Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10174ac08f7f...83.exe
windows7-x64
121697ff9c9...27.dll
windows7-x64
1299baa160c...88.exe
windows7-x64
10390f8ea304...a2.exe
windows7-x64
13d26ddb0a9...05.exe
windows7-x64
1051308678ff...54.exe
windows7-x64
10600db89be8...7f.exe
windows7-x64
16860173ca5...b1.dll
windows7-x64
16fd5bdcc62...34.exe
windows7-x64
1087cee50a81...c7.exe
windows7-x64
1093564e681c...ca.exe
windows7-x64
109c109b79da...97.exe
windows7-x64
109c8685a98f...7f.exe
windows7-x64
10CrypMod.exe
windows7-x64
10Fuck.exe
windows7-x64
10Generic_Ransom_1.exe
windows7-x64
8Genericcc.exe
windows7-x64
10Gneeirc2.exe
windows7-x64
10MyxaH.exe
windows7-x64
10a1e86fc6cf...c2.exe
windows7-x64
1add230a2e7...10.exe
windows7-x64
10ae3a9c9cf9...b7.exe
windows7-x64
10b878926219...be.exe
windows7-x64
7c28384feb8...1a.exe
windows7-x64
10cryptmod2.exe
windows7-x64
10d041a11a04...a7.exe
windows7-x64
10db3f0b9d66...0f.exe
windows7-x64
6dcb283e040...ea.exe
windows7-x64
7e54de5d857...f3.exe
windows7-x64
7f14fd49537...19.exe
windows7-x64
1f7ee55f157...ed.exe
windows7-x64
3genenenrnenr.exe
windows7-x64
5Analysis
-
max time kernel
1565s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 13:44
Behavioral task
behavioral1
Sample
174ac08f7fd9c8486511122f2b8c730018c68d4492bf58840f7dbe5338072883.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21697ff9c9b2ad4fb91d805cd139175a4ff8fbddf1fdff52c9dd8eee78612b27.dll
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
299baa160cc77a615a22266ea21c1eabc357ade95901e569d82731ba44309f88.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
390f8ea3044007611ebadad5352708aa3d0df0872b4550100f439a0aad7213a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
3d26ddb0a96c825ff98a6b6456bf52dab1a896da2a8690a041524a6c82213a05.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
51308678ff4559482f32fc2138d4134b412ab75977c19003bd6a7209b3c1cb54.exe
Resource
win7-20240220-en
Behavioral task
behavioral7
Sample
600db89be8dbd50e60c620ea147688cea7d512b1dc545a6b95fe41f0dfeca57f.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
6860173ca54b7e763cc667ac54435f1a18a821e09453b9e41556b6c2e9323eb1.dll
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
6fd5bdcc625d735f67f0ad4cacd06feb2ae20a2ec7626ff91fbd1848d1173d34.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
87cee50a81408e14f015d7507a87950e678742ba78015fd65d24f9934d22c9c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
93564e681c3b63f14bfb67df98f5461917c447f343770a3a944ab251c4dac5ca.exe
Resource
win7-20240319-en
Behavioral task
behavioral12
Sample
9c109b79dae8527b370cc0b91d5822f4a69b3acda284c361b310e18738ec5a97.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
9c8685a98f9be3a699ea95314449fd90fbaeac3e587efdfcb0c495621e7b087f.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
CrypMod.exe
Resource
win7-20240215-en
Behavioral task
behavioral15
Sample
Fuck.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Generic_Ransom_1.exe
Resource
win7-20240220-en
Behavioral task
behavioral17
Sample
Genericcc.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Gneeirc2.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
MyxaH.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
a1e86fc6cfb129a978b7de1f8b773f766640e50874d8989999be2c55c6d022c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
add230a2e7aabf2ea909f641894d9febc6673cf23623a00ce3f47bc73ec9b310.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
ae3a9c9cf994b6f1967aee6a31f13796e0f59d4c2bd22865e24f2babf2043bb7.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
