Analysis
-
max time kernel
132s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00463.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00463.7z
-
Size
75.1MB
-
MD5
70762512ab2bcdfe3ba5528929042036
-
SHA1
3a44bc767c9fb58afee903dd2792518a2b5db9c6
-
SHA256
28a519359d43eabd0bd2e8b1411e2136f4b77f8c1f46bc5041f65f7d17d0d866
-
SHA512
86efc123c02ed3988814c3c153f6ca5d0965b3cadf33a85ccc1faae173aae5d5b8067eeb2fa2ec31238bba1673cb10d2a264d06f162c28e34813161eabbdf2ce
-
SSDEEP
1572864:kIbTKYr+1n5414c9QdeMTNHz7gZ9npl2Hemr3SR8rAqzPNSmkX:RKf4DQd1pTsZDMHJriSrAqzO
Malware Config
Extracted
C:\Users\Admin\Pictures\README.txt
demonware
https://keys.zeznzo.nl
Signatures
-
DemonWare
Ransomware first seen in mid-2020.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
reg.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\MAINPROC.exe," reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe -
Raccoon Stealer V1 payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-1713-0x0000000000400000-0x0000000002D01000-memory.dmp family_raccoon_v1 -
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
taskmgr.exedescription pid process target process PID 5060 created 1492 5060 taskmgr.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe PID 5060 created 1492 5060 taskmgr.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe PID 5060 created 3620 5060 taskmgr.exe Decode.exe PID 5060 created 3620 5060 taskmgr.exe Decode.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Processes:
resource yara_rule C:\Windows\SysWOW64\HelpMe.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SMSS.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.execmd.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeMAINPROC.exewmisecure64.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exepayload.etldescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SMSS.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation MAINPROC.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wmisecure64.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation payload.etl -
Drops startup file 7 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exeLTE.exetaskmgr.exeHEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\smartclock.lnk LTE.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\smartclock.кристина taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.lnk LTE.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.кристина taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk HEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exe -
Executes dropped EXE 45 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exeHEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exezbhnd.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exeHEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exeHEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exepayload.etlDecode.exeLTE.exeHEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exeMeus Dados.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exewmiintegrator.exewmihostwin.exeHEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exewmimic.exewmisecure.exewmisecure64.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeSmartClock.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeMAINPROC.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeAddInProcess32.exeSMSS.exeSMSS.exeAddInProcess32.exepid process 2636 HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe 3668 HEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exe 4384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe 1660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe 3856 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe 1436 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe 4292 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe 2896 HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe 4820 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 2884 HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 1236 HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe 3788 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe 3668 zbhnd.exe 1492 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe 1596 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 5208 HEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exe 6072 payload.etl 3620 Decode.exe 2676 LTE.exe 3748 HEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exe 5844 Meus Dados.exe 4800 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe 5820 wmiintegrator.exe 5156 wmihostwin.exe 5352 HEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exe 5676 wmimic.exe 2624 wmisecure.exe 5480 wmisecure64.exe 5884 HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe 4144 SmartClock.exe 5528 HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe 9552 HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe 8668 HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe 10128 MAINPROC.exe 5628 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe 7568 HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe 12020 HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe 7796 HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe 6240 HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe 8368 AddInProcess32.exe 10304 SMSS.exe 10432 SMSS.exe 10300 AddInProcess32.exe -
