Analysis
-
max time kernel
148s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00485.7z
Resource
win10v2004-20240910-en
General
-
Target
RNSM00485.7z
-
Size
87.6MB
-
MD5
5b1da65dd7ed7e9e5d312a026df4885b
-
SHA1
3344a7e253171021810ff7ce811e2af145fc2597
-
SHA256
f3170231517827449a742bdc83b583fbb5edf9d8e76a34cbd84d272e3ff459ac
-
SHA512
2b3209e47f1885456ac15445623d28b5813f04b44dda739a245163c27405a0badda80bda15b2bbd5b1a6f7efb3031e97972c2c587ea1b2d5b67d5fc7620080ed
-
SSDEEP
1572864:b82AMynfhxPbX8X0g0mSwDdhufaECb6zAsHg/8GGZdTiVcoHAdjBNq2emRR+ey:b82+fhxPbYtSwXuX9EygEGoiHAdjDj0
Malware Config
Extracted
djvu
http://rlrz.org/fhsgtsspen6/get.php
http://securebiz.org/fhsgtsspen6/get.php
http://rlrz.org/lancer/get.php
-
extension
.nqsq
-
offline_id
OGykROpbgxJhrG1qc9yB9PwnsSv1Eo04vOCP0rt1
-
payload_url
http://znpst.top/dl/build2.exe
http://rlrz.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-O1iz3esfm2 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0337gSd743d
Extracted
tofsee
43.231.4.7
lazystax.ru
Extracted
darkcomet
Pipi
marcdalore.no-ip.org:1604
88.183.228.159:1604
DC_MUTEX-0BMFXWE
-
gencode
FeC9DbbRqtxp
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
asyncrat
0.5.7B
Default
185.219.176.155:6089
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
snakekeylogger
https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendMessage?chat_id=1063661839
Signatures
-
Detected Djvu ransomware 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3692-548-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3692-544-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1952-563-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1952-562-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/316-992-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/316-990-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1952-1295-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/316-2091-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3692-2246-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3552-2343-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3552-2341-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5972-2510-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5972-2509-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3552-3183-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3552-3182-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3692-4154-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5972-4199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe -
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-14294-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/792-11711-0x0000000002F00000-0x0000000002F12000-memory.dmp family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 236 bcdedit.exe 4052 bcdedit.exe 6328 bcdedit.exe 7844 bcdedit.exe -
Renames multiple (549) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Creates new service(s) 2 TTPs
-
Processes:
wbadmin.exewbadmin.exepid process 3508 wbadmin.exe 4620 wbadmin.exe -
Modifies Windows Firewall 2 TTPs 5 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 5264 netsh.exe 5916 netsh.exe 5644 netsh.exe 2040 netsh.exe 8168 netsh.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exewmisecure64.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exepxmqdbkk.exeHEUR-Trojan.MSIL.Crypt.gen-998fde7facc565b91618ecbff1a0c3e06cce2fcf8441371b4fc4eebc9988d3d4.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exewinlogon.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation wmisecure64.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation pxmqdbkk.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-998fde7facc565b91618ecbff1a0c3e06cce2fcf8441371b4fc4eebc9988d3d4.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 14 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exeHEUR-Trojan.MSIL.Crypt.gen-b4c2a47860316121bcdbff33895b0015f81d59f42ca18fcdc3adf30a4a718bf8.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exetaskmgr.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleUpdate.exe HEUR-Trojan.MSIL.Crypt.gen-b4c2a47860316121bcdbff33895b0015f81d59f42ca18fcdc3adf30a4a718bf8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleUpdate.exe HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\googleupdate.exe taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleUpdate.exe HEUR-Trojan.MSIL.Crypt.gen-b4c2a47860316121bcdbff33895b0015f81d59f42ca18fcdc3adf30a4a718bf8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleUpdate.exe.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\googleupdate.exe.id[d5838490-3216].[[email protected]].eking taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.lnk.id[d5838490-3216].[[email protected]].eking taskmgr.exe -
Executes dropped EXE 64 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exeMais Arquivos.exewmiintegrator.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exewmihostwin.exewmimic.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exewmisecure.exewmisecure64.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exezbhnd.exeHEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exeimportações.exeHEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exewmiintegrator.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exewmihostwin.exewmimic.exewmisecure.exewmisecure64.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan.MSIL.Crypt.gen-1bcb5256d3c0ac49ce2b13c2638d2a795f6cdf77591d29cb01d0b3731615470b.exewinlogon.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exepxmqdbkk.exeHEUR-Trojan.MSIL.Crypt.gen-28961276caaabb50b21d63dc68bfe3acfa2ed2912198b3fe8cd2473384795d2b.exeHEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan.MSIL.Crypt.gen-3c34c23aef8934651937c31be7420d2fc8a22ca260f5afdda0f08f4d3730ae59.exewinlogon.exe7D57AD13E21.exeHEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exeScegli_nome_allegato.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeScegli_nome_allegato.exeHEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.execsrss.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan.MSIL.Crypt.gen-46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan.MSIL.Crypt.gen-4cf07665a381ee6673a88a0afe2c3b65b97ac42954e2db434d7634aeac7bf550.exeHEUR-Trojan.MSIL.Crypt.gen-5d5c077abcdc9f8be9e37508c2f0d9056c629adcb5f7b890bf04dfcf1fe8acea.exeHEUR-Trojan.MSIL.Crypt.gen-60bd8bb9ba6573b1e02039851841dc42eb70dd59b1f033d18c39aeb572fbbd8c.exeHEUR-Trojan.MSIL.Crypt.gen-71f0524220c02e27c282f118bd1da387695c2d805934cb4bf1362f8f1f5b0c5c.exeHEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exepid process 3100 HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe 4720 HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe 3704 HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe 3940 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe 4744 HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe 2852 HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe 1440 Mais Arquivos.exe 1892 wmiintegrator.exe 1948 HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe 940 wmihostwin.exe 452 wmimic.exe 1068 HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe 1964 wmisecure.exe 4668 wmisecure64.exe 3444 HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe 1056 zbhnd.exe 4176 HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe 3944 importações.exe 2544 HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe 4652 HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe 5032 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe 2196 HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe 1644 wmiintegrator.exe 4920 HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe 4592 wmihostwin.exe 912 wmimic.exe 2032 wmisecure.exe 1988 wmisecure64.exe 828 HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe 3692 HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe 4004 HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe 5080 HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe 1952 HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe 2780 HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe 316 HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe 4732 HEUR-Trojan.MSIL.Crypt.gen-1bcb5256d3c0ac49ce2b13c2638d2a795f6cdf77591d29cb01d0b3731615470b.exe 4888 winlogon.exe 756 HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe 4424 HEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exe 5980 HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe 3552 HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe 5972 HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe 5828 pxmqdbkk.exe 5724 HEUR-Trojan.MSIL.Crypt.gen-28961276caaabb50b21d63dc68bfe3acfa2ed2912198b3fe8cd2473384795d2b.exe 6108 HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe 5292 HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe 1964 HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe 6120 HEUR-Trojan.MSIL.Crypt.gen-3c34c23aef8934651937c31be7420d2fc8a22ca260f5afdda0f08f4d3730ae59.exe 6176 winlogon.exe 6764 7D57AD13E21.exe 5116 HEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exe 5932 Scegli_nome_allegato.exe 1332 HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe 7056 Scegli_nome_allegato.exe 6920 HEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.exe 5456 csrss.exe 7096 HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe 1796 HEUR-Trojan.MSIL.Crypt.gen-46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422.exe 1952 HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe 6812 HEUR-Trojan.MSIL.Crypt.gen-4cf07665a381ee6673a88a0afe2c3b65b97ac42954e2db434d7634aeac7bf550.exe 2940 HEUR-Trojan.MSIL.Crypt.gen-5d5c077abcdc9f8be9e37508c2f0d9056c629adcb5f7b890bf04dfcf1fe8acea.exe 6820 HEUR-Trojan.MSIL.Crypt.gen-60bd8bb9ba6573b1e02039851841dc42eb70dd59b1f033d18c39aeb572fbbd8c.exe 4488 HEUR-Trojan.MSIL.Crypt.gen-71f0524220c02e27c282f118bd1da387695c2d805934cb4bf1362f8f1f5b0c5c.exe 6204 HEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2852-493-0x0000025E36480000-0x0000025E36510000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 21 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exereg.execsrss.exereg.exereg.exereg.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exereg.exereg.exewinlogon.exereg.exereg.exereg.exereg.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe\"" HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\Winlogon\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8364c4df-e63d-4aea-a177-476ee4997aca\\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe\" --AutoStart" HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\Winlogon\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d = "C:\\Users\\Admin\\AppData\\Local\\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe" HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzydtaba = "\"C:\\Users\\Admin\\pxmqdbkk.exe\"" HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d = "C:\\Users\\Admin\\AppData\\Local\\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe" HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\Winlogon\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\Winlogon\\winlogon.exe" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exeHEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exedescription ioc process File opened for modification C:\Users\Public\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2629364133-3182087385-364449604-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Public\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Public\Music\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Music\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Searches\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe File opened for modification C:\Users\Admin\Documents\desktop.ini HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Public\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Links\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2629364133-3182087385-364449604-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exedescription ioc process File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 62 discord.com 119 iplogger.org 120 iplogger.org 132 discord.com 53 discord.com 54 discord.com 60 discord.com 61 discord.com -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 50 api.ipify.org 52 api.2ip.ua 85 api.2ip.ua 44 api.2ip.ua 97 api.2ip.ua 45 api.2ip.ua 91 api.2ip.ua 134 checkip.dyndns.org 138 freegeoip.app 139 freegeoip.app 51 api.ipify.org 63 api.2ip.ua 67 api.2ip.ua 71 api.2ip.ua -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exedescription ioc process File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe -
Drops file in System32 directory 3 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exedescription ioc process File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exewinlogon.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe7D57AD13E21.exeHEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exedescription pid process target process PID 2196 set thread context of 3692 2196 HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe PID 5080 set thread context of 1952 5080 HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe PID 4004 set thread context of 316 4004 HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe PID 756 set thread context of 3552 756 HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe PID 2780 set thread context of 5972 2780 HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe PID 4888 set thread context of 6176 4888 winlogon.exe winlogon.exe PID 5980 set thread context of 1332 5980 HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe PID 5292 set thread context of 7096 5292 HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe PID 1964 set thread context of 1952 1964 HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe PID 6764 set thread context of 5412 6764 7D57AD13E21.exe 7D57AD13E21.exe PID 6108 set thread context of 2040 6108 HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe -
Drops file in Program Files directory 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\vlc.mo HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libsamplerate_plugin.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupMedTile.scale-100.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.Concurrent.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_it.properties.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-ppd.xrm-ms.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\ONBttnIELinkedNotes.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\VisualElements\SmallLogoDev.png.DATA.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ShareProvider_CopyLink24x24.scale-125.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\scanAppLogo.png.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Security.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\identity_proxy\identity_helper.Sparse.Beta.msix.DATA HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\UIAutomationClientSideProviders.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nl-nl\ui-strings.js HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_hover_2x.png.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\api-ms-win-core-synch-l1-2-0.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\System.Printing.resources.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-black\WideTile.scale-125.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\add-comment-2x.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\System.Windows.Forms.resources.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-16_contrast-white.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-cef-win8.css.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\PublicAssemblies\extensibility.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Configuration.ConfigurationManager.