Overview
overview
10Static
static
1000b9b6cf27...f7.exe
windows7-x64
305500734fe...81.exe
windows7-x64
0b75e2fadf...c5.exe
windows7-x64
80d5fa75218...64.exe
windows7-x64
101760c5727e...9c.exe
windows7-x64
101fe99fb7c5...81.exe
windows7-x64
102336173567...98.exe
windows7-x64
102522b83852...03.exe
windows7-x64
102af6bc16f2...b2.exe
windows7-x64
103d9f9c162e...64.exe
windows7-x64
83db846a796...e5.exe
windows7-x64
10493813116f...dc.exe
windows7-x64
104d61a61265...08.exe
windows7-x64
10510827ce68...c5.exe
windows7-x64
105642f8bd3b...2a.exe
windows7-x64
106c37d14d5a...4c.exe
windows7-x64
106c3c9af653...c3.exe
windows7-x64
1077186e57b2...20.exe
windows7-x64
107bca70a81c...61.exe
windows7-x64
108e934dcd46...88.exe
windows7-x64
109a75c8e353...60.exe
windows7-x64
109e067453f0...f3.exe
windows7-x64
10Mydoom Ran...06.exe
windows7-x64
10Mydoom Ran...5c.exe
windows7-x64
10Mydoom Ran...fc.exe
windows7-x64
10Mydoom Ran...59.exe
windows7-x64
10Mydoom Ran...64.exe
windows7-x64
10Mydoom Ran...76.exe
windows7-x64
10a9a89ed0d1...0f.exe
windows7-x64
10b4ab8f5c8b...95.exe
windows7-x64
10c034313090...ef.exe
windows7-x64
8c45a330cf8...24.exe
windows7-x64
10Resubmissions
21-08-2024 19:30
240821-x76q3sweqg 1021-08-2024 17:42
240821-v92h2avgpj 1012-06-2024 16:01
240612-tgps4a1bqh 10Analysis
-
max time kernel
1433s -
max time network
1438s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 17:42
Behavioral task
behavioral1
Sample
00b9b6cf27deeda8de99d1719ef724808afa92080026df8dd17159be8ea420f7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
05500734fe07ac2b5bc89aa12b090203c4b74851cb0d62bd388f27ec6d6caa81.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
0b75e2fadffc45dff940e58f5b6f8d99832426bb880f432f98d853308b29c9c5.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
0d5fa75218e5eb97fccbcf36d3bbd9cd77247260977f69c50deb29399ee0e464.exe
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
1760c5727e5568d3b18a1cbf0d50c311613699af8233c96fb3eee197f438ce9c.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
1fe99fb7c527a90826896e695f23e712375358df3c7aa9163af6b96d872a9f81.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
23361735678f37d77510b22306c727a987f84c87143bb0062f3d76413c36fc98.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
2522b83852588bc0f7f620f9b4fe3a9337b9608be335d3958d190275f333df03.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
2af6bc16f25822d6d2f1429bc15f3d47f6c0bcb026ba387249d173fc753919b2.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
3d9f9c162e130c197301adb5a4e141f2e1ae8a19c85b457c429e8410a5c91464.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
3db846a796caa001666df8f7cae709fff02f984711b0e70e0e79c457d631b4e5.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
493813116f32ad6f455676cd54e32a2167ece845038202614cbb49e126f5afdc.exe
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
4d61a61265cdd942cff973609170529eaf19579b5d17e64deccbd6f6f1fdfa08.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
510827ce687ad00545a1726c25a00f65e7d685b7dcd857fc6f11a0392feee5c5.exe
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
5642f8bd3bc151349ded1a3c160c037c26194c9da2b7ace5d8ca11cddb57612a.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
6c37d14d5ad674e4c0fa8df0a999be6b27399936c9ff16f7fb30b802addb7b4c.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
6c3c9af653a28977257ce971ed701b1b893cdf67d5c57baa44a9d76c28675dc3.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
77186e57b2eeb3ed4b56cfe280d5eeea3155d9502217cda824600bc93d365320.exe
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
7bca70a81cc9e1067e99e313802a4cc095f79bbc3a1aa86b7b3b9eabf3748e61.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
8e934dcd46eb57d42712d097deab6ce00ef1ce2db87d03f8d3d8e8c10da7e088.exe
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
9a75c8e353df060ec927ada5990402b57764275f2a860d9cf500a661ec3de060.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
9e067453f09c5cbfa4c5a74fe3e70d7d8e66a25057e6c35240dce5a40ec31bf3.exe