Loads dropped DLL 43 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exeHEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exetaskmgr.exepid process 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 5256 HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe 5060 taskmgr.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 3792 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe 5060 taskmgr.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2896-1395-0x0000000007300000-0x0000000007328000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
reg.exereg.exereg.exereg.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exereg.exereg.exereg.exeDecode.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win32 = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\adae6ab9-48ac-4e39-b764-44d6d4fba29c\\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe\" --AutoStart" HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Decode.exe" Decode.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exedescription ioc process File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 91 api.2ip.ua 103 api.2ip.ua 106 api.2ip.ua 89 api.2ip.ua 90 api.2ip.ua -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exedescription ioc process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe -
Drops file in System32 directory 3 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exedescription ioc process File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeMAINPROC.exedescription pid process target process PID 5528 set thread context of 9552 5528 HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe PID 5884 set thread context of 8668 5884 HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe PID 1436 set thread context of 5628 1436 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe PID 7568 set thread context of 7796 7568 HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe PID 12020 set thread context of 6240 12020 HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe PID 10128 set thread context of 8368 10128 MAINPROC.exe AddInProcess32.exe PID 10128 set thread context of 10300 10128 MAINPROC.exe AddInProcess32.exe -
Processes:
resource yara_rule behavioral1/memory/1492-883-0x0000000000400000-0x00000000005BB000-memory.dmp upx C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe upx C:\Program Files\7-Zip\7-zip.chm.exe upx behavioral1/memory/1492-1744-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/memory/1492-1955-0x0000000000400000-0x00000000005BB000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exeLTE.exedescription ioc process File created C:\Program Files\7-Zip\7-zip.chm.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\uninstall.exe LTE.exe File created C:\Program Files\7-Zip\7z.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\checkpointstep.m3u LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\common files\microsoft shared\clicktorun\inspectorofficegadget.exe LTE.exe File created C:\Program Files\7-Zip\7-zip32.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\Lang\an.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml LTE.exe File created C:\Program Files\7-Zip\Lang\fr.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\Lang\fy.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\7z.exe.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\an.txt.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\cs.txt.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\fi.txt.exe LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\Lang\de.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\debugenter.mov LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\lang\hi.txt.exe LTE.exe File opened for modification \??\c:\program files\common files\microsoft shared\clicktorun\c2rheartbeatconfig.xml LTE.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml LTE.exe File opened for modification C:\Program Files\7-Zip\7zG.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\7-zip.chm.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\da.txt.exe LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\lang\hr.txt.exe LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\lang\fr.txt.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\gl.txt.exe LTE.exe File opened for modification \??\c:\program files\common files\microsoft shared\clicktorun\mavinject32.exe LTE.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml LTE.exe File created C:\Program Files\7-Zip\Lang\ext.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\openlimit.m3u LTE.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\7zG.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\Lang\be.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\Lang\hr.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\7-zip\7zg.exe LTE.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File created C:\Program Files\7-Zip\Lang\hy.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\dotnet\dotnet.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\fy.txt.exe LTE.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\fsdefinitions\main\base.xml LTE.exe File opened for modification C:\Program Files\7-Zip\7z.sfx HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe File opened for modification \??\c:\program files\testuse.docx LTE.exe File opened for modification \??\c:\program files\7-zip\lang\de.txt.exe LTE.exe File opened for modification \??\c:\program files\7-zip\lang\en.ttt.exe LTE.exe File opened for modification \??\c:\program files\dotnet\shared\microsoft.netcore.app\7.0.16\createdump.exe LTE.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5348 2884 WerFault.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 3932 2884 WerFault.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 5624 2884 WerFault.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 5764 2884 WerFault.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 6108 2884 WerFault.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 4536 2884 WerFault.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe 5652 5352 WerFault.exe HEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exe 7464 8368 WerFault.exe AddInProcess32.exe 11236 10300 WerFault.exe AddInProcess32.exe -
