Analysis
-
max time kernel
93s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00483.7z
Resource
win10v2004-20240802-en
General
-
Target
RNSM00483.7z
-
Size
47.3MB
-
MD5
089cee221e08d8edad93795d4a0ddacf
-
SHA1
56c1ef11b308e8def30e19a8cd2b5d908eb20c78
-
SHA256
75f2278a58d14d126c9bce4e31b527cd258bf00ff36ea128374a5f2bf0f86e5c
-
SHA512
ea2f9f01ca0681e73d27c03b609a0c3ecdc9cc78d4eda03d88e844961a267ba63d81caa6e5f3cd6ce122a243b8dcef5fa5c600ac1b410aede0a8f1dd4ed0db17
-
SSDEEP
786432:4g8X+Ijnxcyzew9udeAhP5XltZehEExusKZhdINIsLyVhm08ek9GLEUUSccH0I:4FuMxZeL0YrzE3qdMLyVh7orUUSh
Malware Config
Extracted
C:\$Recycle.Bin\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/f0598199c13cc0e6
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Detect MafiaWare666 ransomware 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe family_mafiaware666 behavioral1/memory/1168-219-0x0000000000420000-0x00000000004B0000-memory.dmp family_mafiaware666 -
GandCrab payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2096-1016-0x0000000000400000-0x0000000000B4B000-memory.dmp family_gandcrab behavioral1/memory/2096-1017-0x0000000000C10000-0x0000000000C27000-memory.dmp family_gandcrab behavioral1/memory/2096-1068-0x0000000000400000-0x0000000000B4B000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (161) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (361) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall 2 TTPs 6 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 5380 netsh.exe 5764 netsh.exe 6032 netsh.exe 6348 netsh.exe 6076 netsh.exe 6204 netsh.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exewmisecure64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmisecure64.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\KRAB-DECRYPT.txt HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\c13cc70bc13cc0e916.lock HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe -
Executes dropped EXE 25 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exePayload.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exezbhnd.exezbhnd.exeHEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exeHacı Ahmet.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exeHEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exeHEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exeHEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exeHEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exeDados Trabalho.exewmiintegrator.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exewmihostwin.exewmimic.exewmisecure.exewmisecure64.exepid process 4396 HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe 1128 HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe 1732 HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe 1168 HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe 4556 Payload.exe 2772 HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe 3084 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe 4856 HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe 2964 zbhnd.exe 4076 zbhnd.exe 2172 HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe 5084 Hacı Ahmet.exe 3712 HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe 2448 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe 5992 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe 6000 HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe 6380 Dados Trabalho.exe 6512 wmiintegrator.exe 6552 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe 6664 wmihostwin.exe 6832 wmimic.exe 6900 wmisecure.exe 6976 wmisecure64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/3084-214-0x0000000000400000-0x00000000005BB000-memory.dmp upx \??\c:\users\admin\desktop\00483\heur-trojan-ransom.win32.crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe upx C:\Program Files\7-Zip\7-zip.chm.exe upx behavioral1/memory/3084-1102-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/memory/3084-2356-0x0000000000400000-0x00000000005BB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exeHEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exerundll32.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payload.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Payload.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igmhk5hbmq = "C:\\Users\\Admin\\Desktop\\00483\\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe" HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\adr = "C:\\Users\\Admin\\Desktop\\00483\\HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exedescription ioc process File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exedescription ioc process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe -