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
Mydoom Ransomwares/1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Mydoom Ransomwares/1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
Mydoom Ransomwares/5458f18e36de21d20b713f7acd8575fc8a86330c466e1b9dc6f41bc81f3e79fc.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Mydoom Ransomwares/84ee7e5c055fd25204ca4969940292b03da9d45b5048cbb7f7ba8528b88a2859.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
Mydoom Ransomwares/cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Mydoom Ransomwares/dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
a9a89ed0d139fbc436794f5d3a8e58c547247039d8c86767b1e2f2bce40e390f.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
b4ab8f5c8b97307b328ba30fdefdbe4341c4e2c576729fdb5c7329d5b07bb695.exe
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
c03431309015563257e5e118656d07ce136f151339054b9f66894ecf9dde9aef.exe
Resource
win7-20240708-en
General
-
Target
Mydoom Ransomwares/1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe
-
Size
27KB
-
MD5
4ae2e5156253fbeed2c6f13a066c98a1
-
SHA1
db318de72c2cdda1822999441d23b91e933a772b
-
SHA256
1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c
-
SHA512
c00c1c47e4cffaa3078885bbca42e6663bb478ec33b5b742c752412b204af55bf94008868264d0b03279339017732330e64c52d3b20f55e347194f65f2147be2
-
SSDEEP
384:XLNAZPBVp/L9Z1oQEDQVbfANpC78rMNAtpDkjvr+jfXNIRXrrahrBDBkHqd7gasb:XCZ5jz9YQEMb4KN2ywrFuHeJsyO
Malware Config
Extracted
C:\$Recycle.Bin\How_To_Restore_Your_Files.txt
http://coindesk.com/information/how-can-i-buy-bitcoins
Extracted
C:\Users\Admin\Desktop\info.hta
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
Processes:
1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\info.hta = "C:\\Users\\Admin\\AppData\\Roaming\\Temp (x86)\\info.hta" 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U42VY3XA\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SX809FAK\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CGY9ZAGI\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Videos\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Music\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4NH6FMWO\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Documents\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\OORJZY5Z\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VUPQHL12\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UGUBWRQR\desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exedescription ioc process File created C:\Program Files\VideoLAN\VLC\locale\fur\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EURO\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Mail\de-DE\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Java\jre7\bin\server\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Common Files\System\msadc\en-US\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\System\msadc\fr-FR\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Windows Sidebar\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Internet Explorer\en-US\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Microsoft Games\FreeCell\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Microsoft Games\More Games\en-US\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\Windows Mail\en-US\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe File created C:\Program Files (x86)\How_To_Restore_Your_Files.txt 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
notepad.exenotepad.exeexplorer.execmd.exetimeout.exemshta.exe1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exemshta.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2692 timeout.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Opens file in notepad (likely ransom note) 2 IoCs
Processes:
notepad.exenotepad.exepid process 2664 notepad.exe 2564 notepad.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.execmd.exeexplorer.exedescription pid process target process PID 2432 wrote to memory of 2664 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2664 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2664 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2664 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2564 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2564 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2564 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2564 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe notepad.exe PID 2432 wrote to memory of 2104 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe explorer.exe PID 2432 wrote to memory of 2104 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe explorer.exe PID 2432 wrote to memory of 2104 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe explorer.exe PID 2432 wrote to memory of 2104 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe explorer.exe PID 2432 wrote to memory of 1740 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe mshta.exe PID 2432 wrote to memory of 1740 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe mshta.exe PID 2432 wrote to memory of 1740 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe mshta.exe PID 2432 wrote to memory of 1740 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe mshta.exe PID 2432 wrote to memory of 2756 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe cmd.exe PID 2432 wrote to memory of 2756 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe cmd.exe PID 2432 wrote to memory of 2756 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe cmd.exe PID 2432 wrote to memory of 2756 2432 1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe cmd.exe PID 2756 wrote to memory of 2692 2756 cmd.exe timeout.exe PID 2756 wrote to memory of 2692 2756 cmd.exe timeout.exe PID 2756 wrote to memory of 2692 2756 cmd.exe timeout.exe PID 2756 wrote to memory of 2692 2756 cmd.exe timeout.exe PID 2624 wrote to memory of 2320 2624 explorer.exe mshta.exe PID 2624 wrote to memory of 2320 2624 explorer.exe mshta.exe PID 2624 wrote to memory of 2320 2624 explorer.exe mshta.exe PID 2624 wrote to memory of 2320 2624 explorer.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe"C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\How_To_Restore_Your_Files.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2664 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\How_To_Restore_Your_Files.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2564 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\Desktop\info.hta2⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\info.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 2 && Del /Q /F C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1fb613ee3b0e7f96f5dea029aae31b86340b0724e88f84a76b386af84d1cf95c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2692
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2320
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c111bd7dadf4000cfe2996f4a5c31c4c
SHA161947a5acb689b52083f9ca7d475530577e86d35
SHA256d8da6f284666219f04326488348c0fb38986263a4211852689ea20dc69ef636c
SHA5129f018bcb204eee669a022f243e907034ec150aafdf62c86e54aa3ec19b195d66a4eb189ae9293360090f00b4fb0f56337c965c1ee4ffcd935273273aa9f146a7
-
C:\ProgramData\Microsoft\Assistance\Client\1.0\fr-FR\Help_MValidator.Lck.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize16B
MD5f65d3bfa5ea21cf34b1b375bece5ad48
SHA17fa0aad2661664fb4ad0ab05ff42579729ae87da
SHA2569367e6f4b5fe319b139efec40c66f9ba8b1c0dc75cabd0058fe90422cc828a6b
SHA512e10a2823240dc00f89eb9341ae9661656396f4deb74a28a2fd41c8e3092cadf64f1edb270eb0ff510075b23557d0cbf902551d3a284f9c2a8e8a90dac32b2d80
-
C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize140KB
MD504dd87004cf81deb371b5a7256e7da5a
SHA168cc8b27126dc98d026b33fc049a7a35372cbfcd
SHA256bef47833e42a81321704b8a1187f368af8fe456af374def489b49a3a760e85b2