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exeSMSS.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exereg.exereg.exepowershell.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exereg.exeSMSS.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exeHEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exeMeus Dados.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exezbhnd.exewmimic.exereg.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exepowershell.exeMAINPROC.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exepowershell.execmd.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exewmiintegrator.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeHEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exereg.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exepowershell.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exereg.exepowershell.exepowershell.exereg.exewmisecure.exewmisecure64.exeSmartClock.exereg.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exepowershell.exereg.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeicacls.exepowershell.exewmihostwin.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Meus Dados.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAINPROC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmartClock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEPING.EXEpid process 624 cmd.exe 5568 PING.EXE 5972 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 3 IoCs
Processes:
Meus Dados.execmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Meus Dados.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 10912 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 4144 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exetaskmgr.exetaskmgr.exepid process 892 powershell.exe 892 powershell.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exetaskmgr.exepid process 1032 7zFM.exe 5060 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exepowershell.exetaskmgr.exetaskmgr.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exepowershell.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeRestorePrivilege 1032 7zFM.exe Token: 35 1032 7zFM.exe Token: SeSecurityPrivilege 1032 7zFM.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 3340 taskmgr.exe Token: SeSystemProfilePrivilege 3340 taskmgr.exe Token: SeCreateGlobalPrivilege 3340 taskmgr.exe Token: SeDebugPrivilege 5060 taskmgr.exe Token: SeSystemProfilePrivilege 5060 taskmgr.exe Token: SeCreateGlobalPrivilege 5060 taskmgr.exe Token: 33 3340 taskmgr.exe Token: SeIncBasePriorityPrivilege 3340 taskmgr.exe Token: SeDebugPrivilege 3668 HEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeDebugPrivilege 2896 HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe Token: SeDebugPrivilege 5096 powershell.exe Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 4160 powershell.exe Token: SeIncreaseQuotaPrivilege 4488 powershell.exe Token: SeSecurityPrivilege 4488 powershell.exe Token: SeTakeOwnershipPrivilege 4488 powershell.exe Token: SeLoadDriverPrivilege 4488 powershell.exe Token: SeSystemProfilePrivilege 4488 powershell.exe Token: SeSystemtimePrivilege 4488 powershell.exe Token: SeProfSingleProcessPrivilege 4488 powershell.exe Token: SeIncBasePriorityPrivilege 4488 powershell.exe Token: SeCreatePagefilePrivilege 4488 powershell.exe Token: SeBackupPrivilege 4488 powershell.exe Token: SeRestorePrivilege 4488 powershell.exe Token: SeShutdownPrivilege 4488 powershell.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeSystemEnvironmentPrivilege 4488 powershell.exe Token: SeRemoteShutdownPrivilege 4488 powershell.exe Token: SeUndockPrivilege 4488 powershell.exe Token: SeManageVolumePrivilege 4488 powershell.exe Token: 33 4488 powershell.exe Token: 34 4488 powershell.exe Token: 35 4488 powershell.exe Token: 36 4488 powershell.exe Token: SeIncreaseQuotaPrivilege 5096 powershell.exe Token: SeSecurityPrivilege 5096 powershell.exe Token: SeTakeOwnershipPrivilege 5096 powershell.exe Token: SeLoadDriverPrivilege 5096 powershell.exe Token: SeSystemProfilePrivilege 5096 powershell.exe Token: SeSystemtimePrivilege 5096 powershell.exe Token: SeProfSingleProcessPrivilege 5096 powershell.exe Token: SeIncBasePriorityPrivilege 5096 powershell.exe Token: SeCreatePagefilePrivilege 5096 powershell.exe Token: SeBackupPrivilege 5096 powershell.exe Token: SeRestorePrivilege 5096 powershell.exe Token: SeShutdownPrivilege 5096 powershell.exe Token: SeDebugPrivilege 5096 powershell.exe Token: SeSystemEnvironmentPrivilege 5096 powershell.exe Token: SeRemoteShutdownPrivilege 5096 powershell.exe Token: SeUndockPrivilege 5096 powershell.exe Token: SeManageVolumePrivilege 5096 powershell.exe Token: 33 5096 powershell.exe Token: 34 5096 powershell.exe Token: 35 5096 powershell.exe Token: 36 5096 powershell.exe Token: SeIncreaseQuotaPrivilege 4488 powershell.exe Token: SeSecurityPrivilege 4488 powershell.exe Token: SeTakeOwnershipPrivilege 4488 powershell.exe Token: SeLoadDriverPrivilege 4488 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid process 1032 7zFM.exe 1032 7zFM.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 3340 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe 5060 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