Drops file in System32 directory 3 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exedescription ioc process File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\917284472.png" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exedescription pid process target process PID 2720 set thread context of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exedescription ioc process File created C:\Program Files\7-Zip\Lang\cy.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\nl.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\ps.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\sa.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\be.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\el.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\kab.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\PingSuspend.jpeg HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File created C:\Program Files\7-Zip\Lang\ext.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\ko.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\LockEdit.avi HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\7zG.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\ReadFormat.mp2 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\bn.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\mn.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\bg.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\ConvertFromCheckpoint.eps HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Program Files\InitializePop.doc HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File created C:\Program Files\7-Zip\Lang\ca.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\si.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\7z.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\mng.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\nn.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\pt.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files (x86)\c13cc70bc13cc0e916.lock HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\7zCon.sfx.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\StopBackup.ttf HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Program Files\UnprotectInitialize.ADT HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File created C:\Program Files\7-Zip\Lang\hu.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\7-zip.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\ms.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\mk.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\cs.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\fy.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File created C:\Program Files\7-Zip\Lang\kk.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\SelectShow.ppsm HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe -
Drops file in Windows directory 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exedescription ioc process File opened for modification C:\Windows\win.ini HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 6488 5992 WerFault.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe 6480 2096 WerFault.exe HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exewmiintegrator.exewmihostwin.exereg.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exeHEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exeDados Trabalho.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exewmimic.exewmisecure.exereg.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exezbhnd.exepowershell.exeHEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exerundll32.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exezbhnd.exeHEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exerundll32.exewmisecure64.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dados Trabalho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure64.exe -
