

                                                  d59c8fd2d2d97ff0ef92ed19236268b68894b2ec8c5a7fc6d1e8d7bd4d7dedb41a9a65c114be668368924151b23e842fd27c972d63aa27f6c9f07a972b0b4c95

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  9e1565913634c898c6288f679c7472c1

                                                  SHA1

                                                  d570e72cfff2898c06cb8d12feba70cd52a170ff

                                                  SHA256

                                                  172cda7df5084709ecf19b37514f1085ce0692e060cbec1d6dee7a4d3585d26f

                                                  SHA512

                                                  163ba4f5dfb668c35d2a91ffd75a8d3e649602fbead431447b112e389efd6ddb92956d9fd50524444aba5420b248ca79d5d8ccc79dc4c669dd917cfb8c63d477

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  a8809129dc9c9b83904f62e66551a508

                                                  SHA1

                                                  595bc1eca268d4a202bc3c620e6626fb8d50a35c

                                                  SHA256

                                                  6b9ab3cbd62448665247b0801343f899b1efad60e94c85574b2bc0c2835a829f

                                                  SHA512

                                                  596e6a2eaa95fc97ce0d0e4e3f11ab43baab37cd682b41aa0e30634d2cdb5cc32ae06c80cf00d30f460dbff46605375a64ee882c2c50f277a0240c1d38c3e3cd

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  ca556bbbe570cab3c0192e9660113b11

                                                  SHA1

                                                  d6624c421ee6d883ee9516f7ff767d839beda0be

                                                  SHA256

                                                  e6dc60ccf586e6b810a84eaf7fd4a42bc8e1bbccdbe3cc6a3fd133b42ff57e81

                                                  SHA512

                                                  c8397bcde427358fa55b02a6b909d44d2005e39feba3cbd4d00108e59ce7a89e87eeb74150b184d26d69b7f8153a1d95c6d42a87e78ba476e33c14ceb7a0b00d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  c02cc6e34cb4fd7aa0cc34cbd30cf8d5

                                                  SHA1

                                                  91dc18cb1d155cb152383acfb3d48140cf394d8e

                                                  SHA256

                                                  0cd19253af6d6a533dc871db8353df2eaaa954d9b2025b4dfc7fb86af6c88070

                                                  SHA512

                                                  c949e9fe5b5a8ef06240dbef4eed3295e4a69d7c3a5cbffb4d56ac8e2e3c3294df744d19a5bd8ae17511101bef9e3efda54c8ecdf6e6167c06de3598aed52096

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  874B

                                                  MD5

                                                  38781d5e5bbb31b78305d0125c258b21

                                                  SHA1

                                                  618ed9aa58745e71de498f33d058f3476f668e6b

                                                  SHA256

                                                  9b908f31da8c3aa19b98f45487fb15c625f07aee8897b3014ccdd2413549ea6b

                                                  SHA512

                                                  45aff08519094af4c59b8eeb02e153ca2d3e01c8ff893b2b28261ed80ca10238f43fc5cb2502a0ad03e539e933b72ff79190cdd0c6af64094c4dbba8a08e285f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  eca2822ba038c3f1ed5e86458d4dda2c

                                                  SHA1

                                                  0e89af26a5d9b52a6abedb03b734ca3338923445

                                                  SHA256

                                                  62ab4106e06c706a1fceebbdb15453dd8ed2e4dc1050e5b01dc5bbe7888790bd

                                                  SHA512

                                                  bd6f833caf67330e7fc19106b1f90d50c9955c88f41dce396409f22e36ae7e832818df122a44bdf3e32cb120a04a740395afdeded28d9fb9697fd0f501ee157a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  499267a5d96435b017bd32dc3019ff28

                                                  SHA1

                                                  587e9a765d1c863a2e39c50590b49f832a8c22a0

                                                  SHA256

                                                  620fa842a1f150c3a6e16cf3f3300a3160bef3b94d36f8f4c1f46916dd103a1f

                                                  SHA512

                                                  507dcfe215a1b789266b3355e5b3b9b747bb64d1a379b4a1f83e7ebe3f4c7ac9c7e9161c58a9a517ddea7dae1a8622179fe2ac3698bb829bb27e7634deee559c

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  49bdb583f66fd82a0ba3de1695e53aea

                                                  SHA1

                                                  7dfe6646dec1dff134600d5a4b133c4b246f4243

                                                  SHA256

                                                  28a2ba806d5f53026bae5196c492b8bffbd28670a2c0acee2f171add2af2a249

                                                  SHA512

                                                  953bcd21389f642487aee860968ce8384dd1e31e250e2c23f79290957193f12ec5d350e0624799400528c3442af7fd43f0cc14b4b7e917aa6d6275f5fa908c47

