Resubmissions
10-01-2025 23:50
250110-3vv2pswmhj 1011-12-2024 15:19
241211-sqgcmssnbr 1009-12-2024 01:54
241209-cbqprsxngx 1026-11-2024 23:15
241126-28wpqa1ndp 1030-09-2024 21:45
240930-1l2rsazhpg 1015-09-2024 22:03
240915-1yl7vsvbpf 1015-09-2024 20:03
240915-ystcwa1elr 1020-08-2024 16:21
240820-ttt9cawalj 10Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
v2.exe
Resource
win10v2004-20240226-en
General
-
Target
v2.exe
-
Size
121KB
-
MD5
944ed18066724dc6ca3fb3d72e4b9bdf
-
SHA1
1a19c8793cd783a5bb89777f5bc09e580f97ce29
-
SHA256
74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f
-
SHA512
a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3
-
SSDEEP
1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY
Malware Config
Extracted
C:\ProgramData\rdx2o789ek-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A35682333E0C09FB
http://decoder.re/A35682333E0C09FB
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Drops startup file 1 IoCs
description ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\rdx2o789ek-readme.txt v2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: v2.exe File opened (read-only) \??\I: v2.exe File opened (read-only) \??\K: v2.exe File opened (read-only) \??\P: v2.exe File opened (read-only) \??\S: v2.exe File opened (read-only) \??\W: v2.exe File opened (read-only) \??\A: v2.exe File opened (read-only) \??\G: v2.exe File opened (read-only) \??\H: v2.exe File opened (read-only) \??\J: v2.exe File opened (read-only) \??\N: v2.exe File opened (read-only) \??\Z: v2.exe File opened (read-only) \??\E: v2.exe File opened (read-only) \??\Q: v2.exe File opened (read-only) \??\R: v2.exe File opened (read-only) \??\Y: v2.exe File opened (read-only) \??\L: v2.exe File opened (read-only) \??\M: v2.exe File opened (read-only) \??\O: v2.exe File opened (read-only) \??\T: v2.exe File opened (read-only) \??\U: v2.exe File opened (read-only) \??\V: v2.exe File opened (read-only) \??\X: v2.exe File opened (read-only) \??\F: v2.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification \??\c:\program files\ConfirmStop.wps v2.exe File opened for modification \??\c:\program files\FindSet.iso v2.exe File opened for modification \??\c:\program files\MountUpdate.midi v2.exe File opened for modification \??\c:\program files\UpdateGroup.tif v2.exe File opened for modification \??\c:\program files\ClearUnlock.pcx v2.exe File opened for modification \??\c:\program files\FormatSearch.html v2.exe File opened for modification \??\c:\program files\LockUnlock.ttc v2.exe File opened for modification \??\c:\program files\SearchLimit.tmp v2.exe File opened for modification \??\c:\program files\CheckpointAssert.WTV v2.exe File opened for modification \??\c:\program files\CompleteProtect.eps v2.exe File opened for modification \??\c:\program files\ExitUninstall.vst v2.exe File created \??\c:\program files\rdx2o789ek-readme.txt v2.exe File opened for modification \??\c:\program files\ResetGrant.ttc v2.exe File opened for modification \??\c:\program files\ResumeMove.vbe v2.exe File opened for modification \??\c:\program files\GrantConvert.eps v2.exe File opened for modification \??\c:\program files\ClearEnable.css v2.exe File opened for modification \??\c:\program files\ClearRestore.jtx v2.exe File opened for modification \??