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-60_altform-lightunplated.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription3-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-96.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected][D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_contrast-black.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Google\Update\1.3.36.371\goopdateres_iw.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.AddIn.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\ReachFramework.resources.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\dt_shmem.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\fontmanager.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libimem_plugin.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosMedTile.scale-100.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-20.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarSplashLogo.scale-200.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-72.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sk-sk\ui-strings.js.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-private-l1-1-0.dll HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_KMS_Client_AE-ppd.xrm-ms.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-80_altform-lightunplated.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\AppStore_icon.svg HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ar.pak HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\1033\EEINTL.DLL.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\ContactPhoto.scale-100.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\GameBar_StoreLogo.scale-200.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\info.png.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-ppd.xrm-ms.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalStoreLogo.scale-200.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_contrast-white.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Riblet.eftx HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMSB.TTF.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libsdl_image_plugin.dll.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubSmallTile.scale-125.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons.png HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome.dll.sig.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected][D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fi-fi\ui-strings.js.id[D5838490-3216].[[email protected]].eking HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 1796 sc.exe 5872 sc.exe 2740 sc.exe 3968 sc.exe 5248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exedescription ioc process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2416 828 WerFault.exe HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe 1516 4424 WerFault.exe HEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exe 5252 5828 WerFault.exe pxmqdbkk.exe 5412 6820 WerFault.exe HEUR-Trojan.MSIL.Crypt.gen-60bd8bb9ba6573b1e02039851841dc42eb70dd59b1f033d18c39aeb572fbbd8c.exe 5896 6808 WerFault.exe HEUR-Trojan.MSIL.Crypt.gen-cbba68b38ac9d1694b79a6c58863dcc556d593978da1c5d122b8ac1e0e8ef5cd.exe 5176 2040 WerFault.exe HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe 6172 6920 WerFault.exe HEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.exe 3684 3012 WerFault.exe HEUR-Trojan.MSIL.Crypt.gen-bc5aec803186c219d6a530934a8e63bb6273100c8e324b84279f8251f11a4b51.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmisecure.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exesc.exemshta.exe7D57AD13E21.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exereg.exeHEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exeScegli_nome_allegato.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.execmd.exeHEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.exeHEUR-Trojan.MSIL.Crypt.gen-ab98c7d6e2b3beba9fa4771132f3b8bcba387ccf1e24d9323ce7e56c0d532b26.exepxmqdbkk.execmd.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exeHEUR-Trojan.MSIL.Crypt.gen-abeb6a5732318dc90dda6d05548903746dedc7bb8b453201e8088a609689ddb4.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exewmihostwin.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exereg.exesc.exesc.exereg.exenetsh.execsrss.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exeimportações.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exemshta.exewmisecure.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exereg.exe343fa3d8-e53e-42bd-920c-91e3d1c84a8b.exe7D57AD13E21.execmd.exewmimic.execmd.exereg.exereg.exereg.execmd.exeHEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.execmd.exewmiintegrator.exewmisecure64.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exeHEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exemshta.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.execmd.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan.MSIL.Crypt.gen-71f0524220c02e27c282f118bd1da387695c2d805934cb4bf1362f8f1f5b0c5c.exeHEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exenetsh.exeHEUR-Trojan.MSIL.Crypt.gen-bc5aec803186c219d6a530934a8e63bb6273100c8e324b84279f8251f11a4b51.exeHEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exeicacls.exereg.exeHEUR-Trojan.MSIL.Crypt.gen-46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scegli_nome_allegato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-ab98c7d6e2b3beba9fa4771132f3b8bcba387ccf1e24d9323ce7e56c0d532b26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxmqdbkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-abeb6a5732318dc90dda6d05548903746dedc7bb8b453201e8088a609689ddb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language importações.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 343fa3d8-e53e-42bd-920c-91e3d1c84a8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-71f0524220c02e27c282f118bd1da387695c2d805934cb4bf1362f8f1f5b0c5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-bc5aec803186c219d6a530934a8e63bb6273100c8e324b84279f8251f11a4b51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exevds.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1220 vssadmin.exe 2520 vssadmin.exe -
Processes:
Scegli_nome_allegato.exeScegli_nome_allegato.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry class 6 IoCs
Processes:
importações.exewinlogon.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.execmd.exeOpenWith.exeMais Arquivos.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings importações.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings Mais Arquivos.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4740 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exetaskmgr.exetaskmgr.exepid process 4760 powershell.exe 4760 powershell.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exetaskmgr.exepid process 2796 7zFM.exe 5096 taskmgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exepid process 4652 HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exepowershell.exetaskmgr.exetaskmgr.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exeHEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exeWMIC.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exeHEUR-Trojan.MSIL.Crypt.gen-1bcb5256d3c0ac49ce2b13c2638d2a795f6cdf77591d29cb01d0b3731615470b.exeHEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exedescription pid process Token: SeRestorePrivilege 2796 7zFM.exe Token: 35 2796 7zFM.exe Token: SeSecurityPrivilege 2796 7zFM.