Analysis

  • max time kernel
    288s
  • max time network
    282s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 23:10

General

  • Target

    https://drive.google.com/uc?id=12WBT8qXg0FZyiIfnQfimIrN-sUpoTREP&export=download

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 4 IoCs
  • Modifies registry key 1 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?id=12WBT8qXg0FZyiIfnQfimIrN-sUpoTREP&export=download
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff631046f8,0x7fff63104708,0x7fff63104718
      2⤵
        PID:3760
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
        2⤵
          PID:3056
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1824
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
          2⤵
            PID:3916
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
            2⤵
              PID:4668
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
              2⤵
                PID:432
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                2⤵
                  PID:5028
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4008 /prefetch:8
                  2⤵
                    PID:5084
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                    2⤵
                      PID:4772
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4080
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:1
                      2⤵
                        PID:996
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                        2⤵
                          PID:4520
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:1
                          2⤵
                            PID:3696
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:8
                            2⤵
                              PID:1464
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:1
                              2⤵
                                PID:2040
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3640 /prefetch:8
                                2⤵
                                  PID:4344
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3628 /prefetch:8
                                  2⤵
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4436
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                                  2⤵
                                    PID:1136
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:1
                                    2⤵
                                      PID:1936
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                      2⤵
                                        PID:992
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                                        2⤵
                                          PID:968
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                          2⤵
                                            PID:3636
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:1
                                            2⤵
                                              PID:4364
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:1
                                              2⤵
                                                PID:4576
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                                                2⤵
                                                  PID:400
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:1
                                                  2⤵
                                                    PID:4380
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6812 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3960
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:1
                                                    2⤵
                                                      PID:4052
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2988 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:384
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1
                                                      2⤵
                                                        PID:3284
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13914757145255818544,3944928697529218254,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:2
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1876
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:2420
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:5008
                                                        • C:\Windows\System32\rundll32.exe
                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                          1⤵
                                                            PID:4576
                                                          • C:\Users\Admin\Downloads\Covid29 Ransomware (1)\TrojanRansomCovid29.exe
                                                            "C:\Users\Admin\Downloads\Covid29 Ransomware (1)\TrojanRansomCovid29.exe"
                                                            1⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2428
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\TrojanRansomCovid29.bat" "
                                                              2⤵
                                                              • Checks computer location settings
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:4836
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\fakeerror.vbs"
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4348
                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                ping localhost -n 2
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:3864
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:396
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:3996
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:640
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:1104
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:2716
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
                                                                3⤵
                                                                • UAC bypass
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:372
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                3⤵
                                                                • UAC bypass
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry key
                                                                PID:1252
                                                              • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\mbr.exe
                                                                mbr.exe
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • Writes to the Master Boot Record (MBR)
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1740
                                                              • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\Cov29Cry.exe
                                                                Cov29Cry.exe
                                                                3⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4412
                                                                • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                  "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                  4⤵
                                                                  • Checks computer location settings
                                                                  • Drops startup file
                                                                  • Executes dropped EXE
                                                                  • Drops desktop.ini file(s)
                                                                  • Sets desktop wallpaper using registry
                                                                  • Modifies registry class
                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4608
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
                                                                    5⤵
                                                                      PID:1724
                                                                      • C:\Windows\system32\vssadmin.exe
                                                                        vssadmin delete shadows /all /quiet
                                                                        6⤵
                                                                        • Interacts with shadow copies
                                                                        PID:780
                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                        wmic shadowcopy delete
                                                                        6⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3492
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
                                                                      5⤵
                                                                        PID:3372
                                                                        • C:\Windows\system32\bcdedit.exe
                                                                          bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                                          6⤵
                                                                          • Modifies boot configuration data using bcdedit
                                                                          PID:3864
                                                                        • C:\Windows\system32\bcdedit.exe
                                                                          bcdedit /set {default} recoveryenabled no
                                                                          6⤵
                                                                          • Modifies boot configuration data using bcdedit
                                                                          PID:3416
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                                                                        5⤵
                                                                          PID:4572
                                                                          • C:\Windows\system32\wbadmin.exe
                                                                            wbadmin delete catalog -quiet
                                                                            6⤵
                                                                            • Deletes backup catalog
                                                                            PID:396
                                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\covid29-is-here.txt
                                                                          5⤵
                                                                            PID:4692
                                                                      • C:\Windows\SysWOW64\shutdown.exe
                                                                        shutdown /r /t 300 /c "5 minutes to pay until you lose your data and system forever"
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3124
                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                        ping localhost -n 9
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        • Runs ping.exe
                                                                        PID:4200
                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                        taskkill /f /im explorer.exe
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2492
                                                                      • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\Cov29LockScreen.exe
                                                                        Cov29LockScreen.exe
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:4504
                                                                  • C:\Windows\system32\vssvc.exe
                                                                    C:\Windows\system32\vssvc.exe
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4264
                                                                  • C:\Windows\system32\wbengine.exe
                                                                    "C:\Windows\system32\wbengine.exe"
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1020
                                                                  • C:\Windows\System32\vdsldr.exe
                                                                    C:\Windows\System32\vdsldr.exe -Embedding
                                                                    1⤵
                                                                      PID:2560
                                                                    • C:\Windows\System32\vds.exe
                                                                      C:\Windows\System32\vds.exe
                                                                      1⤵
                                                                      • Checks SCSI registry key(s)
                                                                      PID:3124