\c:\program files\StopOut.vssm v2.exe File opened for modification \??\c:\program files\UseApprove.vbe v2.exe File opened for modification \??\c:\program files\AddFormat.mp4 v2.exe File opened for modification \??\c:\program files\RevokeResume.xps v2.exe File opened for modification \??\c:\program files\ShowConvert.mp3 v2.exe File opened for modification \??\c:\program files\AssertCopy.odt v2.exe File opened for modification \??\c:\program files\ConvertWrite.inf v2.exe File opened for modification \??\c:\program files\FormatLock.cfg v2.exe File opened for modification \??\c:\program files\GroupReceive.pot v2.exe File opened for modification \??\c:\program files\MeasureEnable.txt v2.exe File opened for modification \??\c:\program files\MergeDisconnect.jpg v2.exe File created \??\c:\program files (x86)\rdx2o789ek-readme.txt v2.exe File opened for modification \??\c:\program files\CompleteWait.ogg v2.exe File opened for modification \??\c:\program files\LockUninstall.mpp v2.exe File opened for modification \??\c:\program files\ClosePing.jtx v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5868 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2368 v2.exe 2368 v2.exe 5332 msedge.exe 5332 msedge.exe 4148 msedge.exe 4148 msedge.exe 3508 identity_helper.exe 3508 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2368 v2.exe Token: SeTakeOwnershipPrivilege 2368 v2.exe Token: SeBackupPrivilege 2168 vssvc.exe Token: SeRestorePrivilege 2168 vssvc.exe Token: SeAuditPrivilege 2168 vssvc.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 3960 NOTEPAD.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 5232 4148 msedge.exe 114 PID 4148 wrote to memory of 5232 4148 msedge.exe 114 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5352 4148 msedge.exe 115 PID 4148 wrote to memory of 5332 4148 msedge.exe 116 PID 4148 wrote to memory of 5332 4148 msedge.exe 116 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 PID 4148 wrote to memory of 5380 4148 msedge.exe 117 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:5088
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2996
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\rdx2o789ek-readme.txt1⤵PID:6124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc209246f8,0x7ffc20924708,0x7ffc209247182⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11498870868541568806,7930953864236573700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:5840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5732
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\rdx2o789ek-readme.txt1⤵PID:5284
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\rdx2o789ek-readme.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:3960
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1868
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\vcredist2013_x86_000_vcRuntimeMinimum_x86.log1⤵
- Opens file in notepad (likely ransom note)
PID:5868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5767f8ed826b8ba850c8dbf16292b374a
SHA1c6ae82d86590b1dd11f8ac97ece034c22db40abd
SHA256743565dafbc576e9fa5360d90cc0b3e9ab0192f74257615f62613acf4286efe0
SHA51241d664e54eb1ae412fc6ef604f56a8af69fc868550068844f3b4b2e4455d7da6356444b87db591ff6d30a6a208f8991b77214cc0ac1a97e916cfdf0a78118927