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exeHEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe -
Gathers network information 2 TTPs 6 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 1524 ipconfig.exe 6068 ipconfig.exe 3688 ipconfig.exe 6212 ipconfig.exe 5788 ipconfig.exe 5940 ipconfig.exe -
Modifies registry class 3 IoCs
Processes:
cmd.exeOpenWith.exeDados Trabalho.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings Dados Trabalho.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exetaskmgr.exetaskmgr.exepid process 4716 powershell.exe 4716 powershell.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 3768 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
7zFM.exepowershell.exetaskmgr.exetaskmgr.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exePayload.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exeHEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exeHEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exepowershell.exedescription pid process Token: SeRestorePrivilege 3676 7zFM.exe Token: 35 3676 7zFM.exe Token: SeSecurityPrivilege 3676 7zFM.exe Token: SeDebugPrivilege 4716 powershell.exe Token: SeDebugPrivilege 1400 taskmgr.exe Token: SeSystemProfilePrivilege 1400 taskmgr.exe Token: SeCreateGlobalPrivilege 1400 taskmgr.exe Token: SeDebugPrivilege 3768 taskmgr.exe Token: SeSystemProfilePrivilege 3768 taskmgr.exe Token: SeCreateGlobalPrivilege 3768 taskmgr.exe Token: 33 1400 taskmgr.exe Token: SeIncBasePriorityPrivilege 1400 taskmgr.exe Token: SeDebugPrivilege 1128 HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe Token: SeDebugPrivilege 4556 Payload.exe Token: SeDebugPrivilege 4396 HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeLoadDriverPrivilege 2096 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe Token: SeDebugPrivilege 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe Token: SeDebugPrivilege 7068 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid process 3676 7zFM.exe 3676 7zFM.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 1400 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe 3768 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OpenWith.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exepid process 4368 OpenWith.exe 2448 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe 2448 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
powershell.exetaskmgr.execmd.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exeHEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exeHEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exedescription pid process target process PID 4716 wrote to memory of 3516 4716 powershell.exe cmd.exe PID 4716 wrote to memory of 3516 4716 powershell.exe cmd.exe PID 1400 wrote to memory of 3768 1400 taskmgr.exe taskmgr.exe PID 1400 wrote to memory of 3768 1400 taskmgr.exe taskmgr.exe PID 3516 wrote to memory of 4396 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe PID 3516 wrote to memory of 4396 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe PID 3516 wrote to memory of 1128 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe PID 3516 wrote to memory of 1128 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe PID 3516 wrote to memory of 1732 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe PID 3516 wrote to memory of 1732 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe PID 3516 wrote to memory of 1732 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe PID 3516 wrote to memory of 1168 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe PID 3516 wrote to memory of 1168 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe PID 3516 wrote to memory of 1168 3516 cmd.exe HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe PID 1128 wrote to memory of 4556 1128 HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe Payload.exe PID 1128 wrote to memory of 4556 1128 HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe Payload.exe PID 3516 wrote to memory of 2772 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe PID 3516 wrote to memory of 2772 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe PID 3516 wrote to memory of 2772 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe PID 3516 