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      eeaa8087eba2f63f31e599f6a7b46ef4

                                                                      SHA1

                                                                      f639519deee0766a39cfe258d2ac48e3a9d5ac03

                                                                      SHA256

                                                                      50fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9

                                                                      SHA512

                                                                      eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      b9569e123772ae290f9bac07e0d31748

                                                                      SHA1

                                                                      5806ed9b301d4178a959b26d7b7ccf2c0abc6741

                                                                      SHA256

                                                                      20ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b

                                                                      SHA512

                                                                      cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                      Filesize

                                                                      64KB

                                                                      MD5

                                                                      d6b36c7d4b06f140f860ddc91a4c659c

                                                                      SHA1

                                                                      ccf16571637b8d3e4c9423688c5bd06167bfb9e9

                                                                      SHA256

                                                                      34013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92

                                                                      SHA512

                                                                      2a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                      Filesize

                                                                      67KB

                                                                      MD5

                                                                      1d9097f6fd8365c7ed19f621246587eb

                                                                      SHA1

                                                                      937676f80fd908adc63adb3deb7d0bf4b64ad30e

                                                                      SHA256

                                                                      a9dc0d556e1592de2aeef8eed47d099481cfb7f37ea3bf1736df764704f39ddf

                                                                      SHA512

                                                                      251bf8a2baf71cde89873b26ee77fe89586daf2a2a913bd8383b1b4eca391fdd28aea6396de3fdff029c6d188bf9bb5f169954e5445da2933664e70acd79f4e3

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                      Filesize

                                                                      41KB

                                                                      MD5

                                                                      ed3c7f5755bf251bd20441f4dc65f5bf

                                                                      SHA1

                                                                      3919a57831d103837e0cc158182ac10b903942c5

                                                                      SHA256

                                                                      55cbb893756192704a23a400bf8f874e29c0feee435f8831af9cbe975d0ef85d

                                                                      SHA512

                                                                      c79460ded439678b6ebf2def675cbc5f15068b9ea4b19263439c3cca4fa1083dc278149cde85f551cd2ffc2c77fd1dc193200c683fc1c3cdac254e533df84f06

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                      Filesize

                                                                      19KB

                                                                      MD5

                                                                      2e86a72f4e82614cd4842950d2e0a716

                                                                      SHA1

                                                                      d7b4ee0c9af735d098bff474632fc2c0113e0b9c

                                                                      SHA256

                                                                      c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f

                                                                      SHA512

                                                                      7a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                      Filesize