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 2196 taskmgr.exe Token: SeSystemProfilePrivilege 2196 taskmgr.exe Token: SeCreateGlobalPrivilege 2196 taskmgr.exe Token: SeDebugPrivilege 5096 taskmgr.exe Token: SeSystemProfilePrivilege 5096 taskmgr.exe Token: SeCreateGlobalPrivilege 5096 taskmgr.exe Token: 33 2196 taskmgr.exe Token: SeIncBasePriorityPrivilege 2196 taskmgr.exe Token: SeDebugPrivilege 3704 HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe Token: SeDebugPrivilege 3100 HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe Token: SeDebugPrivilege 4720 HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe Token: 33 4720 HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe Token: SeIncBasePriorityPrivilege 4720 HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe Token: SeDebugPrivilege 2544 HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe Token: SeIncreaseQuotaPrivilege 1084 WMIC.exe Token: SeSecurityPrivilege 1084 WMIC.exe Token: SeTakeOwnershipPrivilege 1084 WMIC.exe Token: SeLoadDriverPrivilege 1084 WMIC.exe Token: SeSystemProfilePrivilege 1084 WMIC.exe Token: SeSystemtimePrivilege 1084 WMIC.exe Token: SeProfSingleProcessPrivilege 1084 WMIC.exe Token: SeIncBasePriorityPrivilege 1084 WMIC.exe Token: SeCreatePagefilePrivilege 1084 WMIC.exe Token: SeBackupPrivilege 1084 WMIC.exe Token: SeRestorePrivilege 1084 WMIC.exe Token: SeShutdownPrivilege 1084 WMIC.exe Token: SeDebugPrivilege 1084 WMIC.exe Token: SeSystemEnvironmentPrivilege 1084 WMIC.exe Token: SeRemoteShutdownPrivilege 1084 WMIC.exe Token: SeUndockPrivilege 1084 WMIC.exe Token: SeManageVolumePrivilege 1084 WMIC.exe Token: 33 1084 WMIC.exe Token: 34 1084 WMIC.exe Token: 35 1084 WMIC.exe Token: 36 1084 WMIC.exe Token: SeIncreaseQuotaPrivilege 1084 WMIC.exe Token: SeSecurityPrivilege 1084 WMIC.exe Token: SeTakeOwnershipPrivilege 1084 WMIC.exe Token: SeLoadDriverPrivilege 1084 WMIC.exe Token: SeSystemProfilePrivilege 1084 WMIC.exe Token: SeSystemtimePrivilege 1084 WMIC.exe Token: SeProfSingleProcessPrivilege 1084 WMIC.exe Token: SeIncBasePriorityPrivilege 1084 WMIC.exe Token: SeCreatePagefilePrivilege 1084 WMIC.exe Token: SeBackupPrivilege 1084 WMIC.exe Token: SeRestorePrivilege 1084 WMIC.exe Token: SeShutdownPrivilege 1084 WMIC.exe Token: SeDebugPrivilege 1084 WMIC.exe Token: SeSystemEnvironmentPrivilege 1084 WMIC.exe Token: SeRemoteShutdownPrivilege 1084 WMIC.exe Token: SeUndockPrivilege 1084 WMIC.exe Token: SeManageVolumePrivilege 1084 WMIC.exe Token: 33 1084 WMIC.exe Token: 34 1084 WMIC.exe Token: 35 1084 WMIC.exe Token: 36 1084 WMIC.exe Token: SeDebugPrivilege 4652 HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe Token: SeDebugPrivilege 2852 HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe Token: SeDebugPrivilege 4732 HEUR-Trojan.MSIL.Crypt.gen-1bcb5256d3c0ac49ce2b13c2638d2a795f6cdf77591d29cb01d0b3731615470b.exe Token: SeDebugPrivilege 4424 HEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid process 2796 7zFM.exe 2796 7zFM.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe 5096 taskmgr.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
OpenWith.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exewinlogon.exeScegli_nome_allegato.exeScegli_nome_allegato.exe7D57AD13E21.exepid process 5028 OpenWith.exe 2852 HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe 2852 HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe 6176 winlogon.exe 5932 Scegli_nome_allegato.exe 7056 Scegli_nome_allegato.exe 5932 Scegli_nome_allegato.exe 5932 Scegli_nome_allegato.exe 7056 Scegli_nome_allegato.exe 7056 Scegli_nome_allegato.exe 5412 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
powershell.exetaskmgr.execmd.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exeMais Arquivos.exewmiintegrator.exewmihostwin.exewmimic.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exeHEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exedescription pid process target process PID 4760 wrote to memory of 2128 4760 powershell.exe cmd.exe PID 4760 wrote to memory of 2128 4760 powershell.exe cmd.exe PID 2196 wrote to memory of 5096 2196 taskmgr.exe taskmgr.exe PID 2196 wrote to memory of 5096 2196 taskmgr.exe taskmgr.exe PID 2128 wrote to memory of 3100 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe PID 2128 wrote to memory of 3100 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe PID 2128 wrote to memory of 3100 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe PID 2128 wrote to memory of 4720 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe PID 2128 wrote to memory of 4720 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe PID 2128 wrote to memory of 4720 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe PID 2128 wrote to memory of 3704 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe PID 2128 wrote to memory of 3704 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe PID 2128 wrote to memory of 3704 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe PID 2128 wrote to memory of 3940 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe PID 2128 wrote to memory of 3940 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe PID 2128 wrote to memory of 3940 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe PID 2128 wrote to memory of 4744 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe PID 2128 wrote to memory of 4744 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe PID 2128 wrote to memory of 4744 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe PID 2128 wrote to memory of 2852 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe PID 2128 wrote to memory of 2852 2128 cmd.exe HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe PID 3940 wrote to memory of 1440 3940 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe Mais Arquivos.exe PID 3940 wrote to memory of 1440 3940 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe Mais Arquivos.exe PID 3940 wrote to memory of 1440 3940 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe Mais Arquivos.exe PID 1440 wrote to memory of 1892 1440 Mais Arquivos.exe svchost.exe PID 1440 wrote to memory of 1892 1440 Mais Arquivos.exe svchost.exe PID 1440 wrote to memory of 1892 1440 Mais Arquivos.exe svchost.exe PID 2128 wrote to memory of 1948 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe PID 2128 wrote to memory of 1948 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe PID 2128 wrote to memory of 1948 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe PID 1892 wrote to memory of 940 1892 wmiintegrator.exe wmihostwin.exe PID 1892 wrote to memory of 940 1892 wmiintegrator.exe wmihostwin.exe PID 1892 wrote to memory of 940 1892 wmiintegrator.exe wmihostwin.exe PID 940 wrote to memory of 452 940 wmihostwin.exe Conhost.exe PID 940 wrote to memory of 452 940 wmihostwin.exe Conhost.exe PID 940 wrote to memory of 452 940 wmihostwin.exe Conhost.exe PID 2128 wrote to memory of 1068 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe PID 2128 wrote to memory of 1068 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe PID 2128 wrote to memory of 1068 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe PID 452 wrote to memory of 1964 452 wmimic.exe HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe PID 452 wrote to memory of 1964 452 wmimic.exe HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe PID 452 wrote to memory of 1964 452 wmimic.exe HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe PID 452 wrote to memory of 4668 452 wmimic.exe wmisecure64.exe PID 452 wrote to memory of 4668 452 wmimic.exe wmisecure64.exe PID 452 wrote to memory of 4668 452 wmimic.exe wmisecure64.exe PID 2128 wrote to memory of 3444 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe PID 2128 wrote to memory of 3444 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe PID 2128 wrote to memory of 3444 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe PID 1948 wrote to memory of 1056 1948 HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe zbhnd.exe PID 1948 wrote to memory of 1056 1948 HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe zbhnd.exe PID 1948 wrote to memory of 1056 1948 HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe zbhnd.exe PID 2128 wrote to memory of 4176 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe PID 2128 wrote to memory of 4176 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe PID 2128 wrote to memory of 4176 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe PID 4176 wrote to memory of 3944 4176 HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe importações.exe PID 4176 wrote to memory of 3944 4176 HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe importações.exe PID 4176 wrote to memory of 3944 4176 HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe importações.exe PID 2128 wrote to memory of 2544 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe PID 2128 wrote to memory of 2544 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe PID 2128 wrote to memory of 2544 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe PID 2128 wrote to memory of 4652 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe PID 2128 wrote to memory of 4652 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe PID 2128 wrote to memory of 4652 2128 cmd.exe HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe PID 2128 wrote to memory of 5032 2128 cmd.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00485.7z1⤵