OpenWith.execmd.exepid process 2640 OpenWith.exe 4992 cmd.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exepid process 3788 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe 1596 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
powershell.exetaskmgr.execmd.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeHEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exeHEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exepayload.etldescription pid process target process PID 892 wrote to memory of 4992 892 powershell.exe cmd.exe PID 892 wrote to memory of 4992 892 powershell.exe cmd.exe PID 3340 wrote to memory of 5060 3340 taskmgr.exe taskmgr.exe PID 3340 wrote to memory of 5060 3340 taskmgr.exe taskmgr.exe PID 4992 wrote to memory of 2636 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe PID 4992 wrote to memory of 2636 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe PID 4992 wrote to memory of 3668 4992 cmd.exe zbhnd.exe PID 4992 wrote to memory of 3668 4992 cmd.exe zbhnd.exe PID 4992 wrote to memory of 4384 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe PID 4992 wrote to memory of 4384 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe PID 4992 wrote to memory of 4384 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe PID 4992 wrote to memory of 1660 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe PID 4992 wrote to memory of 1660 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe PID 4992 wrote to memory of 1660 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe PID 4992 wrote to memory of 3856 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe PID 4992 wrote to memory of 3856 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe PID 4992 wrote to memory of 1436 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe PID 4992 wrote to memory of 1436 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe PID 4992 wrote to memory of 1436 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe PID 4992 wrote to memory of 4292 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe PID 4992 wrote to memory of 4292 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe PID 4992 wrote to memory of 4292 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe PID 2636 wrote to memory of 4488 2636 HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe powershell.exe PID 2636 wrote to memory of 4488 2636 HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe powershell.exe PID 3856 wrote to memory of 5096 3856 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe powershell.exe PID 3856 wrote to memory of 5096 3856 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe powershell.exe PID 4992 wrote to memory of 2896 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe PID 4992 wrote to memory of 2896 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe PID 4992 wrote to memory of 2896 4992 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe PID 1660 wrote to memory of 4288 1660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe powershell.exe PID 1660 wrote to memory of 4288 1660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe powershell.exe PID 1660 wrote to memory of 4288 1660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe powershell.exe PID 4992 wrote to memory of 4820 4992 cmd.exe HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe PID 4992 wrote to memory of 4820 4992 cmd.exe HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe PID 4292 wrote to memory of 4160 4292 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe powershell.exe PID 4292 wrote to memory of 4160 4292 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe powershell.exe PID 4292 wrote to memory of 4160 4292 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe powershell.exe PID 4992 wrote to memory of 2884 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe PID 4992 wrote to memory of 2884 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe PID 4992 wrote to memory of 2884 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe PID 4992 wrote to memory of 1236 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 1236 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 1236 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 3788 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe PID 4992 wrote to memory of 3788 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe PID 4992 wrote to memory of 3788 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe PID 1236 wrote to memory of 3668 1236 HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe zbhnd.exe PID 1236 wrote to memory of 3668 1236 HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe zbhnd.exe PID 1236 wrote to memory of 3668 1236 HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe zbhnd.exe PID 4992 wrote to memory of 1492 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe PID 4992 wrote to memory of 1492 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe PID 3788 wrote to memory of 1596 3788 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe PID 3788 wrote to memory of 1596 3788 