-
Filesize
152B
MD57c6d0df684a753a0833d5f03055d8458
SHA1c33b2c1600fc04a090cc0809b54b80c7c90717c9
SHA2569161544ad952e103ac764a2391bcd0cfd6f1d1f8af55d3b4f97d77cf46e7253f
SHA512496de5ac7fe58c06090c8fccb841815fb8d23cd9fba6a0bfeea73ff30db028d93901addc4dad9a8cd006fb8d7bb9df2ce585dd95e918eca1493a5527e4a969e3
-
Filesize
152B
MD5a080b85d22d6145228600e2d2deaeef0
SHA1c325634ed40b6b67c14d74bea5162944b7f32bfb
SHA25612f4541b08edbf0c358087a88a277919b557eb825d6a20a05ff78a5482693b15
SHA512033131d89482f342f0c69a47ddd13705d1d99b8dd11ac198f1a19e3de1fde22151facce36a3f7064fa2e8deb78697f3df85af3ddfd8f35c9cda86c7b97df4423
-
Filesize
44KB
MD55ac0c7a2a515c9d67c6bab10e9ee3081
SHA1881dc8c9da7dc23b265f5e2deb262c7acb783fe6
SHA256141098557426fb9c5e3a1bcbbdf81d7c272b92313d751000cf78dd619971dc76
SHA512f069e17aa8b786c1fccf05b3e931a1e4c1ff74d9b95e54a0611130607fbe7fdb1ef7e3ef7aacecec701b0b7269164da7860e2c11b09c77e1bb9dfcebb7788f8a
-
Filesize
264KB
MD5593f729a7895986225aba8b5f3e2b99e
SHA10909712e06eb3347ec319702388d886238fb31cb
SHA2569353e2cf8aa670f9ec7911b1382f4ababc164a792567f3db19309f0e3d026e19
SHA512285551649c2175a7d1d5adf21dd7e0ac1e20d6957d65a711ced7fa6d6afd88831bfd312ce41034d37d3dc598a4eb626cc468a6644aed270bd709d54662ccb581
-
Filesize
4.0MB
MD5be0981ef8d1134b9c9f19c89a60037f7
SHA1a60a42b40a59acd326b6ae424f3f1a0ec620ba7e
SHA25636409d74777c05c7f054c6eeb6f2b639b612677677dca40904b843750d2e479e
SHA512f8244fdee89e580debe48db42da22ed6c484fd5ac630e4012403d7ceeb1662af0d04b90ff97f9be87f80682e828e038337e486abafc521562aa3a2651d71c72b
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
322B
MD5899ce3e9a64fd964a8709d74b4fefe17
SHA1ff2c6469d29660763241bb37400348b50fca96f2
SHA2560d189b4be64d66f16ec21bc3a13d9b37c93eab74ce820e1aac88981ac4dd3e59
SHA5122f36c7b11f2ca36dbefded1533ea0e33dbc2536828694cc2c77b7236f0483aeb50c0d8ac0e1a795c7b0d916ed29c758e9041f96b6d12c496c42b078c724e97ae
-
Filesize
331B
MD55ed4da7954fb63c1c75ebdb0ca9e7f34
SHA19f561c7451a26730d8c6be809bea1ad6bb98961f
SHA25624c2ab0b46e898c5e96a4fe2ab736b47b56c1ab13833f40ffc468d3078e54307
SHA512b71638df4b689967d72ab49cd2da5d0d1f682fe3e8bf7e41cb824b2a4250e768ccfd0caba6a9db890ec669773c924d23df53f09b93657b7030a81fc3fb129beb
-
Filesize
6KB
MD5bd6c472db87764d15bf0b2ce071ecba2
SHA1c79785a7babe9226234de3f8eb3e3a78d7b459ca
SHA2566360ab86533f6e4e14730fd20e49cf230945a246692c168900a473d735847b7b
SHA512adb39653b51b8a97b71cdf177dc993c73d719e59dd58417332992a10c87eff0aadc84c7f0d74f5929dbf9a1050eab970dd586b5c6c09c7c293ad1809badf761c
-
Filesize
6KB
MD585a7eae0b5b88ee767418dd3033ae30c
SHA1a0329bcc6565e003d256c3265e219d7f13b00a7b
SHA256741d3a9d5f6a52bc85ff03e139eca70b45e6d85c543b083d5e30cfd9e827fddc
SHA5127ad75edc3698176a83d0aab15560bd7d91d0164b27b0350807d98fe8f067c32de837772aaa819c2d07b424908c772e93f80a74e0e668db8496087bf658053ef0
-
Filesize
6KB
MD57b5b65d344b90c3b7eea54962a710437
SHA1565ab6bd624aad5b7a97629a79226dd0af1d7782
SHA25640152f92c6f8b0c00a3d4f28e46450f48ed58ead0b5749c192d66d476bab1012
SHA5127e52f24d8cbccc1bf5e6b695cba071947b7398374abafc21982117427b7d3713b8bd9102e0ea2238269c88f806628765aaaf0bd040487cffcae1523f1dbd11d6
-
Filesize
24KB
MD55b2cea66cc52717de1f148f12f2318ec
SHA1c712fc76b646b78e2355a6b0a775c15b226ade36