- Modifies registry class
PID:1860
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5028
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1488
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00485.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2796
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3100 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe" "C:\Users\Admin\AppData\Local\655.exe"4⤵
- System Location Discovery: System Language Discovery
PID:304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\655.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6820
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Roaming\Mais Arquivos.exe"C:\Users\Admin\AppData\Roaming\Mais Arquivos.exe" C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk37⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Roaming\Winlogon\winlogon.exe"C:\Users\Admin\AppData\Roaming\Winlogon\winlogon.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4888 -
C:\Users\Admin\AppData\Roaming\Winlogon\winlogon.exe"C:\Users\Admin\AppData\Roaming\Winlogon\winlogon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6176 -
C:\Users\Admin\AppData\Roaming\Winlogon\csrss.exe"C:\Users\Admin\AppData\Roaming\Winlogon\csrss.exe" -keyhide -prochide 6176 -reg C:\Users\Admin\AppData\Roaming\Winlogon\winlogon.exe -proc 6176 C:\Users\Admin\AppData\Roaming\Winlogon\winlogon.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5456 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
PID:1056 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5780 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6764 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5412 -
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:7056 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:5940 -
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5932 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exeHEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Roaming\importações.exe"C:\Users\Admin\AppData\Roaming\importações.exe" C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3944 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk5⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk26⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:912 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun8⤵
- Checks computer location settings
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5752 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5544 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:5872
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5808 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:5544
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5524 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
PID:7032 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
PID:3116 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7408 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
PID:5700 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7196
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7784
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:4284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:5780
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6468
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7736
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2020
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7836
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7064
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7740
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6468
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7408
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5564
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:7408
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7404
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:1012
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:3144
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7032
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2584
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6316
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7436
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2344
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:3904
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:8024
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5296
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2476
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7132
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2296
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6592
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:3224
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5352
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exeHEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exeHEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe"4⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2216
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1220 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:1120
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:236 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:4052 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:3508 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2532
-
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5264 -
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5644 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}4⤵
- System Location Discovery: System Language Discovery
PID:6012 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}4⤵
- System Location Discovery: System Language Discovery
PID:7488 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}4⤵PID:7464
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}4⤵
- System Location Discovery: System Language Discovery
PID:8096 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:280
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2520 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:7808
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:6328 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:7844 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:4620 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2196 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exeHEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:3692 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8364c4df-e63d-4aea-a177-476ee4997aca" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5292 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
PID:7096 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ngfkahih\4⤵
- System Location Discovery: System Language Discovery
PID:6064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fwecmhoc.exe" C:\Windows\SysWOW64\ngfkahih\4⤵