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe PID 3788 wrote to memory of 1596 3788 HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe PID 4992 wrote to memory of 5256 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe PID 4992 wrote to memory of 5256 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe PID 4992 wrote to memory of 5256 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe PID 4820 wrote to memory of 3792 4820 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe PID 4820 wrote to memory of 3792 4820 HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe PID 4992 wrote to memory of 5208 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exe PID 4992 wrote to memory of 5208 4992 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exe PID 5208 wrote to memory of 6072 5208 HEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exe payload.etl PID 5208 wrote to memory of 6072 5208 HEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exe payload.etl PID 6072 wrote to memory of 3620 6072 payload.etl Decode.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00463.7z1⤵
- Modifies registry class
PID:2736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4220
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00463.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1032
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:5780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:8240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:12000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:5228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:8800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:6996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:7844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:10784
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe" -Force4⤵PID:11904
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exeC:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe4⤵PID:6884
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exeC:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe4⤵PID:10152
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:8384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:8032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:11856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:10932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:8176
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:2080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:12216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:4908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:10340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9336
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:3584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:5912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:7752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:4400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5972
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:2592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:2164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:7392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:10440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:6480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:2736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:6772
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exeC:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5628
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵
- System Location Discovery: System Language Discovery
PID:8832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11292
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:5748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:11072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:10384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:10776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:9652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:6136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.84⤵PID:6556
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"4⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"5⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:5656
-
-
-
C:\Users\Admin\AppData\Roaming\MAINPROC.exe"C:\Users\Admin\AppData\Roaming\MAINPROC.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:10128 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"5⤵
- Executes dropped EXE
PID:8368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8368 -s 4966⤵
- Program crash
PID:7464
-
-
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"5⤵
- Executes dropped EXE
PID:10300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10300 -s 4966⤵
- Program crash
PID:11236
-
-
-
C:\Users\Admin\AppData\Local\Temp\SMSS.exe"C:\Users\Admin\AppData\Local\Temp\SMSS.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10304 -
C:\Users\Admin\AppData\Local\Temp\SMSS.exe"C:\Users\Admin\AppData\Local\Temp\SMSS.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "Explorer.exe HelpMe.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"5⤵PID:6488
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "Explorer.exe HelpMe.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"6⤵PID:6644
-
-
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exeHEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exeHEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3792