b878926219059096382653b807efb9476435cc6d3401667c502d2c7bb2f6d7be.exe
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
c28384feb8d622682c10e81da44448c226638a7fed9b531ab7a5f652c55b3e1a.exe
Resource
win7-20240220-en
Behavioral task
behavioral25
Sample
cryptmod2.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
d041a11a04bba9142ee44712a53c8e94bccefeefe1d382ac35171518cd6b64a7.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
db3f0b9d66482afc1f2328f7eee8a8cc57ce03e19a4325e50d239203a4d17e0f.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
dcb283e040d84bf1a86b381bfb0ce6b8dc070b58ba5d3150eed9cb7becf769ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
e54de5d857ff16efd72ff0223235826494147444538f725f6977ca892282e7f3.exe
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
f14fd49537695f6e33bd102633b0737a2713df3197e36b7cdb176bc8683f6919.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
f7ee55f1571b1a082a8e61811811009b02e5b0d651bd7c3f8d29ca16ef1e14ed.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
genenenrnenr.exe
Resource
win7-20240221-en
General
-
Target
Generic_Ransom_1.exe
-
Size
1.8MB
-
MD5
84b51ee1b45d26e08c525d9c87a4945a
-
SHA1
04d9559bb0ed6e964b05d1583a7410eca837f1cf
-
SHA256
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8
-
SHA512
d3a4c07119ce03d1199ed2e6fb98b1504c171fe1d8ce1d71c33e2f2562ad0149e4fd5018ae837d9500761ad3d73f30c48d8c44d72438b048c8fd5f914d3549c9
-
SSDEEP
24576:sVLOUsdmcKn0RVIC0GN9eyS7QPkIIgmWmQL3taRHLM36T22CKRJqNE4u6FOcnDs7:stJ6F7PN3taRHwe3clnBowQg7K
Malware Config
Signatures
-
Registers new Print Monitor 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Generic_Ransom_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Generic_Ransom_1.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Generic_Ransom_1.exe File opened (read-only) \??\T: Generic_Ransom_1.exe File opened (read-only) \??\V: Generic_Ransom_1.exe File opened (read-only) \??\S: Generic_Ransom_1.exe File opened (read-only) \??\Y: Generic_Ransom_1.exe File opened (read-only) \??\Z: Generic_Ransom_1.exe File opened (read-only) \??\G: Generic_Ransom_1.exe File opened (read-only) \??\I: Generic_Ransom_1.exe File opened (read-only) \??\O: Generic_Ransom_1.exe File opened (read-only) \??\R: Generic_Ransom_1.exe File opened (read-only) \??\Q: Generic_Ransom_1.exe File opened (read-only) \??\W: Generic_Ransom_1.exe File opened (read-only) \??\X: Generic_Ransom_1.exe File opened (read-only) \??\E: Generic_Ransom_1.exe File opened (read-only) \??\M: Generic_Ransom_1.exe File opened (read-only) \??\N: Generic_Ransom_1.exe File opened (read-only) \??\P: Generic_Ransom_1.exe File opened (read-only) \??\H: Generic_Ransom_1.exe File opened (read-only) \??\J: Generic_Ransom_1.exe File opened (read-only) \??\K: Generic_Ransom_1.exe File opened (read-only) \??\U: Generic_Ransom_1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate Generic_Ransom_1.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0612FF81-EB77-11EE-AAE3-46DB0C2B2B48} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801807f4837fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417622561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000aa933822c1d73096a16dc566181bf6c5d2cd8d102750a453fc5488f34bb8b5b8000000000e8000000002000020000000b235b1f7a48de95e5bde4e8aa67d73bb77c2104b400dc911b80d82aeebd1ba3420000000f2c51036e0a80408bb16910b2b2951a05717cf4449c6fbc60213b4f4c4d6763e40000000ebe7816799f26d5242e3b15400955f7e3a5ac46ad18460c2ce750463f922948f44588ff9812857344a12823a66e361abbad9644bcc063d3ec37ad2aca0425d12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1740 Generic_Ransom_1.exe 1740 Generic_Ransom_1.exe 1740 Generic_Ransom_1.exe 1740 Generic_Ransom_1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2484 tcpsvcs.