- System Location Discovery: System Language Discovery
PID:5780 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ngfkahih binPath= "C:\Windows\SysWOW64\ngfkahih\fwecmhoc.exe /d\"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe\"" type= own start= auto DisplayName= "wifi support"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:452
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ngfkahih "wifi internet conection"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5872 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ngfkahih4⤵
- Launches sc.exe
PID:2740 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5916 -
C:\Users\Admin\pxmqdbkk.exe"C:\Users\Admin\pxmqdbkk.exe" /d"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vrjjgvui.exe" C:\Windows\SysWOW64\ngfkahih\5⤵
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5724
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config ngfkahih binPath= "C:\Windows\SysWOW64\ngfkahih\vrjjgvui.exe /d\"C:\Users\Admin\pxmqdbkk.exe\""5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ngfkahih5⤵
- Launches sc.exe
PID:5248 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0761.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:6356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 10405⤵
- Program crash
PID:5252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 8164⤵
- Program crash
PID:2416 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4004 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exeHEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:316 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5980 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5080 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exeHEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:756 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-9afa91c839d958185548eccf40690eb7db7859a852ac06f3870a6165c287d6ba.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exeHEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5972 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-bfc23474bd0294407c55aa23133438d67617be22d65a6c4e2df0a598d797a90e.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-1bcb5256d3c0ac49ce2b13c2638d2a795f6cdf77591d29cb01d0b3731615470b.exeHEUR-Trojan.MSIL.Crypt.gen-1bcb5256d3c0ac49ce2b13c2638d2a795f6cdf77591d29cb01d0b3731615470b.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exeHEUR-Trojan.MSIL.Crypt.gen-2871a208b4188dc2186b70c4a91241c7169a3148c9efbb417f2988014974c298.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 15764⤵
- Program crash
PID:1516 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-28961276caaabb50b21d63dc68bfe3acfa2ed2912198b3fe8cd2473384795d2b.exeHEUR-Trojan.MSIL.Crypt.gen-28961276caaabb50b21d63dc68bfe3acfa2ed2912198b3fe8cd2473384795d2b.exe3⤵
- Executes dropped EXE
PID:5724 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exeHEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6108 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-36b7c16a7a1490ec208bf0c6bc8d32f02f6e57528cf31fbfdcea08c1b82a00a8.exe"4⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 11125⤵
- Program crash
PID:5176 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-3c34c23aef8934651937c31be7420d2fc8a22ca260f5afdda0f08f4d3730ae59.exeHEUR-Trojan.MSIL.Crypt.gen-3c34c23aef8934651937c31be7420d2fc8a22ca260f5afdda0f08f4d3730ae59.exe3⤵
- Executes dropped EXE
PID:6120 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exeHEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Roaming\model\print.exe"C:\Users\Admin\AppData\Roaming\model\print.exe"4⤵PID:4964
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:6360
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:276
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.exeHEUR-Trojan.MSIL.Crypt.gen-437d686b1aeadeaf68ede093afe4c391091c5afaacc79d006f3c2d5e0dc5317c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 12404⤵
- Program crash
PID:6172 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422.exeHEUR-Trojan.MSIL.Crypt.gen-46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-4cf07665a381ee6673a88a0afe2c3b65b97ac42954e2db434d7634aeac7bf550.exeHEUR-Trojan.MSIL.Crypt.gen-4cf07665a381ee6673a88a0afe2c3b65b97ac42954e2db434d7634aeac7bf550.exe3⤵
- Executes dropped EXE
PID:6812 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-5d5c077abcdc9f8be9e37508c2f0d9056c629adcb5f7b890bf04dfcf1fe8acea.exeHEUR-Trojan.MSIL.Crypt.gen-5d5c077abcdc9f8be9e37508c2f0d9056c629adcb5f7b890bf04dfcf1fe8acea.exe3⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"4⤵PID:2420
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:8168 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5916
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-60bd8bb9ba6573b1e02039851841dc42eb70dd59b1f033d18c39aeb572fbbd8c.exeHEUR-Trojan.MSIL.Crypt.gen-60bd8bb9ba6573b1e02039851841dc42eb70dd59b1f033d18c39aeb572fbbd8c.exe3⤵
- Executes dropped EXE
PID:6820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6820 -s 15724⤵
- Program crash
PID:5412 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-71f0524220c02e27c282f118bd1da387695c2d805934cb4bf1362f8f1f5b0c5c.exeHEUR-Trojan.MSIL.Crypt.gen-71f0524220c02e27c282f118bd1da387695c2d805934cb4bf1362f8f1f5b0c5c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exeHEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6204 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exe"C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-91a166f9a29ad832c9640078210a47e5afa928ab1a79a7b40d3b358e9c8bc5d5.exe"4⤵PID:828
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-998fde7facc565b91618ecbff1a0c3e06cce2fcf8441371b4fc4eebc9988d3d4.exeHEUR-Trojan.MSIL.Crypt.gen-998fde7facc565b91618ecbff1a0c3e06cce2fcf8441371b4fc4eebc9988d3d4.exe3⤵
- Checks computer location settings
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\343fa3d8-e53e-42bd-920c-91e3d1c84a8b.exe"C:\Users\Admin\AppData\Local\Temp\343fa3d8-e53e-42bd-920c-91e3d1c84a8b.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7940 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-a966e362af7fac45819e17b8464a7d6ff5741e5717c90b8a22e253762bcb5a70.exeHEUR-Trojan.MSIL.Crypt.gen-a966e362af7fac45819e17b8464a7d6ff5741e5717c90b8a22e253762bcb5a70.exe3⤵PID:6320
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-ab98c7d6e2b3beba9fa4771132f3b8bcba387ccf1e24d9323ce7e56c0d532b26.exeHEUR-Trojan.MSIL.Crypt.gen-ab98c7d6e2b3beba9fa4771132f3b8bcba387ccf1e24d9323ce7e56c0d532b26.exe3⤵
- System Location Discovery: System Language Discovery
PID:7180 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8684⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6496 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-abeb6a5732318dc90dda6d05548903746dedc7bb8b453201e8088a609689ddb4.exeHEUR-Trojan.MSIL.Crypt.gen-abeb6a5732318dc90dda6d05548903746dedc7bb8b453201e8088a609689ddb4.exe3⤵
- System Location Discovery: System Language Discovery
PID:7700 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-b4c2a47860316121bcdbff33895b0015f81d59f42ca18fcdc3adf30a4a718bf8.exeHEUR-Trojan.MSIL.Crypt.gen-b4c2a47860316121bcdbff33895b0015f81d59f42ca18fcdc3adf30a4a718bf8.exe3⤵
- Drops startup file
PID:792 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-bc5aec803186c219d6a530934a8e63bb6273100c8e324b84279f8251f11a4b51.exeHEUR-Trojan.MSIL.Crypt.gen-bc5aec803186c219d6a530934a8e63bb6273100c8e324b84279f8251f11a4b51.exe3⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 12404⤵
- Program crash
PID:3684 -
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-cbba68b38ac9d1694b79a6c58863dcc556d593978da1c5d122b8ac1e0e8ef5cd.exeHEUR-Trojan.MSIL.Crypt.gen-cbba68b38ac9d1694b79a6c58863dcc556d593978da1c5d122b8ac1e0e8ef5cd.exe3⤵PID:6808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6808 -s 15644⤵
- Program crash
PID:5896
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5096