SHA256364db53390fb32f06c45f5e3b9a14ba995a9862058761f6d3069dce0ce80b764
SHA512cbada8242f2f6f1c37e1b90f9c3d8d4d7e7aa54c501f0765064011345abd83405940fd04337529a386e808387a6eff27fb823eae417084891233cc92243ad332
-
Filesize
24KB
MD5d9ca38e66a40a8f107795903ec9cedd8
SHA11e3440c1796d0bf295c8432307c070f4662dc6db
SHA256dd14ac9715e321dc0a6dd7ff223893d4bb157a97c46e658cb225b7927e4a9585
SHA5127901541a3b9c4afbab6b5f29b92f4572ac8d62001590df5118119a249f7925ad62e0b4f52a5e077c3656bb417587f1ad897bf762859aebf078d994adf142cae0
-
Filesize
137B
MD5a62d3a19ae8455b16223d3ead5300936
SHA1c0c3083c7f5f7a6b41f440244a8226f96b300343
SHA256c72428d5b415719c73b6a102e60aaa6ad94bdc9273ca9950e637a91b3106514e
SHA512f3fc16fc45c8559c34ceba61739edd3facbbf25d114fecc57f61ec31072b233245fabae042cf6276e61c76e938e0826a0a17ae95710cfb21c2da13e18edbf99f
-
Filesize
319B
MD520a9a40d1d00a098c2bbe516289518fd
SHA1edf89a659d2df9c214eef9876dbbb2010d552452
SHA256bedb8f4567e139bae31a559b467373efb1297e0d9507f2a102b5ff36ced9cbef
SHA5128c9e843109ef40ec7a1b1e04d606db71dba485b6d2b2a0d07a836f66b1227a7bc8a545142572d3eb013536a6048e2b72225635a42ad796e7b4221195260c5a89
-
Filesize
1KB
MD508477da0f1b3402980a863f3500e9057
SHA12ced21a86b8a7a7eb3f1c3c5fbc278898edf0619
SHA25657426281aed5e32044ce26a0911a560c00b2367f63d70f833a796a5b1a987b21
SHA5121db8b4db9c9dcc309a753e106593c6ac3b2a281b34835e097199e5ff6ba4e5433db18c83eee917baaa48e287aad52752bcfa6beba802b43da028e383fb04311f
-
Filesize
933B
MD5e839a10fca889712feebb46ad3854318
SHA1eebd267136bb419bc8a0de8aba26576caf97a5e0
SHA256b9ce8ff2a7b9f8b1d67fd450af9c78f95496852a47aca8c21ba943769de41974
SHA512b66f0ec0bdbceed0512ed4c9eafcc36126b5af4abdd04fe48cc8dc7e05ca1f1b3938137ea1023ae17454e29e06ef97956a2b9ced271ef2563913a4c038b756ae
-
Filesize
350B
MD5e3bbb18642d8dbe93af46aaef42b98ea
SHA1deb021031a70f6e6338d294a06208b39fa9c2417
SHA256ce7600fd30fc40dce4c424bfce06646667304538c42874385f453f4a830f0dc4
SHA512b9fa0e128fcc8246efa0d22ca51709745b7b8e31f9b52ffa0fa4c60f4bd32592f97df134919de21f81ed29ff0ec6aa88968ba801cefa3f74842127d52af4be55
-
Filesize
326B
MD50c5de0caedaa04e45b89d6bc8a5dae12
SHA1282e4dd7be51de22f6e6b1169836d1f5bf184b00
SHA25625e04e9837e5cc0bde2734240f4222792f1916f74003227e159f1b2e075141e4
SHA512bf5ea4928f2b7a0a4930f906267abdc7ef1db2b77c2fdff14128e4f32719766875bbd3a0bf51f5c18fd55d0e34f2c64f2655fc110518fde4430bdde948d1b9ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
139B
MD59c5ef30cc19321cc97627a367f601dbd
SHA17872acb991c7f100d3d1d0ccb94f1cd03b3c1c1d
SHA256b16f489de8941973886b0142604bdd2bdc96bd0bf0a5d6cca96f4b6c96a23b09
SHA5125ae54b8729bccb6587259242afb7e2e965e4da0b3bb2a64d43811869f45973e6421af21cf22d74b2ba3b815cc93d4116a18e5e204b1d3c8eaa99e8517220cab3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000004
Filesize50B
MD5031d6d1e28fe41a9bdcbd8a21da92df1
SHA138cee81cb035a60a23d6e045e5d72116f2a58683
SHA256b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904
-
Filesize
206B
MD56f5deb01a798ca228d72141645e7c047
SHA13c3cf12d95e07c7e67182ee86b5817daaf2da6b8
SHA25666950cfde0ba8429fd16a63bd02e09e3cbf615dcaa34628a2e854cab22848bdb
SHA512ef7207a711ab35a0b30444d8cd1b2628115a89fcde79b90ee15fae73d4af1692559ec728f12059c116599b182e0a871a79d08f7d246e436beb0caa74b74508a2
-
Filesize
322B
MD5941c9af8f2e80ce6ffaa5ce69fa6e2c6
SHA1c03ab56381558dd8656f691f9d2d965246536c10