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  ea5b35c303767792278e3d4111b06b8c

                                                  SHA1

                                                  aacb35a83cd9672702eda0a9794bbf4376e84707

                                                  SHA256

                                                  05d894c4a38753270fcb28fed59a00905f5bb77501f4a9d94277d34769c41377

                                                  SHA512

                                                  2e8b719b07516e82a512a2ddf81835796613354f9115f74ec83dfe2b76f84283da1a773ae27e2e70ec7a732a3615028186de4617dd4a37706a4bac5b1dd9c846

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  931038d2cdcd49c063e882a19ddf588f

                                                  SHA1

                                                  cc180ed504af2cf5822ed7c8cbe3c0f59af10b35

                                                  SHA256

                                                  cad3a0d467ab853aee44d6fc20d486d2ab6a52e64b2a336d59ed0ae557f8a2fb

                                                  SHA512

                                                  22046f19034f00562c25d6db5713fc4d4a7576b4daa9904e180197306644258287d81996a13e246f2bba001a16cebe093b1c6b5cd59963494670572be43b75a5

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  e6f9be950b3b9fb1a1845708e7e9d023

                                                  SHA1

                                                  585df319bcc9c8e057f7a736df14770cfacb8dbd

                                                  SHA256

                                                  0f3021531c43840392d7a233b2579e4fe0bcbd9f1db77f3a740c113b0a63627e

                                                  SHA512

                                                  aa5e1317c0c704d7acfabde135339c10d8081cfac99176e8a2abb7e557b71945bcce4eba07253ee695f1f09de1996fb6ab1afba2f27956f259686f9b5618438e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  114KB

                                                  MD5

                                                  73a3e33cb1636bd4f6b33f00084b42af

                                                  SHA1

                                                  65450cff1949a2b2ab5283fbe5b89cc4a71e66d8

                                                  SHA256

                                                  1f9146fa112cfa65efb6b18b97fef572a5511a587bc5e053a7f2912f99192d34

                                                  SHA512

                                                  c1420109dfbf7b26c72546dfd10a8d3df715aae72afa7f8f38db73b598c88e8df5e9a446501f78cc6157727caaa6b6b623543d6f4552d5768ef3fbcca67fb478

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                  Filesize

                                                  98KB

                                                  MD5

                                                  be0904bc72c377fbe0ad7d4ff1d62578

                                                  SHA1

                                                  95bdd1d295a8bd6daa68ff845b96fedc4cb3fc8f

                                                  SHA256

                                                  9a7419fed8b78bcb1b53b7bcc1aa159a88351540f06087192667653ad04c7df1

                                                  SHA512

                                                  257fbd26ddf105a20d42cf1c31f03647d4a0278284355d63bc7131c4a42c00a0deb8efa9dc350bc61eeec70a2fea9c093b3b26411acae6f609ae38ca2e94d2da

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                  Filesize

                                                  106KB

                                                  MD5

                                                  dfb4c641e27a3f5a73fd69f578d5851d

                                                  SHA1

                                                  aadfb39c88019847b79b3de73bfafb2b09bf7d95

                                                  SHA256

                                                  078e363f8387b9e7d2d440aded8367e5549eafd669423d1691445e6e2f4d2d44

                                                  SHA512

                                                  a7f9289e6f57a320b98d0f067669d03ff0c3279755a8dee67212a1eb76e3df8b411b60fcbe05fa8934de4265222e4618185f38102da56f3d4655a497bed2919d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe586d5b.TMP

                                                  Filesize

                                                  97KB

                                                  MD5

                                                  e8baafbac3ddf0ee14023d1a06f70bf2

                                                  SHA1

                                                  ff669a78b2b4a0cb389e49a1a98304382ad33eae

                                                  SHA256

                                                  9eeda6fcd78a2ec4967fdf9dc1df3eed38cc8d8ee17a36b22ba36186a91843e3

                                                  SHA512

                                                  36b5cd7e2cca884dba94e795a05af43244a2b3a474a22a5573765308d70fa2da1e43246b4be3e85513adcc4b43ddd228bf426ffb6d920cc79ef2fad91ccb52e8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\Cov29Cry.exe

                                                  Filesize

                                                  103KB

                                                  MD5

                                                  8bcd083e16af6c15e14520d5a0bd7e6a

                                                  SHA1

                                                  c4d2f35d1fdb295db887f31bbc9237ac9263d782

                                                  SHA256

                                                  b4f78ff66dc3f5f8ddd694166e6b596d533830792f9b5f1634d3f5f17d6a884a

                                                  SHA512

                                                  35999577be0626b50eeab65b493d48af2ab42b699f7241d2780647bf7d72069216d99f5f708337a109e79b9c9229613b8341f44c6d96245fd1f3ac9f05814d6a