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 828 -ip 8282⤵PID:6104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4424 -ip 44242⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5828 -ip 58282⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 6820 -ip 68202⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 6808 -ip 68082⤵PID:8084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2040 -ip 20402⤵PID:5264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6920 -ip 69202⤵PID:6328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3012 -ip 30122⤵PID:7844
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\433e21d553314b89998c8e7eb62afe3d /t 4992 /p 28522⤵PID:6248
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\8b24a227b286486c9ff5cc13c4b20dbf /t 7948 /p 80962⤵PID:960
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\f2ce1dcf0e82402bba63bdf15ce677cd /t 7208 /p 74882⤵PID:4372
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:6904
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:7376
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:7228
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:7740
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\info.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4740
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
5Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
4KB
MD5f80fa38d37eb2d1d1d3aec66003b5780
SHA1fd5e87fe12df96def7ec3823744c063ecbcf653d
SHA256eec418db69eab627d827a3d1b416ab5960af88ccde836a139f9c9c11d5556f55
SHA5123c1b9cf19759e80427cd81c53558f031ec0f404fdedf984f7a6635fadb64451a7a59ae4de16a41e4f508541c15e2a7dffcd65eb09cbc3eec442783e5d5a955d9
-
C:\Users\Admin\AppData\Local\Temp\7zECEA3F208\00485\Trojan-Ransom.Win32.Blocker.objk-3c9075ccd61cbc6ec824ea7f4027b599e003b61fe58dc85d0aa88d31ec15d9c7.exe
Filesize11.7MB
MD50d5ba61b2f65559e4a0540290a0b32c2
SHA1186ffbd701f572cea09e35794f01b3fed2583c93
SHA2563c9075ccd61cbc6ec824ea7f4027b599e003b61fe58dc85d0aa88d31ec15d9c7
SHA512005780ece41670c26e3ce27236b3b5f15b8f11749c19b2138ca7f775f4a8d1d13a392494b65e3c6f6af632ac2234b4dff9967665d1b7140ea721ce72527984c0
-
C:\Users\Admin\AppData\Local\Temp\7zECEA3F208\00485\Trojan.Win32.Kryptik.bnm-873e791ee50cbb57172066fbefbdc9879335a9723e78f05f0db6ac0273388e8a.exe
Filesize1.3MB
MD5650dac7401a7d05d739111b3c99d15ca
SHA13537f8162c125c40e5b581021741d3be770bb3a5
SHA256873e791ee50cbb57172066fbefbdc9879335a9723e78f05f0db6ac0273388e8a
SHA512366920e624ebec187f1bedfaf9e1b64144a66fa9f3912a40872aa9f41adb4880982a8bb11725ba8cb5e1b6d193de98dbc5581a4c6b66856b5738f07783bcaafe
-
Filesize
132KB
MD5c970682de70be4bc7d1e178ebe7e5331
SHA13e6a7d7191b67303c0103d28decf786c4e243504
SHA2565d5c077abcdc9f8be9e37508c2f0d9056c629adcb5f7b890bf04dfcf1fe8acea
SHA512c31f52fbd80325894fbcccdda5a1d9fd2c81ab52d5433d3cd8e5459ecd6cae64f252ed0142891a682cde1acfdcd9569c780af00b00d356f2658a63d59d097a5b
-
Filesize
175B
MD5006105453114febe220aa8292aea3d49
SHA190f89aebdbbede889ff332b160fc251ed49ef029
SHA25690e47c7e191ea4152454b6590a617c618e17b49c91aca9389d5fab4f54266b76
SHA51218e6d4a0afccbaf920f950e1f75fcdf13b36610babf82ef0f9bfcfd5083b5498b614e6e1a1cc34876561f71356110cf08e87295640e767abb76054a78b1ea573
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
112KB
MD52cd4a14c590e54f86b57c7ee67bc8778
SHA1e4b7361df844942460d20074891007ab469fad87
SHA256130d4225cab930803d7ead361b2d5111474f7bdc5543829a613543396b1b3714
SHA5128b18366116965796d5d0f9dd97826432c17e495f40f726b54a933ae79cb3a0c7f31365e4f00980d68ba67d4f59bda0816da4f111c3bf9588be9d0477f94be1e8
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5f0dcd0735cfcef0c15ceda75deb5cb3e
SHA1af257a650681983a6c9e087615165269a6d0ceab
SHA256d3ca053889263104532ef68de1a1200f5e1b1177cfeea702e882c5c4075c35ee
SHA512cc2a123eea72756ce0914ec7c2e077b9f14c6def40a3131fdc02d5f981c5c79bba7859d02296cb1a15e4ff2491818e91c3790706cf46fffdf9a7b7fcb5a33ec4
-
Filesize
8KB
MD5b1bc68029880fca99004dc66d5cb66f0
SHA17da5246e09b0ceb947d14301037e2656fb585988
SHA2561d53dabf975929e2874aad7e60561a431f4f8272e41f1018759c7ce1db582cfe
SHA51294186ce100e6c5d8659027570738f14f43d9bc7ffc6b4ae63ec850aa96ed4c01811f196e2c3a40b133072e4095d123d4034f6065f86c4d47bb1833e9e2fadde8
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
50KB
MD5b564a942ce2bf9b09dcfbbbb024af559
SHA1c36413cfa26912e20ee7e067473e867adde72501
SHA256d4f768fda9dedea79c45395db4057ffb70249b91ee6298e8d1b0c4974e888f01
SHA512d6aa2308243a7018b37c24f8f1dba2885dfed91f67b3d2c3650f8653bf50d996fddcd54f4811ea3826dbe3e8c97fba228632d860abccb5c94f599e04100b74b2
-
Filesize
8KB
MD5fad17fd76a4cddd68eb074f969ade63b
SHA15f79075737a8411c0c54640cd66486495b4ade5b
SHA25644b4927c45714382d83b067df05cb573fce524c3bf0d7695d4e8e3d499bdb2ae
SHA51219cf7d95eee69798902c6f42ea2f1dcc24a2c0a61059f76378ee7ee4f82e2caccf979c9570aabb479858e6dd7e5ccf0279bb329ad374d33dfd411f6c430f4cf4
-
Filesize
259KB
MD5a0412771fbc748a42ab9b9e8340bedbf
SHA1a203666a3f60327cd48cb1c71052bc31a0be5d94
SHA25677452beef9ca2df47b2de0939f12160dca92f1d6c4007c2538b7cabc4d245f14
SHA5125054a7334d79593cba781ee8f0a356a80609681a9ff4727806ec153e62652c9169bf54fbbd7423fae1186edc11552caf1e0f708cb0284d78b85607a071e03bb2
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad
-
Filesize
1024KB
MD5012d49503bb16562386ba84e27cdfa2e
SHA1b2cf1307b9fd6953c34c287b877ddce8b34f31ba
SHA2561a7edd7f07fe46baff2d5ee48af9ce5e5cf6ee0ebc8811bebfa8f568481c730c
SHA51283c49f8dc3e9879330e68dbf5f12f01cfac3a93c20b76114dae6a0d8c617d257e097137499123c2d170f9e47057600b575a05bb374a924384a285c58202768f7
-
Filesize
259KB
MD5b2757bcc1094d9ea8a57890ea11fa6b9
SHA1ab31c97cedf656e571f1294190180fa691c39446
SHA256659c4f520a07238a4781a78dc27c0bbfffacffbc12fe03b4747f86663e253408
SHA5129e19bed7ef41685fb2cb73355f9a16ac99ced97e2216a3f593d6e147b6da9f02d9edfe9ed76cccc9f503f3f9a8be8c7d8003eb5bf8e79320549aa36fe8898a0f
-
Filesize
1024KB
MD59994fce4a097a0e81f3990585fe4c00b
SHA1b6f57c87afc5baef95df2eeb4836060dfd04555a
SHA256359e068b989a1fed243146338d024f2f26a1f9c5ae1584eadd3062f14719053f
SHA5121b966cddfb16f5f3c2aae10bdaf8f256a91d055926ecafc01af216e037af8ef0ca71fbc362fadae40b17b995866ca5638ec8fac69c64f0bd231d3c30f9158bf6
-
Filesize
259KB
MD5e28eaad7b33fce1dd270bfcbe27043b8
SHA1fd934116ddee9d0ee2df44c45036cd8d013c2121
SHA256333073320c0a25882e3828e4d6f5bb65d11239f20e6be8bf4f4f7cbc78650887
SHA512c384f2bae2337f3cef5b6a6e9fa3e8d747070d86286c28fc05824072158dde2d6dcce8f1cd4c6b70e04dedea0919740ab000c928a6e30fc596618c9eb600eb05
-
Filesize
259KB
MD5735429bdf12ac67fe0927390f1518353
SHA132dea8f7c0c953f0c194b93ea43848617ae3966c
SHA256889dbbcc313f870bab67d90c266101656b9cb5de68e8f877b03ea774e8fc5ab9
SHA5121f89758f9c0885b6987057f2602ab8372f8ea8909cee9dad9f43ff18b87c9f705d1340aa99332aa57a17a987eaf0213dcc103536fc39b7c1b383f71f04ce5d40
-
Filesize
1024KB
MD522ab23f9f9825acd1b26e981b63b6702
SHA1ff196a787ea095cd223151fa924a49dc8364cce6
SHA256a50eb755c8d5dd3676e14a6411600ff4993987b4363d0e7facd191c30e999b8d
SHA512dfe12c05e0ce3ce223dbb17e6884a953e8739900021ef82c7b0ffc1f12d6ee338fea7d8aa785d34e0bc49a465364330b6e44658861c62192fac75b3687139586
-
Filesize
4KB
MD552476ffbbc7d384d95e750eb76d6b4cc
SHA11f3d8829eba6a46a86f24783ded36c4c2a09ddbc
SHA2565c94c0e04a64da945eea96c6e75770a93bef15068d4ceb30cc55055d25b501ea
SHA5126cd2ba08c7d1aa1f802f6324299bbc92b3dfd0cb4d4d8c731e4c1b34bf7143fa8475b4c5ce0448bbd279efa2ff841652f43a5cb41388a79ee3fba6874bb20c1e
-
Filesize
1024KB
MD55620ce37cd07b6f596709091001a4bea
SHA1f07a68d1d152add18fa8989a7036987467f018b7
SHA2565f65321017a5af9216dd4db4545400660c5cc4b0d1221a1d6353af06b4d1c15a
SHA512d0fd0d15a01c6a396f1b977214b54dc251d03fcff43a8b3e89d89d4ab46407d7efc0045c6d15884668961a5909b1787ebe0d0e8cf00e87a91291beeae6f5bb84
-
Filesize
78KB
MD5175b364c1b2922b284e3289b6ebc20b6
SHA10b04e230544e0114bfce6a351aa4485cfeb9234d
SHA256376f1b7a1d3a38c3eca2f869dffb4a27e1118b5e5bee2bcbca5a146c066918a3
SHA512c719eabbc765964589ba1ca38225fbf6da29b8c10648d49e0ab8916bbfda59c373b8ac1e28fe25ab3da78638e896e3cb414a60dadaa16a8df444c5ef2b8806ad
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-50b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d.exe
Filesize2.7MB