SHA51206f4206148a60e0408c716e1afd3a934996342cb5626bc5cf0457b7d0eedb5dabc27f9d9b120ed4864b96dd2d05d0999ba5c07b050712f8c897cabb9377df34a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_2.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize8KB
MD55f4605d57649dfbabefe76ee9b0b9483
SHA17a475d1ba03717fc7a65bf3b08a4cbe9f3015f9f
SHA2569bbe37db06fffd531506e15b3bae561e62d066c5f5ab0fb08026b09d0e8dc0f0
SHA5126ea17ebaf9c332ed6f00f62a05fdc7b952065b3910141596781463890201f56e1a1407f43781f32cb1e636d1cbffb2cf63d79569cc54598eb51549f5aebc8daf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize32B
MD56f04b271d510cf560a49347d52f7a0b9
SHA18029c2e3f15d37093b94a2eed3164c2d1c19cf30
SHA2567a8645e12f08326ec8f56c246d015d107f08ced4957d3fde5c88aea4ff286022
SHA5127cd6409ef7b9818a9c39396e31d03e9361bf41026e8c6b2ddfecd3352d3ee8968758af2f2439ac1d40779809c0bf9d07f5e8d6f858621131849186089f885a81
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UGUBWRQR\desktop.ini.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize80B
MD5f0c759f5e4a742b2e95976bc7cf63688
SHA13a2497d0879a4e8bd92b1462326dc9b66fb0d71c
SHA256c75b89de10e8d676febd9b6e2fb7e179cb10e307e50562847810cd8a338145eb
SHA51250d8189ac36c4c70e7d24269ac036ae5aba184e2d991ff0b921d97f3f45f410935296ba5938219e15f6a878d77a11717993acdb74f3f26c6864870f5715d137c
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize28KB
MD5772d9ccf38731ea7fa8e104e1766a19c
SHA1cad18ca149a77f9e963157b13135fa6b72fd3158
SHA256999157935b240680033cef91ad6709bcf7db6bcf05165b4bc44af953dc979265
SHA51293eb00512eee86ee0fa52396691748c3368ad0a44d0fbb2c20ecca384b9b26711a15a3d98cc69963de26b196739679bbbafde220f747e38780bcf21d117dbba4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01res00001.jrs.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize512KB
MD5893cd9f85e0acc574ba5fd4a8940e1fe
SHA1abf03a61e0a5a05c90fa4c2fe18b64dbf068f5d6
SHA256c06041ab4e005eb9f75ac740d1ad96e9dd60bf193a0c7621d764d46f154137b4
SHA5125c15339c452e69cff2ef6dd5c6f86e40d36dd07f93e14a314688a16cb1e5f61f326032dac377fe89202963e5d297f2fa83ef4cca2089995d51b97d594a604f79
-
C:\Users\Admin\AppData\Local\Temp\6c3c9af653a28977257ce971ed701b1b893cdf67d5c57baa44a9d76c28675dc3.exe.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize21KB
MD58e9c41b68beff9dae5fb55e1c35b046d
SHA16a79f28bc0658121dc8de18a2fb5154190ffac3f
SHA25679ebc716b33b5a9953ba6d3f7436a923cf4db2bbe0892f31d71f52d81e392214
SHA512411b10f93d11495d7df54c7077e2a7e1d1f512c01c2be42b79d78c95bbd70232432b7b23b9d62b38af2f4d915477185c78f18960123ae8dc3e2632b43dffb7b1
-
C:\Users\Admin\AppData\Local\Temp\7bca70a81cc9e1067e99e313802a4cc095f79bbc3a1aa86b7b3b9eabf3748e61.exe.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize29KB
MD5b5d9286149fdaf849daf0d25cda852d1
SHA1566abe5b920161f35826a31d355576ab8cc2a501
SHA256eb87a478ec0ce2ccbdbf89d1a90e8944deb76874abeb29133e3e0003d5471970
SHA51224dea815028de190702d079504afc8973e49e304e58cb06f35bbb70e5ef5de5bb1386a0e009ada44e800a97e482bba1067177d5941a4a271da17c533c875a7aa
-
C:\Users\Admin\AppData\Local\Temp\KnoA46C.tmp.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize16B
MD5fa7152b3abc872fdcd95aec66bfdfd79
SHA150cee66006aebd60af612c62f3f240ae18db45f2
SHA256b7100ae2e96bbfacc91023e0663a228b4a199e87300b9d7597ad2602ab987c57
SHA512d6bbb6eca3f1a3336010461bed51de2a077fae9c8c6786ec047664fa328bf6c4ad7ecd7a11a40eae3a567a66387121e9ee54cba4a01484dd0865171f9f864741
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.CoronaCrypt[[email protected]]-[ID-942A0EF7].Encrypted
Filesize48KB
MD5020ad4297233c62a2ff882b748fe6af5
SHA1a5de7b3c32b75d3a1ef538b575f8731b34262204
SHA256fc0ac366a17988d79050a01b50146788ebc5f48a275538a6bb085458c0d84ac8
SHA512ef2aaa8d35c06e45fbdd7cb33c9cf31dad4b4ec64a7316f69474f81856b38f80222b0fb1443ac0fa10ff0ac3b66a505773f86b470ed9b692b3761e8f69f40eee
-
Filesize
5KB
MD594c69473c99c27709bcde6ec76f39560
SHA1b2fc2c4d8e39ce939ebc39d0d6fde2d64c94c736
SHA2560a200960923bc5b56e85652ceb446ca88c21192cd3acd75da0278d250d55dad0
SHA5129afd4314afb864e7795da6dc4cbde2ed43c31c44e984ed94b4bb8323db485addd5e80401153176008ae7a818734b466c405972d1f89b29aed2d41bd86675f700