                                                • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\Cov29LockScreen.exe

                                                  Filesize

                                                  48KB

                                                  MD5

                                                  f724c6da46dc54e6737db821f9b62d77

                                                  SHA1

                                                  e35d5587326c61f4d7abd75f2f0fc1251b961977

                                                  SHA256

                                                  6cde4a9f109ae5473703c4f5962f43024d71d2138cbd889223283e7b71e5911c

                                                  SHA512

                                                  6f83dd7821828771a9cae34881c611522f6b5a567f5832f9e4b9b4b59bf495f40ad78678bd86cba59d32ea8644b4aa5f052552774fea142b9d6da625b55b6afc

                                                • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\TrojanRansomCovid29.bat

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  57f0432c8e31d4ff4da7962db27ef4e8

                                                  SHA1

                                                  d5023b3123c0b7fae683588ac0480cd2731a0c5e

                                                  SHA256

                                                  b82e64e533789c639d8e193b78e06fc028ea227f55d7568865120be080179afc

                                                  SHA512

                                                  bc082486503a95f8e2ce7689d31423386a03054c5e8e20e61250ca7b7a701e98489f5932eba4837e05ec935057f18633798a10f6f84573a95fcf086ee7cabcbf

                                                • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\fakeerror.vbs

                                                  Filesize

                                                  144B

                                                  MD5

                                                  c0437fe3a53e181c5e904f2d13431718

                                                  SHA1

                                                  44f9547e7259a7fb4fe718e42e499371aa188ab6

                                                  SHA256

                                                  f2571f03eb9d5ee4dca29a8fec1317ded02973c5dd233d582f56cebe98544f22

                                                  SHA512

                                                  a6b488fc74dc69fc4227f92a06deb297d19cd54b0e07659f9c9a76ce15d1ef1d8fa4d607acdd03d30d3e2be2a0f59503e27fc95f03f3006e137fa2f92825e7e3

                                                • C:\Users\Admin\AppData\Local\Temp\6BD.tmp\mbr.exe.danger

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  35af6068d91ba1cc6ce21b461f242f94

                                                  SHA1

                                                  cb054789ff03aa1617a6f5741ad53e4598184ffa

                                                  SHA256

                                                  9ac99df89c676a55b48de00384506f4c232c75956b1e465f7fe437266002655e

                                                  SHA512

                                                  136e3066c6e44af30691bcd76d9af304af0edf69f350211cf74d6713c4c952817a551757194b71c3b49ac3f87a6f0aa88fb80eb1e770d0f0dd82b29bfce80169

                                                • C:\Users\Admin\Desktop\covid29-is-here.txt

                                                  Filesize

                                                  861B

                                                  MD5

                                                  c53dee51c26d1d759667c25918d3ed10

                                                  SHA1

                                                  da194c2de15b232811ba9d43a46194d9729507f0

                                                  SHA256

                                                  dd5b3d185ae1809407e7822de4fced945115b48cc33b2950a8da9ebd77a68c52

                                                  SHA512

                                                  da41cef03f1b5f21a1fca2cfbf1b2b180c261a75d391be3a1ba36e8d4d4aefab8db024391bbee06b99de0cb0b8eb8c89f2a304c27e20c0af171b77db33b2d12c

                                                • C:\Users\Admin\Downloads\Covid29 Ransomware.zip

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  272d3e458250acd2ea839eb24b427ce5

                                                  SHA1

                                                  fae7194da5c969f2d8220ed9250aa1de7bf56609

                                                  SHA256

                                                  bbb5c6b4f85c81a323d11d34629776e99ca40e983c5ce0d0a3d540addb1c2fe3

                                                  SHA512

                                                  d05bb280775515b6eedf717f88d63ed11edbaae01321ec593ecc0725b348e9a0caacf7ebcd2c25a6e0dc79b2cdae127df5aa380b48480332a6f5cd2b32d4e55c

                                                • memory/1552-363-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                  Filesize

                                                  864KB

                                                • memory/1860-383-0x00007FFD47380000-0x00007FFD47E41000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/1860-455-0x00007FFD47380000-0x00007FFD47E41000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/2476-367-0x0000000000750000-0x0000000000770000-memory.dmp

                                                  Filesize

                                                  128KB

                                                • memory/2476-368-0x00007FFD47380000-0x00007FFD47E41000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/2476-382-0x00007FFD47380000-0x00007FFD47E41000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/4260-381-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/4260-387-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/4260-316-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                  Filesize

                                                  1.8MB