wrote to memory of 4856 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe PID 3516 wrote to memory of 4856 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe PID 3516 wrote to memory of 4856 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe PID 3516 wrote to memory of 3084 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe PID 3516 wrote to memory of 3084 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe PID 1732 wrote to memory of 244 1732 HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe rundll32.exe PID 1732 wrote to memory of 244 1732 HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe rundll32.exe PID 1732 wrote to memory of 244 1732 HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe rundll32.exe PID 4856 wrote to memory of 2964 4856 HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe zbhnd.exe PID 4856 wrote to memory of 2964 4856 HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe zbhnd.exe PID 4856 wrote to memory of 2964 4856 HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe zbhnd.exe PID 2772 wrote to memory of 4076 2772 HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe zbhnd.exe PID 2772 wrote to memory of 4076 2772 HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe zbhnd.exe PID 2772 wrote to memory of 4076 2772 HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe zbhnd.exe PID 3516 wrote to memory of 2172 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe PID 3516 wrote to memory of 2172 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe PID 4396 wrote to memory of 5084 4396 HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe Hacı Ahmet.exe PID 4396 wrote to memory of 5084 4396 HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe Hacı Ahmet.exe PID 3516 wrote to memory of 3712 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe PID 3516 wrote to memory of 3712 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe PID 3516 wrote to memory of 3712 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe PID 3516 wrote to memory of 2448 3516 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe PID 3516 wrote to memory of 2448 3516 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe PID 3516 wrote to memory of 2448 3516 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe PID 3516 wrote to memory of 2096 3516 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe PID 3516 wrote to memory of 2096 3516 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe PID 3516 wrote to memory of 2096 3516 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe PID 3516 wrote to memory of 2720 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 3516 wrote to memory of 2720 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 3516 wrote to memory of 2720 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 3712 wrote to memory of 7068 3712 HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe powershell.exe PID 3712 wrote to memory of 7068 3712 HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe powershell.exe PID 3712 wrote to memory of 7068 3712 HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe powershell.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 3516 wrote to memory of 6000 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe PID 3516 wrote to memory of 6000 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe PID 3516 wrote to memory of 6000 3516 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 2720 wrote to memory of 5992 2720 HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe PID 6000 wrote to memory of 6380 6000 HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe Dados Trabalho.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00483.7z1⤵
- Modifies registry class
PID:1932
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4368
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1572
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00483.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3676
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\Documents\Hacı Ahmet.exe"C:\Users\Admin\Documents\Hacı Ahmet.exe"4⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release5⤵
- Gathers network information
PID:6068
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall set opmode disable5⤵