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 7724⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 7924⤵
- Program crash
PID:5348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 9244⤵
- Program crash
PID:5624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 7924⤵
- Program crash
PID:5764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 12284⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 12924⤵
- Program crash
PID:4536
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3668
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exeC:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1596
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1492
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exeHEUR-Trojan-Ransom.Win32.Encoder.vho-090180aef36119bdef55a60525962f6a17c6edd37b6a73538c88d0a49fdde3c5.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5208 -
C:\Users\Admin\Desktop\00463\payload.etl"payload.etl"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Users\Admin\AppData\Local\Temp\Decode.exe"C:\Users\Admin\AppData\Local\Temp\Decode.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\LTE.exe"C:\Users\Admin\AppData\Local\Temp\LTE.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
PID:2676
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "payload.etl"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "payload.etl"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:624 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 1006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5568
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 9006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5972
-
-
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exeHEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Users\Admin\AppData\Roaming\Meus Dados.exe"C:\Users\Admin\AppData\Roaming\Meus Dados.exe" C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Generic-9ed4eef354ebf341f7c1e80face8ca83a494671bed731ac8fae0bc48c90adebc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5844 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5820 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5156 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5676 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5480 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:10108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:11580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:9044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5992
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:11188
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:10952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:3576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:6588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:1716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:4640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:9060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:2996
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-1fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exeHEUR-Trojan-Ransom.Win32.Stop.gen-321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f.exe3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5352 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 10284⤵
- Program crash
PID:5652
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5884 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exeHEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8668 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\adae6ab9-48ac-4e39-b764-44d6d4fba29c" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:9084
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe"C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:12020 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe"C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-379b6b6f6ee3e1a65c652f453b5df28de6be02bb9b086a7e0c48570945614d87.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6240
-
-
-
-
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5528 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9552 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe"C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7568 -
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe"C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Stop.gen-f64101c39b8344473763277c715167216eba418e86f4f2cf22ee7724182b930a.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7796
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops startup file
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2884 -ip 28841⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2884 -ip 28841⤵PID:5296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2884 -ip 28841⤵PID:5692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2884 -ip 28841⤵PID:6036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2884 -ip 28841⤵PID:6008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2884 -ip 28841⤵PID:5440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5352 -ip 53521⤵PID:6076
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\a7d28c34ebc348cdac66cb84fdbe0d33 /t 184 /p 14921⤵PID:5948
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\50ef472fc7d74c40b16f0fe61dfed757 /t 440 /p 36201⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 8368 -ip 83681⤵PID:8632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 10300 -ip 103001⤵PID:11216
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:2648