                                                                      65KB

                                                                      MD5

                                                                      56d57bc655526551f217536f19195495

                                                                      SHA1

                                                                      28b430886d1220855a805d78dc5d6414aeee6995

                                                                      SHA256

                                                                      f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4

                                                                      SHA512

                                                                      7814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                      Filesize

                                                                      88KB

                                                                      MD5

                                                                      b38fbbd0b5c8e8b4452b33d6f85df7dc

                                                                      SHA1

                                                                      386ba241790252df01a6a028b3238de2f995a559

                                                                      SHA256

                                                                      b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd

                                                                      SHA512

                                                                      546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b

                                                                      Filesize

                                                                      1.2MB

                                                                      MD5

                                                                      027a77a637cb439865b2008d68867e99

                                                                      SHA1

                                                                      ba448ff5be0d69dbe0889237693371f4f0a2425e

                                                                      SHA256

                                                                      6f0e8c5ae26abbae3efc6ca213cacaaebd19bf2c7ed88495289a8f40428803dd

                                                                      SHA512

                                                                      66f8fbdd68de925148228fe1368d78aa8efa5695a2b4f70ab21a0a4eb2e6e9f0f54ed57708bd9200c2bbe431b9d09e5ca08c3f29a4347aeb65b090790652b5c4

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      fd82fcf66dbede4d75f497530a87f0e4

                                                                      SHA1

                                                                      676e36af75f209aa295db4d761db361921c34091

                                                                      SHA256

                                                                      ba20e7e803e52da6c95b1a837b6c45cafac84a759f8804341f80bad18a21f3f4

                                                                      SHA512

                                                                      3b6e3f20acbf3ae5a28a69d6c1bc907d23f7dfd39aea21010ee6ef1dc092c6fe5a9babf5e482260ded7b85ca39d56f231f2aab75782b44cf0f399ae819c82d2b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      111B

                                                                      MD5

                                                                      807419ca9a4734feaf8d8563a003b048

                                                                      SHA1

                                                                      a723c7d60a65886ffa068711f1e900ccc85922a6

                                                                      SHA256

                                                                      aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                                      SHA512

                                                                      f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      cf39410a1fe736bd9efe775078f3dc03

                                                                      SHA1

                                                                      8a6c227b555e2593b5f685166f1a7fea1a9c0085

                                                                      SHA256

                                                                      3fc58c4389d9502b83eecb79d2c047f027eb89eb5cdb5266721568c51d804ba3

                                                                      SHA512

                                                                      9612a282f46d0d1221410a8a522087dd4e257ab0401fc0ac1491b890530851ed757cbe9133eb2b6d3e7752facd4d7432ccc1091c3c1f400e013ea84b53556eed

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      6bc4a7093a26854db4345a477ad6d866

                                                                      SHA1

                                                                      b0451328d3f43247cb441aa916e6882091140dfa

                                                                      SHA256

                                                                      d7b91dadc4a2f97be6f621570e1f1709f3490d524085441ffb93ed2711264de9

                                                                      SHA512

                                                                      0acb3c2d5ab2ca9b46d23b447540588364f24803976c4be2ca06e0ab8b0f01ab1c88c9cacc237062a05c2a15d93c0e6fdca727b75ace43b7e484acce493263c6

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      37dc54ea78bf5ff3e18ff624ee457038

                                                                      SHA1

                                                                      77115d8dbf24f4570f83e420f617eed4f65eaf03

                                                                      SHA256

                                                                      01b0a04572775a2f30335a1ac3be2442bdc1e68034300f2d5f6c374fcd1ecab3

                                                                      SHA512

                                                                      cada6425fc25f48dd890471b8e3c6a1cf7164530ab981e2d92f73d02a781b5cd9f8fdb1ffaaa0a29d5cdb56402d79d4775b987814c8cff4e03d75852e4ae798d

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      8fdcdd13f88bb1238f2ab3230ae9db90