MD5961020fc5ab430a0471066e88aa8c4c6
SHA1532414c8b31fa7303c67ad8a0a87337bc6113bf0
SHA25650b584cc4677a24af400fb4682919ce3c2e3be14a9820681141acd6c44e7729d
SHA51237a3e6a1952d8071109436098f86f1278bee4f69cc7eebb2b44759d22d2cafdfe66d585e26a949cb2a35c04bc57c5537319bb8716c9ef760aacdeb56843b4085
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-5610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda.exe
Filesize857KB
MD57d0aa3ac75755d1f7b67f12d0a362356
SHA12c7308e44a5a72ba8c70ac7d846b8b3c1878461a
SHA2565610b2906ecd713913b4b7e2975788cecb0d19abf94a16d1f81d3b43e1b9adda
SHA5124b419222720e3ac88c4f166da8f2675bf772703728d7763dd471e4b0f180d2d71c2fe1ac6dd8f1d6747780c0ad24ef7556b198047853d2d9da389085b15810e1
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-72d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3.exe
Filesize3.0MB
MD52820ea0329208ef6950e350ba112f19c
SHA13935913ff07cfd847958a9416aefe195c640dc47
SHA25672d0b083aa7fe84ab302b5a1efa6351f891f1e3d2cc164627e9a89f989df3cb3
SHA51203cfc629ab5ee2b4a6ccf97030bc865ee5d79478f382d0d45bf7be9afb676f0aa2577b55a744ac7fcacebc5fa4c227620dc6a091360a4b7c5d01193336473239
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811.exe
Filesize259KB
MD524911eb866f79e707e508d44bc1b5765
SHA1608fa9bb94fb8e4209b4aa4599402a5bfcd5fe48
SHA256c72106b6cff6e8607dfe9a443c17d8b1ca178323f527f072d4b63c71ada0e811
SHA512dcb22487a2985162b4a66cecaccb41cf934c48045e3265fa1366e4c993bce631b316acfeb1ba411a4601c4326a2fa0fb75c7a1be8a2645a709a54ba554e84555
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Blocker.gen-e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc.exe
Filesize448KB
MD5836a2232c085d2bd7266ff66e243a0ba
SHA1904bb86906c4e32cc543ab57d67b26cf180074e4
SHA256e5986334029c7e764b566c306e942190f39231cfae586bf674f453e9b5d867bc
SHA5125fd1974cf23a8f9fd19638b50cea08b7cd2c46a49e92c488324118cb13e0c9419d0bf66ea858890a7733802a6a29e827624e37af4938a11f1c522e291700823e
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.MSIL.Gen.gen-53810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3.exe
Filesize12.9MB
MD52ec61d5f703251299b046d60accbcec6
SHA17ea4b02526174d55650187223b413c1f1c266437
SHA25653810db15c47cf14cdf4f2b205594ce54a69bad4b15ec57800f2bd4f391d34d3
SHA51211ba357853b054200d45c439dd2b303fd9be9d6e09fa78e719a4e3fcdefd1e8a98492f1aa314ac577f37eacbea67df4ee92b9d2b615ec86b9021ec57a8f8951b
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Blocker.pef-04cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6.exe
Filesize50KB
MD5958d5373e07f61f420c8e1bf25765d20
SHA11de009efa960ef1f82080799f062ae57456e958d
SHA25604cd6162181c33c5e5198b88439debb7a2b0cf4f7ffe270781122a895484c1f6
SHA512c6529120838aa38133ef2a9244115cb9adeea0a5bb9545045c7d9e9f5b8bb90c787839b4f24ae246ccf1ae86ba75e404b48b63751071918cf53970a52a1474e3
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Blocker.vho-2e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6.exe
Filesize7.7MB
MD5329f50e2b47d74c3bf7e6e44ff577899
SHA19932371935bd5095ddb7d48b07182a2c634de189
SHA2562e6fdc260e37c79e2fae1227cfece13f1945763f34aafb60983bb32aa93a5dc6
SHA51230e0831772f6a1c4e691be4a4bd684fdbacd6f84d9e90a80e77de7b6e7402f10405894792cbc11ead15464b623d77b2c7489b6b7221a5c46b8ccd51248b9b083
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Blocker.vho-997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815.exe
Filesize5.4MB
MD50c6d9b8b4daa38c4c1fb297acb213e41
SHA15c24728b9089b706e2fada3a90d498ba83eeca3f
SHA256997c83357b09436a7ef6ffff93cd2042fdf111e10ec5b787447fb44222dd2815
SHA5125772f785ef5ea1f97e579e155341b0fe3e92ceb7733e29ef3bbe48fc6dd3e95da39611ff0de35e8be07725266f1097e75c43d33453b8328e0fbdffade631a5d6
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Generic-a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319.exe
Filesize1024KB
MD5a1f7765d85a085e3fc89fdeb18f640f4
SHA1c9210d30737f1caa6a9b01e564432a67a9c1b004
SHA256a9c07957e93c0a33f107248d19a5c78ba005a338716bbf0aacfd40b695850319
SHA512653aa97222b1e893b846bcc8ba97b7899b255c7f4815615d9fc3d0a13d6282a68b6da454f92b0ec120fe5306382a1dae928d3f36752374c7bdfb7b79fdfa9b1f
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Generic-fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658.exe
Filesize62KB
MD5984ed804482b455638e29cfa56d91e86
SHA1608e262d942f5d464a68b9ffee0c83f99b99c901
SHA256fd8b588e1ee4f98e4498e9a39c29ca2fcb974b55680139a12cccb49657da7658
SHA512999915dea839739bf03814154ae2b96e4f433166af37d4e7a234ecbce2669ee0fae11bf82b2169820d436e9d2d8b3f2a5041f84068f85b9516f3031671841690
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Phobos.vho-d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d.exe
Filesize55KB
MD50b5a3e9cf2e6b51213f36685d43d1600
SHA1be83c8c6515e72d82fd5e0e3802a9b216e6685ef
SHA256d71748408052ff7047bdf2d6d29ecbca0be93522f8a03d00b405841ba818794d
SHA512498ad74dfa67a9a9fdf56275723a47fc93bb00e35bee10e516b2d880709ff3eadd4b76b36f16d0037d43c23456c2ffaf6788bdc9a9e120c0237cdbe22bf6d8fd
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1.exe
Filesize1024KB
MD564228b8bd37fd469685b12feb44b22f1
SHA11539e9cf06b34c384ae1d10e98ba6723067dce60
SHA256b3d54d34e2610f35ba15a83b56518ab8f1431c210344198f3356f04b1de403b1
SHA512c50125ee6ae3f9c5615a7f7334261205d16ad091528d955d53ac9e81c1ff7b9a4fa4b832c7d8c97f8c37e8ecbf5871f7e3290eb65362b9a8c62530d26f835c69
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-11a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0.exe
Filesize830KB
MD58fa538666a1e99ff4e77dbae8690c488
SHA117674dea310e121f6a4bd05ac310670dc9c4fc5a
SHA25611a83b7f651c007cef7ca9490fc560dbfda8cd6b538199e277047c8087c7cee0
SHA512ccb5f23a1c3c6a3d78ac48387bde590e922ea3a25d59ea749c5a2344d50acd2b638a133f16ee83e13c4955c8fa08b8045c37f8829926c0789c76cd02263d5f4d
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-2b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c.exe
Filesize12.4MB
MD553cdd911eebe425888996fab53d1c260
SHA110ac8003f029fe670195d2cc5d4cb605b415b829
SHA2562b448eb1fc9450030d7f785848b4569e3aebbda92eae96d0f60a9dcdae60ce2c
SHA512c718dd86ad2522e3c5af4dc9956c00f0a3cdf1201d9704f54b496dc4b8ddf14e885edbe9e5d40c993022dc8a6941d4da0d696f1a49c591c607a0e80347aaa444
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan-Ransom.Win32.Stop.gen-4b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2.exe
Filesize808KB
MD5b2a7ab12fd91fab7767d41fa9cf06369
SHA10af43e5510d68f712dc2e05bdab07a86cbdac895
SHA2564b3e6a191ab050a87aeeb8a650290c4e217e9508971beeb929417d13d89292e2
SHA512e601c95ffadb3035ad231246ba60bf2ff71d0cc21fa02903e04a28e476b748a2d7ba8b3eaa029352e94b07fe163b9e5a0801861b556622d6dd0c98ec85e183ae
-
C:\Users\Admin\Desktop\00485\HEUR-Trojan.MSIL.Crypt.gen-3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e.exe
Filesize908KB
MD515ff5326b957a8b747b95c47d6a65741
SHA10d9c5be1f1c3c71e4a7971743624932f834a3499
SHA2563db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e
SHA512ebe3f5a5294c82c0b92ba55770902b932ca2d708879d3a15f8940fe5602ca95434bfb1282cc93d7966ed23e1a28f1402ae3203cf0e12537820651a55d8717a59
-
Filesize
1B
MD500594fd4f42ba43fc1ca0427a0576295
SHA185e53271e14006f0265921d02d4d736cdc580b0b
SHA256a8100ae6aa1940d0b663bb31cd466142ebbdbd5187131b92d93818987832eb89
SHA5126700df6600b118ab0432715a7e8a68b0bf37cdf4adaf0fb9e2b3ebe04ad19c7032cbad55e932792af360bafaa09962e2e690652bc075b2dad0c30688ba2f31a3
-
Filesize
5KB
MD50608e8355c6945be7a822886f3201dbe
SHA1e77fb64e84e9b3d012da2d2bde04ca9c73d7ca22
SHA256245cf30c22092e35bbd3e2a7cbdf03c8e258c079a01b3e874ba3a5172f9a8dd0
SHA5126be559ea7749cae621e43a4646794c327a54e4770c64b8bb4399ac3182a27dc36bad313f8acf47ffcc762a69e712a98fc8ccd87cbcc2cf449c9aed908d0cd3f9
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
F:\AutoRun.exe.exe.id[D5838490-3216].[[email protected]].eking
Filesize2.8MB
MD5887a505005d0692a9d5051135f4d48d1
SHA121180a8220612a67022e55691d44b4511c5b6e92
SHA256fd8e1392e810a19a526bdbf8548dcb70830ea14e8e3cbd79870fc31633229032
SHA512d4bfb85f1a3f3d8fd9c10a8020a9c1392801145e60706ec6a28378b4e5d7f806051f2f8869e45593045386f2d26f4eef0a1dd05d5ac00e0c310925bca5a04a07