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 3032 spoolsv.exe Token: SeRestorePrivilege 3032 spoolsv.exe Token: SeRestorePrivilege 3032 spoolsv.exe Token: SeRestorePrivilege 3032 spoolsv.exe Token: SeRestorePrivilege 3032 spoolsv.exe Token: SeRestorePrivilege 3032 spoolsv.exe Token: SeRestorePrivilege 3032 spoolsv.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1740 Generic_Ransom_1.exe 1740 Generic_Ransom_1.exe 2120 iexplore.exe 2120 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2540 1740 Generic_Ransom_1.exe 28 PID 1740 wrote to memory of 2540 1740 Generic_Ransom_1.exe 28 PID 1740 wrote to memory of 2540 1740 Generic_Ransom_1.exe 28 PID 1740 wrote to memory of 2540 1740 Generic_Ransom_1.exe 28 PID 2540 wrote to memory of 2392 2540 cmd.exe 30 PID 2540 wrote to memory of 2392 2540 cmd.exe 30 PID 2540 wrote to memory of 2392 2540 cmd.exe 30 PID 2540 wrote to memory of 2392 2540 cmd.exe 30 PID 2392 wrote to memory of 2800 2392 net.exe 31 PID 2392 wrote to memory of 2800 2392 net.exe 31 PID 2392 wrote to memory of 2800 2392 net.exe 31 PID 2392 wrote to memory of 2800 2392 net.exe 31 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 2484 1740 Generic_Ransom_1.exe 33 PID 1740 wrote to memory of 312 1740 Generic_Ransom_1.exe 35 PID 1740 wrote to memory of 312 1740 Generic_Ransom_1.exe 35 PID 1740 wrote to memory of 312 1740 Generic_Ransom_1.exe 35 PID 1740 wrote to memory of 312 1740 Generic_Ransom_1.exe 35 PID 312 wrote to memory of 1884 312 cmd.exe 37 PID 312 wrote to memory of 1884 312 cmd.exe 37 PID 312 wrote to memory of 1884 312 cmd.exe 37 PID 312 wrote to memory of 1884 312 cmd.exe 37 PID 1884 wrote to memory of 2008 1884 net.exe 38 PID 1884 wrote to memory of 2008 1884 net.exe 38 PID 1884 wrote to memory of 2008 1884 net.exe 38 PID 1884 wrote to memory of 2008 1884 net.exe 38 PID 1740 wrote to memory of 2120 1740 Generic_Ransom_1.exe 39 PID 1740 wrote to memory of 2120 1740 Generic_Ransom_1.exe 39 PID 1740 wrote to memory of 2120 1740 Generic_Ransom_1.exe 39 PID 1740 wrote to memory of 2120 1740 Generic_Ransom_1.exe 39 PID 2120 wrote to memory of 2192 2120 iexplore.exe 42 PID 2120 wrote to memory of 2192 2120 iexplore.exe 42 PID 2120 wrote to memory of 2192 2120 iexplore.exe 42 PID 2120 wrote to memory of 2192 2120 iexplore.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Generic_Ransom_1.exe"C:\Users\Admin\AppData\Local\Temp\Generic_Ransom_1.exe"1⤵
- Checks BIOS information in registry
- Enumerates connected drives
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵PID:2800
-
-
-
-
C:\Windows\SysWOW64\tcpsvcs.exe"C:\Users\Admin\AppData\Local\Temp\Generic_Ransom_12.exe"2⤵
- Suspicious behavior: MapViewOfSection
PID:2484
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\net.exenet start Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Spooler4⤵PID:2008
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://blog.sina.com.cn/lanyezi7252⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:2652
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59202d4d600d60c4b66fa8d13167675a7
SHA1b2202cf76e2427e0245debab5c3eb0d7aaa9d768
SHA256f8021fa1049c6d7e18d0b13223762bffba2d29a4f9d63765148c0c421e848f3f