                                                                      SHA1

                                                                      859d526d247debb988f6141b01ad9fbff43ca04e

                                                                      SHA256

                                                                      d95016236f63a560950250783f7aeae2a1d674a6a84b6ebaa33837a131e8a455

                                                                      SHA512

                                                                      c702ab2ff9bfad670a115addf830bb8003cea8da897fb806d4dd2299ec7e2814e9f443f01436737a7050609e466346d9b8ef675df09af222273cd0b3da564a36

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      206e0c45835bbbd82a2cc233caa5ea8b

                                                                      SHA1

                                                                      20c75b9a4992acd3a5d88ca0d4d2230fa54701c4

                                                                      SHA256

                                                                      097d4fb23f3e08181d7ed76cc2451a3a7015c065eb4406ffb6f66ad4aa63b980

                                                                      SHA512

                                                                      67fb894ba87799e605db10861df60ff07865cd28f1894b26d0fe1310ecb4bf17e9b10b78dd95bfd817c549855789424c969a5a05372aad6f95dc9204fac4c857

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      3f9f2cdbcd57cf3ff26af96c33ff742c

                                                                      SHA1

                                                                      6d81a4f78938f88afaf9980bb977e282cc8ffbf2

                                                                      SHA256

                                                                      3404f5dc33511abc27b8a7e0a9dc584f546d94b1d654beed9b66f6b408ce7239

                                                                      SHA512

                                                                      b9f844917a6a396206ef09c3582b2aa01cc454bcfa23c373b7478da659d7c94636328ded1685124c2be2e8ece4395ca041f562c122f95257b7cb2fe439619c78

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      704B

                                                                      MD5

                                                                      349ab54088597e4bdff4761f24738114

                                                                      SHA1

                                                                      3f2026d96f71cd3c09d059ca4e816356f5928a47

                                                                      SHA256

                                                                      c69e0e9b4fd15109c5aaa9da465ca834a3a758333a5a96dfded7387484c60adb

                                                                      SHA512

                                                                      4f194bb08f784ebf5d65ac9a136c4e6425631494d7dcd534373b274a3d14ed2c2194342cef72dd73b09278a707fa831dbe1f3ebe7e1b17a29a5fa2862ac70e30

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      2ac2300d1eee3540fc26c2a3f516f197

                                                                      SHA1

                                                                      db3c108daa52e710afcf16d4c13dbfa799dbc577

                                                                      SHA256

                                                                      84a36c7b81aa7113489b191f82fca4b1e91236f4b5a2cc2b64bf875939e16972

                                                                      SHA512

                                                                      705b8265fc89a5cd416ba098f2fba0374fc96999fc33f5e7f60a42dedeb89f7875cfb99191218f4b1dee21a6cdb6094a2e563d4a1bfaf1e7b12c9bc14ef9abbf

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      05b0a250fdf67867a958e1eb8642c35d

                                                                      SHA1

                                                                      6e96f1d15bbfe0af94c1c2476c1af5fafc8fc4d9

                                                                      SHA256

                                                                      582e3621c800bc4d5b8300cd9b701407f47b7efe7cc0f4d51ef559f0044579a8

                                                                      SHA512

                                                                      1626e0ee27bd01edad2b108f08c812fb589b3fe9b7e829e9d88785ca7da1da7b8cc1b30c5c1a757daa867f683760982ebb0b1ed2c79f172d29724f82c683ed54

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      3b29623bfd7569766ef8d5fd29f0de14

                                                                      SHA1

                                                                      1db54304cec6bea13b17ef87a44212b17e83b6d3

                                                                      SHA256

                                                                      358694b25162a9354c0166d3abd1ed82c4558ceef7c27c118ebbf9ff1b49c601

                                                                      SHA512

                                                                      75457c6855b867bb8f3b07786d90624b07c7df2dcd72ef29123f36d3aeed33c91fcfe9eb622ed57c247477dee426dad21b8575090f6fe1ffd190432fd49e553b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      eb53a2fa86bf2c4c28c18733d3fed4e2