- Modifies Windows Firewall
PID:6076
-
-
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release5⤵
- Gathers network information
PID:3688
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall set opmode disable5⤵
- Modifies Windows Firewall
PID:6204
-
-
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release5⤵
- Gathers network information
PID:6212
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall set opmode disable5⤵
- Modifies Windows Firewall
PID:5380
-
-
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release5⤵
- Gathers network information
PID:5788
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall set opmode disable5⤵
- Modifies Windows Firewall
PID:5764
-
-
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release5⤵
- Gathers network information
PID:5940
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall set opmode disable5⤵
- Modifies Windows Firewall
PID:6032
-
-
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release5⤵
- Gathers network information
PID:1524
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall set opmode disable5⤵
- Modifies Windows Firewall
PID:6348
-
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\Payload.exe"C:\Users\Admin\AppData\Roaming\Payload.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" javascript:"\..\mshtml,RunHTMLApplication ";document.write();shell=new%20ActiveXObject("wscript.shell");shell.regwrite("HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\adr","C:\\Users\\Admin\\Desktop\\00483\\HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe");4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\explorerkiller.bat" "4⤵PID:5284
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3084
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exeHEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2172
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7068 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\917284472.png /f5⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:5132
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False5⤵
- System Location Discovery: System Language Discovery
PID:6140
-
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵PID:2980
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exeHEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 4844⤵
- Program crash
PID:6480
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exeHEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe"C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe"4⤵
- Executes dropped EXE
PID:5992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 4725⤵
- Program crash
PID:6488
-
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exeHEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6000 -
C:\Users\Admin\AppData\Roaming\Dados Trabalho.exe"C:\Users\Admin\AppData\Roaming\Dados Trabalho.exe" C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6380 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6512 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6664 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6832 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6900
-
-
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6976 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:4160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:4372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:1764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:3256
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6552
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5992 -ip 59921⤵PID:6304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2096 -ip 20961⤵PID:6416
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4856
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b5e093f1bcfbca24f1ca57b5c23293ff
SHA156786af5d48f27474db6da8ea32d4acfe42061c4
SHA2561b82c142e4cea3a87bf3daa958249f0416f226921a72bd6ea95a873b6140f531
SHA512f2412944b595ffbbb89d9ddd64eff137c4dbf222053c7b902acbfcdd195f74af55150524bfa5e0ddcf930b862605b2438e41e03c6b7b942b36d2e2aabbc756da
-
Filesize
1011B
MD5d90d05a5fea9c28b3bf2b55f808c3a45
SHA17774c79c85b4401acfc56002f9e8a3e10e8a7b60
SHA2568a9b224d68a718e7cd4da069a158408d9c71fb8ecc4e4a6581982d7a35b29cec