SHA256d9cdae4bc3e0fc2d7b210cceae548d0274f339ba201d76defac6554f3d826d28
SHA512ace8e0843c868429189db1942e7d382f198da4c7c43d56f1ddd9df30939d9e098573569f703e523a58b74ec8c85b752c28039da03a3464c933d3ab00103de185
-
Filesize
560B
MD5c49983c0c01fb338ad3db971fb24b87a
SHA1bb75ac3a57f32f06c57ca18a18485166f3ca4510
SHA256fa8040287447ed8cc1f0b5f053effc5e4d4c9cae67d79c92c12a36fc92ef1d88
SHA512282ee2e489efb1f8a967ceae856cf094e563ddf22a8b17cd17deb615269e30f3e8e960213928b5aff44e628e6258a878ab89e591fe88f8babda2d991787b47f4
-
Filesize
340B
MD51bb56f961fde0560cdf6d8a5e45303df
SHA171e5e415d526618407303b08350ca277f4ec0f0a
SHA2564a70501fd9c5e6dea698c7ffcbdcb5ac463e7a23930cc903d2310bf111af4b0d
SHA512858636f3a5d8fc916dbe52f7fa54b07e380307b3555606fa3c2e8c30569927c67ec49c26f56809c570e98702becc8c7f05205ef56c78cc6b9512634a1b92e1a4
-
Filesize
44KB
MD50d1570b41793aa89bc59d5f1347f7b62
SHA173795846623d43fcce4a24cabd4e49334690fb6b
SHA256933c66cba5758992b887c2e127834c501caffd521a4669e093f83352e56497d8
SHA5127610b876abff6450b241ae81273999f51b5967e1a486c9ef2ad6eddcad62d94fb8a1429edd56a48729902366b0235adf6ffbb32b45f049d89aef3647cc4585a7
-
Filesize
264KB
MD50cd25ef3b2657aab49166140471e63c4
SHA11f4f3bbcb36bf891a6bf4ed9f76f02cdddb0526b
SHA2566cef701e62eb0f258209dd5955df0300fd834d61098cf5d92f368b4f1a9667d7
SHA5127f273146850913bbc1c6e0cb1d9c0ac67beed15c05f65bea5dbcf3e26dafc331e62f6bb07033a7fea5a71d96aaf063fecaf726f28a75b737a40c6dcb1aa54bb6
-
Filesize
4.0MB
MD5446bce5ba63a0a00bb79b6de9707cb70
SHA1f6ac41ca0e219b9090ed807161ec304944d021f1
SHA256c911974680aa4b324891dc734a657f3f345e67d837341335fd4caf224801a9b0
SHA5127a6910d745b34c5ec8096256548eea222ac310259384cc8b08623d77a61165ceb2e774052602da43ce5cb2f918277d1fcaa660d34191a6bd923937138dfcfb5f
-
Filesize
10KB
MD560be8f2cc59b704b3415f9adfb92e326
SHA1768beab13b8eb1938cc77dfe35a8553dbafa613d
SHA256231c1aa5d8df427323a21c5ed9500e75b390f4760801cd6a9818b13d5b6492a3
SHA512478cd232382cc1d2ca03642e1af544076b0fef88c13c9c7e347676c1e045043214cdb0efe9d030677aa8d1eec952b56e21aff0e398f411f650eb3f2c270bd13e
-
Filesize
10KB
MD59439cf375cfef3c1e78b8ae3d3fe0adc
SHA178b41d0cdf5f8138946f556facf38be7e091bf61
SHA25639d706012aeb27049385cf42e04276a7f71be0aedc97cc07d807eecbe582cff9
SHA512733a30edb653989c432212588fa0db810bbaaa5a97c97ce8407d1c053f1e7f6ce28b05a6864ee192e416d03695fab7931e8790ae2a060fac342c062e4683f10b
-
Filesize
170KB
MD5a5a15ed9aed042f2c54d58076aac88c8
SHA11e33b343011b8d7cf489246b169327e5eb07190e
SHA256d1c38b8a2c35057c3dde6e86de06e111fc45774d0809d171e887880b7b8ae2c5
SHA5125d62f9780f95b510c738cd16ae8928a47ffafe2e9db69175bdee67c8984155235f70d492784ab69c159cca4ff6820c021ae97ca2d1cd1893fc5e8c8760a9cbb4
-
Filesize
384B
MD5883a7ed954386b32f9d368d09bbd5323
SHA1cd53f137d9cf5a4d62caa47d72be6bd1119fd321
SHA256cfd59d2424f5978ea119a585cffead72b7d3f0e7842f4bb32a7d3cfa8ebe623f
SHA512c71c2d3bccbc992f4a8d8d75ddd144e5619aa84cf6a7cb034918f8f8c99ea7fcaa17c56c49d51f8f1aceb8099b8501fd626438a4f79f4d5d64af05e5f5319aba
-
Filesize
24KB
MD53adb3b22df3f705bff78a834793db053
SHA19709dfec4154c044dc6e0943af7121aad6df7c3c
SHA25607d1fcb54af3641a8caebad3718ade8bc2092362661debc2480992f8419a62a0
SHA5125dd524bdaa5c4b898187569ec4b9f7db1ff8da1b80771076d26716286b74f3ac86000dd34387e30e34592b79d2ee0d5be00a69b3480742c1f4d9bf50d3662a1f