                                                                      SHA1

                                                                      7c3a5b17c1e0db598486a5baace96ded397397ec

                                                                      SHA256

                                                                      ef13386100e2e5e8b05fb0b6d830de5720967c44f2340070d463ed8929fee914

                                                                      SHA512

                                                                      14faaf099d1eb12b653b8fcc5c3acd232988f27a19b24baed830f36d37a673d3a0075917a8331681973f062a3f902257ceb231b44e357cc7cb6691ae2411311b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57e455.TMP

                                                                      Filesize

                                                                      534B

                                                                      MD5

                                                                      013f62ba50801fae472e736152ee69bb

                                                                      SHA1

                                                                      fc76f65416f2435a7b37114e19220ffe26ac22bb

                                                                      SHA256

                                                                      2d81d30ad117e9bae8ff584bd535bfc163386eba0ea501bebe581d4b46f2b93d

                                                                      SHA512

                                                                      2abf10a28f8ad84702a2b2448f722ea9994b8d55936a07469acabb382f90f750e4e7356906fa790676c6b8975e7228c9e12ff626b6a135dc55563b466327a568

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                      SHA1

                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                      SHA256

                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                      SHA512

                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      5da019c7e95fe576f3a6960c5b7f34ef

                                                                      SHA1

                                                                      9236b8eb2e59a4cf9860a46a65e425ff66b1e5b9

                                                                      SHA256

                                                                      e2a53b7faff09b8ec2f1c82c4a2524204389aa31b2f5c19db5a85119e23098c2

                                                                      SHA512

                                                                      1d2e353f6ec2e60d6aaf8eaef30956ee59e3f50e76b20fecc2d66abb40e9d4a7433ea37ce947a8733453097df89d2a5f1878fef128c9ccc4d2639fcaedeeeb16

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      af7b5edf16c685100043b35745f4a772

                                                                      SHA1

                                                                      5a5e87ba6318329e99075f8f25ada0c8cd65e31f

                                                                      SHA256

                                                                      22854403c4c508a6c7ffda2a157c287ad02d60613c5e98280c8deae890698e91

                                                                      SHA512

                                                                      d760bb72d8516cfa748f6efab9eb191cdaf41c3475767348f188a7cd71eeb5a4593bb31ee012d10d1d176a584ff8f0fcb374ea772f0ce2a0ec55f0ddb63d9384

                                                                    • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\Cov29Cry.exe.death

                                                                      Filesize

                                                                      103KB

                                                                      MD5

                                                                      8bcd083e16af6c15e14520d5a0bd7e6a

                                                                      SHA1

                                                                      c4d2f35d1fdb295db887f31bbc9237ac9263d782

                                                                      SHA256

                                                                      b4f78ff66dc3f5f8ddd694166e6b596d533830792f9b5f1634d3f5f17d6a884a

                                                                      SHA512

                                                                      35999577be0626b50eeab65b493d48af2ab42b699f7241d2780647bf7d72069216d99f5f708337a109e79b9c9229613b8341f44c6d96245fd1f3ac9f05814d6a

                                                                    • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\Cov29LockScreen.exe

                                                                      Filesize

                                                                      48KB

                                                                      MD5

                                                                      f724c6da46dc54e6737db821f9b62d77

                                                                      SHA1

                                                                      e35d5587326c61f4d7abd75f2f0fc1251b961977

                                                                      SHA256

                                                                      6cde4a9f109ae5473703c4f5962f43024d71d2138cbd889223283e7b71e5911c

                                                                      SHA512

                                                                      6f83dd7821828771a9cae34881c611522f6b5a567f5832f9e4b9b4b59bf495f40ad78678bd86cba59d32ea8644b4aa5f052552774fea142b9d6da625b55b6afc

                                                                    • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\TrojanRansomCovid29.bat

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      57f0432c8e31d4ff4da7962db27ef4e8

                                                                      SHA1

                                                                      d5023b3123c0b7fae683588ac0480cd2731a0c5e

                                                                      SHA256

                                                                      b82e64e533789c639d8e193b78e06fc028ea227f55d7568865120be080179afc

                                                                      SHA512

                                                                      bc082486503a95f8e2ce7689d31423386a03054c5e8e20e61250ca7b7a701e98489f5932eba4837e05ec935057f18633798a10f6f84573a95fcf086ee7cabcbf