SHA512783d830a0d75911da6878ea58f7191f1438a429e232c63db86e6f09a1bb390ec7ee72f10db1ee695177686cacab24c9e58f61e7d403d75dd9c817c592131170a
-
Filesize
1.8MB
MD52d98246fc6843d1192a16aeee63f967b
SHA1d52077ca006ee8fcc4ab43e3761c0d19314bbba9
SHA25685fc44e0778027b9c2ed50c8cebefe108773b4f587b1c9be15e6f5d5cc64b904
SHA512dab48fc9715cca602488d71968627ecfb1e2e3aedd4e16270ca1a118046f98e355fab7e226edd97dccba42c1da7e05831100fa0473266e0913032bdc68888652
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Temp\7zEC5EABEE7\00483\Trojan-Ransom.Win32.Blocker.ndgg-c910c9901ea9ff059e3596cf1e49c16c3b757176397c961760f06d6dad553472.exe
Filesize15.9MB
MD5d79d945d07bc09c8386943bd6d4bb307
SHA1a461cfa215b5540db195354b1cad3e68d790668e
SHA256c910c9901ea9ff059e3596cf1e49c16c3b757176397c961760f06d6dad553472
SHA5124e8277bd8177e76bc36675d336457d03032866c6c78772059e2992e19d9b96642c30f66e71023f461445c14f28dc1890f1a07a15f00f26b973da5a6ed627e3cc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
50KB
MD59b289da45db35a863bbf2775b118fb38
SHA1346293a7405d87157c1b24b32b44882601417458
SHA25649e38c04215f4f1b570681c5df8135ba972194ad2abbe28576440a1e14468872
SHA512c74e175f1ff4f664068af03345e30fe3d87f999ab8c87b5b3cf79d99112d9a0140c20dce26289f6c711ca31b8b9bc587d5fba274fb6dbe35dfc588c8698f42ed
-
Filesize
4.1MB
MD5e9a4ab847a556bcf559a3a357c5f2795
SHA143645de5c291c690309901cd0a6858490b5bcabd
SHA256b48f1bf5e248bcfa3c95315ebec854f08f91e129e31ea62fb2173ca074d569b9
SHA5123842b9b28e1d26b0a50755b0cea35193aecbbdbba85579c7b306475c363de7846fd5df4875341bcee36ae972dc75befe420f9c27a322f3bd9a1b0bd087c122b1
-
Filesize
4.1MB
MD5c194f05400fd0bca323af3abfba469c0
SHA19990be9c83cb654c41f59b6b9b7e72439911a3f5
SHA25689a7c081bf3c094fd0a466c62d9858603173146923d4ca0d7a945c0a23c92b4b
SHA512f4fc35b85296306547521226536a9d16556038dbca806e9b4773963a60e7e3c9b203911a66dc0e67590d26b6a0fffdb4c3f4ad966779cf0c4bff1b547c38d685
-
Filesize
4.1MB
MD54622764c28edb773090f9674c9005731
SHA1ca923fbf2055e1bd8776d01969ff72c1fe620168
SHA2567629c82901a855836022d416fc3dcc316ca6b98940f0bcb2db1a453d76c5d827
SHA512d6f0045971d68a7cde12950a936a3f3ac1aee3300068281ada086445e0cc68fb91f1d2ce97c9b51f24ce97a47a7c28ec2a446efa794c039e0e96aa7a33aa6798
-
Filesize
4.1MB
MD593e1b8fc79aab4782cc9236439331e09
SHA1b9771b3da4357c5a5134aec1e9b9294677fa7d0f
SHA2564f6ac271f9bbd731a35dbe68d0e60ca2622340796beaab9f05270c879c6aca86
SHA512220546dbd5dff5c6d38727a5dcb0f71c29329ab576209c6eea79a2a7aa3eb330392d69deaaf6a1510aa157f11da10e6bbe6933961849761f6c3f6e584824a9e8
-
Filesize
4.1MB
MD5bc0d26d4c9eb77869e9a811866a31daf
SHA184353ee49d751564aea0e9c87528c5630ca7736a
SHA2561802701cf076ddb0593810e3e736d75cc4501ac5e143311df9131666608550cd
SHA5126e579af9b9fee927ebee1b8d137b04b9aa09f7eda0a68150d3d6a66953ddf81b955a708c22df4e84219b55b77809b5b67f2d28eea24cc084340801c4a9086e48
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Blocker.gen-16538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98.exe
Filesize378KB
MD51b9a97649cccdfd5d9b7f708338d8e40
SHA14cd9d158874ef995627ca0fbdd08157f20bff8a0
SHA25616538c2862415ff55840f6dbdc28ade7a59724f518fdb315b671237852a59e98
SHA5121de788c66e5449eba56967414b80810ee0fb5d6812e661c9f1b7b3aeae16eed64d77b24e5a584e66196dfe1a25b899c6c53b6cbaa03aa7124079eaaca284a8eb
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Blocker.gen-825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7.exe
Filesize6KB
MD55dc74da8b3b3258c94ab980a9577a219
SHA1ccf4dc5e49e317c941ca1274cf6f5b6d8b851b64
SHA256825dce976a7a66947289d1c6e0486248266c83a1ff9c74fd7e5d991769b3ecf7
SHA512e7af1c84dbaf54f140c5a957c1b900fea961ed8219ce7b92257d18158b7f937c0299b91069c6963debe17ec62e4ea0af14a959915d353862ed7fe351dcef58f6
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Encoder.gen-184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2.exe
Filesize235KB
MD54c0c842fe006a14361e1ecff30a90754
SHA1f57efbc22c381feec88b7d82e167b8e2eb1dca1d
SHA256184d344b757eaf6c7397e2486d28b98983eab107683d5a7ee17a1f4dc1cf65d2
SHA512851d096c83c3284af635cdd029736e93bb2abd32cb0c7dab1985f46ff5c3eb3ea84120fb27802d4045608ee967a75d8f347466e68a7fe782d79dd36eef730604
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.MSIL.Gen.gen-a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90.exe
Filesize557KB
MD552c527df9e7554e940c3c45b4e9b3e30
SHA1ae182f41baae6a5f3c05803933ba77578772233c