SHA512d3367aedd8d9b5a28651e6ca7c51899cde1377538a445d792451bec2073d099ad1177c4de77e288bc6600e44a8da557681cb1a6ddf799744ed0eeae6f880505b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb6b81a73c6b8e4ad0a3a724f2d6534c
SHA169b201121a9d17e30cd9b034449a3a8ef9cbf986
SHA25685dcdb0ff95808cf3af7343db4eee32b91c2830917a9881bdec25d5c1970a527
SHA5121447e5b192d4923c2dad62034ba7844a4be91a62b0db64335aa3040ef58e47a5fa08aca3cc9695bd73775e73640f98456e6199f892a9af2a786486d85d0c1b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ced2a01227c9dfa69df93932d38d724
SHA1f2cc39f698c7cc677d50719ae674d0516e3a5cdf
SHA256e2f0ea3f3d03083b0476c654e018daea682febe4a1d07170c83f6afbef943145
SHA512c338636e4c655abe0e2d9fc6f2115ccf2c3dedb2bb6fc5f952c01830133b3a7623fe3c03d09e8dbd2ee2e8bf2873dd929cb4cd6fb819b49481182d9b45d30894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52dfb937ebfef1954c282723e531db0b1
SHA1a9e1128c9b61ac643c386e41513d60c0d862fc3e
SHA2567c9bb88a9c248aedaa6f970d92bf189c45db25c7ab668b972be73df1b82ad915
SHA5124601be3878bc1f2e6eca606a7730336f17b54db3549075dbda0d049bbaa5cfd6db6785a0689a255201ece9cdabe2bb3aebd03dc2df56f976bba82034a0b30580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d1dc56e7a8b9af1c2b85e5aaf6807feb
SHA13bb704b6214e868e394e98613918198365d85330
SHA2561e0404692d62cb0da1eec1e220b5625bd87a7de3953ea46802cd5224dcfd6f68
SHA5129088d3281bd20c28b907a28f7a7cc62d40691c90e1e5130ae1b99218a29be123e43b05a80eef773e4be4cc4d42ed0f4afa970a39d6e9b7a5e9433dfdb3159f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa1c50a370ea2d838858fd12e6ccfb65
SHA1e58dcb2c936ed92502ee3e8bf341371819200f2d
SHA2565764afb87e799aabbc9cf32e466d88aafb33faa7f271352d7d4ac73bb65b61bf
SHA512ae678d187abb74ddb9f7e1689622e433b682f11221a4a4e116fa1b8689247fec701ece3ce191bf206e769d0e7578edb4877958a9737cf385ccb7d6a1e435dd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59293b30a823a8bb3026d1f5a2ab86a55
SHA1c48f44aabaf78b62282d63b3efe3bb0596d39ea0
SHA256932a50ca30febeadfd745cf6365f2ec122cd051bf21f17302ff77b2a262d390b
SHA512828b84e1e7e8eb1357229c766554e4189459fa27f5a8bfc57f3bdebcc0336813f82c55e719fe9a925cc103517ef56e569f04dbae702d3e53482cd18014918b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592140799463c3fa0e8fa079fd629a383
SHA1fb943d60b117349c2ec8aaaa275bd7e7f0ed17b1
SHA256e08ab024d330628768d09e79377a045ab54602f128bd6ac67ff3fd2001b20632
SHA512600a86cd607e8a6f291510d02ef53d836ac2058ed4e139172d6d438de6d5c6a4e04ce9d4019f3e1293cec331ce47ed82c77fb7e8efc1fd925c3185b6ef7316c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ba33e2cf0c8b04a42d8324d0e438ae9
SHA1a3d5d40017439d3d50a3791d6486af9e6f6f955d
SHA2561f83032e52503afde247383e802d022e9699ba7d7545a2a613dcb819104b1d10
SHA512faa85863690e8ffbaca6e33cb7ed0621f96c7b8ef105d3b6d7c3dcbbcc2b9022a24ab11694e0e5138ddda7c066f28e4a101384ff87771882f07f140564a3dde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d94ed9d1b06d7d6e68478bd877137f4
SHA122d1ac0040c5f53ae5fba2b50652ab80ec933844
SHA2562e9f6a58038c7cfd4af1462a2ccf9c35258892f0ec8372e619ffdcdadeac94c0
SHA512060a4f816c04aefe83a0b14746b99455861a380d52a6ce156bfaf604679ea6076aa9ac95d829ca071ee5f0ccd6c2826802c601d9d94e281bd9943151157cd52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD553d62fa7486a7aa886173b2e33034ccf
SHA136f32743d641973aefd1b02b213b48a2ff72bb26
SHA256e5b1e1183124533acebb50f3570e1c0d62b8f5b0ca7ad9c1c77008c5a405aaab
SHA51278a30e3214865f164e7d45cbf154c460c58f98313795efa1ed661235c7b84bf91b77185e8392193a5f0865bef17a1dfcf2fd241e1bf5a1bcb55f8f16a349e596
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63