                                                                    • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\fakeerror.vbs

                                                                      Filesize

                                                                      144B

                                                                      MD5

                                                                      c0437fe3a53e181c5e904f2d13431718

                                                                      SHA1

                                                                      44f9547e7259a7fb4fe718e42e499371aa188ab6

                                                                      SHA256

                                                                      f2571f03eb9d5ee4dca29a8fec1317ded02973c5dd233d582f56cebe98544f22

                                                                      SHA512

                                                                      a6b488fc74dc69fc4227f92a06deb297d19cd54b0e07659f9c9a76ce15d1ef1d8fa4d607acdd03d30d3e2be2a0f59503e27fc95f03f3006e137fa2f92825e7e3

                                                                    • C:\Users\Admin\AppData\Local\Temp\CAD3.tmp\mbr.exe.danger

                                                                      Filesize

                                                                      1.3MB

                                                                      MD5

                                                                      35af6068d91ba1cc6ce21b461f242f94

                                                                      SHA1

                                                                      cb054789ff03aa1617a6f5741ad53e4598184ffa

                                                                      SHA256

                                                                      9ac99df89c676a55b48de00384506f4c232c75956b1e465f7fe437266002655e

                                                                      SHA512

                                                                      136e3066c6e44af30691bcd76d9af304af0edf69f350211cf74d6713c4c952817a551757194b71c3b49ac3f87a6f0aa88fb80eb1e770d0f0dd82b29bfce80169

                                                                    • C:\Users\Admin\Desktop\covid29-is-here.txt

                                                                      Filesize

                                                                      861B

                                                                      MD5

                                                                      c53dee51c26d1d759667c25918d3ed10

                                                                      SHA1

                                                                      da194c2de15b232811ba9d43a46194d9729507f0

                                                                      SHA256

                                                                      dd5b3d185ae1809407e7822de4fced945115b48cc33b2950a8da9ebd77a68c52

                                                                      SHA512

                                                                      da41cef03f1b5f21a1fca2cfbf1b2b180c261a75d391be3a1ba36e8d4d4aefab8db024391bbee06b99de0cb0b8eb8c89f2a304c27e20c0af171b77db33b2d12c

                                                                    • C:\Users\Admin\Downloads\Covid29 Ransomware.zip

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      272d3e458250acd2ea839eb24b427ce5

                                                                      SHA1

                                                                      fae7194da5c969f2d8220ed9250aa1de7bf56609

                                                                      SHA256

                                                                      bbb5c6b4f85c81a323d11d34629776e99ca40e983c5ce0d0a3d540addb1c2fe3

                                                                      SHA512

                                                                      d05bb280775515b6eedf717f88d63ed11edbaae01321ec593ecc0725b348e9a0caacf7ebcd2c25a6e0dc79b2cdae127df5aa380b48480332a6f5cd2b32d4e55c

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 658959.crdownload

                                                                      Filesize

                                                                      234KB

                                                                      MD5

                                                                      fedb45ddbd72fc70a81c789763038d81

                                                                      SHA1

                                                                      f1ed20c626d0a7ca2808ed768e7d7b319bc4c84a

                                                                      SHA256

                                                                      eacd5ed86a8ddd368a1089c7b97b791258e3eeb89c76c6da829b58d469f654b2

                                                                      SHA512

                                                                      813c0367f3aeceea9be02ffad4bfa8092ea44b428e68db8f3f33e45e4e5e53599d985fa79a708679b6957cbd04d9b9d67b288137fa71ac5a59e917b8792c8298

                                                                    • memory/1740-722-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                      Filesize

                                                                      864KB

                                                                    • memory/2428-692-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                                      Filesize

                                                                      1.8MB

                                                                    • memory/2428-815-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                                      Filesize

                                                                      1.8MB

                                                                    • memory/4412-725-0x0000000000780000-0x00000000007A0000-memory.dmp

                                                                      Filesize

                                                                      128KB