SHA256a6339f9ef7c91bc792626ff3765a46809dcada083c93a7e63fd01b0e91c1bb90
SHA512eabb6293309e5ac13a9530efe8f3f75d6fa1102a6fed2a1825022fff584836796fc6eab97b42fe88cb618c987907b2c3224cfa79bec8b8f332f72a0f9412752c
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Blocker.pef-94fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d.exe
Filesize50KB
MD5d28016f1314390c3472db9a375236fbe
SHA12d7cca420a24f1d20c5258e321f8fcb7381f9418
SHA25694fbafab9e4f3df2e89731cf8c05f9c549c3d803a01a97fd29c7d680049ba78d
SHA5127860668d65294daef45f8749e58db932e8352bf452b0f04c9e5edc5ba24155a91561daa0a3ecec78a636fd5bae51a1ee769f7bacee349c583963dbc60f376db3
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Blocker.pef-dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2.exe
Filesize50KB
MD5919bfbc3dd8239dd7ac114dbe97d2ffd
SHA1944fb4424e95cdc947137e48dd11788b0a086f5f
SHA256dee74cdae069253f4b57314d02d9b89470e1f931a061074d3ec724dcca1910b2
SHA512935d4c02e167b604d1d4a238702639932e487b9be67529f033ba378906be029069913ed193d85db92946f4b0d2f1e8846f46f169d16d703bd9254d648c7c1b3c
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-0a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48.exe
Filesize130KB
MD5bf3a4bb4e42c26f585159f7aa103bc73
SHA1d513c1fe0b0d89eef5a2c4bbfbca9d7e9043901c
SHA2560a2e2efc45013ca8549874984968cd615117c08783018becfe03774fe68edb48
SHA512bdb0a4088f3b3f556d86d12996502980f7db41811e2c42355ad7d1678ce1a32fd5ab1cdb61ec95e5c5903a4deee7401f05676f214c8b208f83bf76dbeae974b2
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Cryptor.gen-be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70.exe
Filesize921KB
MD5075cb88f83fbe4ad2ae0f553697e7bdf
SHA1773dce7c01a42e8371cf49ceda07f26cba0907b9
SHA256be19681b21f2a573b477444a788e00eb8dad2d740d11c02f14e878fe5b89fa70
SHA5123f0a503acbfffc79eed37597d59e313c31f6b5451fdad79eacd611119ec17a4a245928079993689811a5695ad310951a282b1c493d08bdb31aa2b5fdbf63bf67
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-4d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87.exe
Filesize700KB
MD597f1152d4d5d5a0167dc4b948221cbc2
SHA1f053ef59d29b7a7db43269bc2d4e66720a0deea0
SHA2564d2cac113e243d728e7d4ffb37ccca9bf1fbc96a7381ff7ab98cdad0955f5c87
SHA512ef8133995dbea229d3a8134b00bce0cca716863742cb8beae7361cea69cd7fdfa7d9d2161fb85763cb4b2306111f03e54d81b628360d80268a90f76e5962a25b
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.GandCrypt.pef-000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9.exe
Filesize244KB
MD5a6d71c7aad5ca942f7bec9203077982e
SHA1e6373b1fa7244272dca1ab1ffa6d9f4db12e2d63
SHA256000a2a66d5f9b234b871eed3906e1d2da12bce6e6b8e6fbd4a1cca3042c01ce9
SHA512529cdab3691ebe5270a42abba95a61eadf0d58bc38089aab084dd125fad2d1ccd260ae7440a93bfa0b51762521818168aca02dfe7d16153f11da87ebcd520430
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c.exe
Filesize166KB
MD5f71627946236be60b9d37d1b0864df0d
SHA1820d02f1620abb69fe549f28d6b709594f706934
SHA256021e563e197adb919596fd3f6ab0b6c58615506287574504ef26fc0536df9a2c
SHA512598732b27d1cf7117462756cdad11968f302bb07bbb209585b4aa0ece2adef444d09de0e729c4777fa163cf07291bfb88afc3c15b505929a7e057b454de22316
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Generic-c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07.exe
Filesize4.1MB
MD5bc5e7222161a863eeb51a73a4612bd0c
SHA1c97e0ae4ff536bf2c4f110d0a4e211d9e160501d
SHA256c21cf0ef3e5c699150f2804de3360459b1da2c3613fc0c4390d0148e6146be07
SHA5122ecb08e49cc223ccf6afa502a1fba1d8e28e5f67481be62ca8b5925f0402216389d8ab19e7a7b9aaf8a6d67503612c963f291fea7a9c6f704f9cf7d61c879646
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d.exe
Filesize1.8MB
MD595963c1315d495929e29e5e748cdc719
SHA13e9bd72a036d2cfa545117d111adfb7bb4246fad
SHA256a5c8f955e10e33d50296f1ab1d5a78324973a5fcf1182035bf05667bd894af0d
SHA51256073dbf3094cf53b7d70a09747ce730bcaf9aed38b30fac25c0984690224be11c83237e9c8e629efd40672c8b20676399dbf10e8b19fd37a53b697d65bd6037
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Stop.gen-12089752956de5e082e810a5d4eb4ffe97a92112cd83244f2269fff76abae196.exe
Filesize693KB
MD567cb0de159aec506bde6957e45292b01
SHA1069622c77628b72ec60a8fc8f783f43076cb83f8
SHA25612089752956de5e082e810a5d4eb4ffe97a92112cd83244f2269fff76abae196
SHA5128f1fc077aa2b6fdad1faa9189253389caca2a3f8dd87e8618a22bf3cbcede757cfb387af3994b9ab919c407721e398241576e7ed3d3e241325cf23e5ebe65f4c
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Stop.gen-30f5851e3da28ff1b585a286a5a989406b37060ea32bd68acf7769da51edd767.exe
Filesize14.3MB
MD598648bbc68a9bd40908e86c6ef0071c1
SHA10293e6a0093bbaf0f39b47190353b988caf4947b
SHA25630f5851e3da28ff1b585a286a5a989406b37060ea32bd68acf7769da51edd767
SHA512023a742ed066819d7dfa1f37baee4384146a94df8211430c6bcdb28ae208f0027e986633fbce632bd6ab47ca692cd52e1aaf450195d44813dc5cb85a5faf6662
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Stop.gen-d0926befd5cd69120ff95338e14e74da1ce19291a8c0ee35a852304731bc6560.exe
Filesize875KB
MD564ef237c8ec59df2732b191b54e8e4d9
SHA14d3a1cde375d47b3fe7d74a9934a7ea5d3d3e9eb
SHA256d0926befd5cd69120ff95338e14e74da1ce19291a8c0ee35a852304731bc6560
SHA5129ea1352da3229a3b0ef68c3d30da1eb4fc35ea7c659d25f32532edef482143ce5904aa9bf08919d29779c92021407ba8b21d9816e187284f9a6d26196ba86024
-
C:\Users\Admin\Desktop\00483\HEUR-Trojan-Ransom.Win32.Stop.gen-e9d4af41d7c3f1f49d3b78f949c23320af1f89199dab79da3eecbac6c5fe02b5.exe
Filesize900KB
MD537c6edc652f5cab6f37f9985b450cb55
SHA15225d4915cf979c7d6bb51ac9172af1f5f65f3bf
SHA256e9d4af41d7c3f1f49d3b78f949c23320af1f89199dab79da3eecbac6c5fe02b5
SHA512c23af4b0ebf494620f9e6bf3861f633a1f499fbdbc3ae9ffd82e0b1116bcb8f169ca3b1b897469a9eb3f80eba2ccd7394519d4f023ec5fa49b29bbbb6226d61a
-
Filesize
350KB
MD50e1491df58568d33a5b3e0b851569869
SHA1dd6574747ae096f1237f0b9e97b2ffeeacc4d2c5
SHA25653524ef716f4eef3948036896a52b96a536214287c76555461bb2203bdcdab47
SHA5127f251998091093914d5deb42a283361c83f56a7b3366ad1acb7fca44966b1b5671415b9ab71ce3d51201c6e06efd701ad17edc059978b221e5180170cb9d2e80
-
Filesize
10KB
MD52bad1ceab30b97c27cd18228a117e239
SHA14128c35ca3566bb2e01d9a2f322c3be1c3220d37
SHA256ed2cae6c0c173001f3bffadfbf3c10cf1dafff4ad0e270f3bfa13b4d6abca244
SHA512ad11c1209e1fcbc27b20f42f549f350fc003497564beb71e1982d3c123a1c979df394fad73fa6a18e5c6e3b462ddd63a02e4def64940efe0d4daf5be92ab9a58
-
Filesize
533KB
MD5c069dc352ae25426adcedac87644fd8f
SHA1c5d0813c919c99bcb09d0af8dfa1a2c007a081da
SHA256c9637c2d353bfe6f6e55a6ae01782caa8fe83ef248228007ee12bc7a297379c9
SHA512af7d04ab7d98f3f3cdad86f12ecca4d6abb36e1dcd048fd884265a56125fb324d512bd10ef269886630935ee7df20888855a142e4a1a1f5a8696ab42713e55ac
-
Filesize
13KB
MD53a0b0f2afd73d6816343e71488adf3ed
SHA16af38b3945f7a08c970facdd4a19a50f8be10597
SHA256f3d4137b9215203d5f2d4d4f5f7dbeeb65caaffebe2cab9028df29bb16799aec
SHA5121b26e763a76994fbe4c29e92430815975fb380f57408ec006c27fcea14bb998afa331a529fa9f051ea7c28af4db86f4dcd635f1f5915b1208b12e226eaa58675
-
Filesize
600KB
MD514dad6353afcd59a64bdaf7f069fb8df
SHA153ba34886c5a89d06e07725792697fd3ed40febe
SHA25676a8fb873fe8c6963e82593dab555bea1c87a840fddd0edef34ed393b7e56fc0
SHA5120818fd024ef89440858bea7eef0bcccc08b368a4804769d41ac096369208d58f43b9415d83bf73a1a6c8c9a8284412b447087151e3ffe3de912f2de359373301
-
Filesize
184KB
MD578f9b1a6db2f1b90c0a8b6e7f561350a
SHA160a346fc846cdca7f524a4ae9f677c0958ec7ee4
SHA256435065c42ed334eb7ad98e69140edc700a8aaf6c27e2584e94104433339259c2
SHA51286af5463f2f9c82df817d872a8b7775ee6efd269ac00700639c815e61e8edb2999a14506a26dfec2084cece29fe78ed7aa261215673c1a5236ca0182f7715591
-
Filesize
175KB
MD53d59d10a293711646ca3466971d0f306
SHA1d605f56ba3e828cd3c8f665c3bb4764b24ce239a
SHA25637968f2b38205679ab1a3193cfed9df996e73d02991c2d3e1b63c0a1b5174a3f
SHA512a9328e54a001377cf12ed98bc1e169443ff14ec4ffbedc4e5f0b07c4a79efac745e2f7bf9455d92669d6e468463c3f7b6a0beb7be6d6ce8b040530a701038c22
-
Filesize
6KB
MD57bd45b4353c2eb076cb800af6794c74c
SHA18b43110b86ab342a3a50fba1101af23e58afb81f
SHA25646768646ca5a5742bd66e10f807c7d85c06d67f34d01e1da68c0ed585e81c74d
SHA512a41d292080b01fa6884140f0aab6a9a45310ff8eccf850715d5b373c8aeaf0a57ed060e12475621372876ccf05d64278f89ec9b458d3c1af4cc60b5999f735f3
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
\??\c:\users\admin\desktop\00483\heur-trojan-ransom.win32.crypmodadv.vho-d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93.exe
Filesize1.8MB
MD5c380626d5678779650426785725236cb
SHA1fdd6b743d71b1f84f957e9132457a89d372c2998
SHA256d629d70868620681a7bd1e3bc49dfce91ac0bb4cd64a6358bcdeef1acf0d3a93
SHA512dc6f3fbfbc941e576d3bc186f01d496d4845e65ec7c44dec27af523748f033c8bdbab5ae6143f374440650ec0b6114a5fd167865bedba8e1d3565eada2c8b71c