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Read-me!!! 0 .txt.DEMON2⤵PID:7820
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00463\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:10912
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:7360
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:7288
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Indicator Removal
1File Deletion
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD590bc7104a2d0b4acf29631eb63a7721f
SHA129a33cb82f4e21da62844cff8800322cd5ed0bca
SHA256d029e702e49df3ad2436f935f2824f67d38f37693a0024740286b8564edb6886
SHA512104a97a956d9b742114d68ff58d329b7d486f6b4936d0cf4cdcc05bf95a4126cae8266ebdc64bad5f9d5d38aa3329967370aaff93b6cc041fc3eea0b130c31cb
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
1KB
MD5b12c1106c8abd5a3afc2ce78c48eb9d8
SHA171729df3f95e9680a268c9fa50fc33eb9af18d66
SHA256fbee9d20ff949a1c1d73b52caa72707461a0dfc4d1420cb6e24b08ce1b15b2df
SHA5125b707f2e33db6adb676844c6359ab605d62abfced85c07208bd467fe9ca17ec95cff7e81caa4d1697b21f53b9260ffb413762a308109627908c79ef93e230fbf
-
Filesize
59KB
MD5a7bc46e76db85d33fd3219d8ba4a185d
SHA1a55f93af48a92d9e609152edd098df9372d36b93
SHA25624ac0f78875081601a36e7e118b6cbf47ce76504241baf3dbe7fc98939844292
SHA512e102e7fd7b5f879fe58eb2b01a9ec9f262853b236579277643ab9044505528e8042049b5aabe83193aa728196a2cac3cdda84e720513f981cb28ef9f02c14aaf
-
Filesize
18KB
MD5cfdd482f35c82355ed94e9b2f620c856
SHA13008d6e227615b638e1a9d5232eae21ac00a9e0a
SHA256d2e6ae19c57ba2fec342463637471628dcdc2a8053cad001668bde01127b8fa8
SHA51296f566ee21f866cdf22fe9eb5b09f59b4acce4584deac1df530e60534f9e38ef9c1d0674f2195574b4a3a63d95b724413bc932775631a22c627dfbbb1a16dd46
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
Filesize
3.0MB
MD57bdda60c9136dfcef785132a0c77b193
SHA1f6bcd152d638cf54767203edb238eef2993b98bd
SHA256bec23da5408f0fff9fe31c0ba49f6cd305ab6e242c270305c904295e54e88266
SHA512b2e3df1aefdf271e494c91a9fa19bf0dbf8696fe30e524827659198080467dc5dc5d4a2394f27cefd8bb9923ece8757ccedaae3b5f836d4175690f128032098d
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
84KB
MD5a991152fd5b8f2a0eb6c34582adf7111
SHA13589342abea22438e28aa0a0a86e2e96e08421a1
SHA2567301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef
SHA512f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
64KB
MD588e2bf0a590791891fb5125ffcf5a318
SHA139f96abbabf3fdd46844ba5190d2043fb8388696
SHA256e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6
SHA5127d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf
-
Filesize
159KB
MD5cdd13b537dad6a910cb9cbb932770dc9
SHA1b37706590d5b6f18c042119d616df6ff8ce3ad46
SHA256638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e
SHA512c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199
-
Filesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
Filesize
64KB
MD5df830d3061aa2524eeec14ed02f7ad65
SHA1daa6eef81006dae88d3ad776764401a566261028
SHA2561b4d93153d06bcdbff02ce3a68f6a620ccbe4ba163baf78698d5fba3f54d4357
SHA5120fa007990184e731e8a431572676033de99f25d5bffa627e9aa35e4ab96d5ccb1ecebf383bb29ce28fb46ae24505ead2be21a93ed53750a37be6e9ec7dd22d22
-
Filesize
763KB
MD5636be3ddb8732c9c52de9c7c86f5b9ee
SHA1ccb3a2da7846cc8af9da8ec78c679cbf168ca2f8
SHA256cba1949b47775b76b488bdaf60267248a847773a35df8530d16d6ed25738eda9
SHA512a2059e915806116d754363554e9489508bbb7ffd765ab0203e94b05ba0874b5d1a1534deb8b4ca2f18699983ecac39139a77fcf01adecd0f91276ecff641e1d3
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
Filesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
50KB
MD5efbf0dc8e8fc515bc585418c844a88e6
SHA1ab4a864b3a1e4e2d89023af826bab4a8c83a8425
SHA2562e3ae23377a360a8ed96cfd5a1cbc08861d1831be6976b482ef960911095fe27
SHA512d303960e47ec3833af2771aaf272e22e82c65055d3db50130f707ed86101157027b52a95e4be9112a5d0e70e0dfc473affc118c37ed851de29a3af69a03dc84d
-
Filesize
296KB
MD586918a6fe5f85b4fd8eb3c4585a7f528
SHA1479ff9d153bfed3685012b1b37403a28a414f71a
SHA256321d59b076665e69fccc8f73c109e7d24c4c7199a0546d319638a65e60a83e9f
SHA512a3c9afe611932ecf068488157cc5ee6f6250bfdb99169a91955ea99aa0b1d00d7acf4d04695ffc59ef2913ad460a017bdef8f76df3f7a756d868f001d7b96bef
-
Filesize
262KB
MD5facf8e6698f585c63768c81392617951
SHA124fd71cb8b8275bc226afbcc4e34b91febfaa892
SHA2560f15bf8c4b5e9605bf4d67b8ce0cf5d56ea66992bc2b547998a5a7fda7371542
SHA51277a2f55bf4cdca1bda6e922b21ae4cf0d76ecb486c0a7fe089ab7b3991a4a8de7db92ce73901b31085d0a10b74a14d8cdba377ce42e82e10798de024b5dab724
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed.exe
Filesize6.4MB
MD5867eb03324e1d467f2f919ef54d6e3ea
SHA158c2f054f73771397a2e58cc4e7e48de2ba1ef09
SHA256039edbbd634d43da4a757d24ba6b1f4def3abb4dd063e2747219819334067bed
SHA512ef8647f3b05ea37256f5db147ec389b58e10956c3c2c1f95bf425378b3491792988c0ba22203e18ad837594099075f9ad04fa38046dd37282834109fcd247a93
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39.exe
Filesize2.0MB
MD523f3c38836736401d0737b1427350d42
SHA1d4fa2b83c3f396c33a5bb2c59b5da8f2aaf53f20
SHA256095342b7049bb0b46e83bad53ea90bea7be0b0a0639485193d0c273d0eb80e39
SHA51290bf821640cc2dd4b8f8e0e46a960f6dae9d15140876e7e4edf83e988c6f23905e9a12f2038ab214d962c0573b7edf7839f8c6706ea7ad970d099ce57ad3d4c6
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8.exe
Filesize2.2MB
MD51d9afc3b06154312da8b0b9395e8fe7f
SHA120e0e67522ee702e9f5f32d44af685cfc8b56009
SHA256697414e831f2574b2dc65e397d2dddc2acca45c47890308750af5cccbb2d46a8
SHA512deee37c33efc3250990517bb633805cd7564bc9c5d20383576fdc76cbadb3486d916fcbf790738713e2bb0b6aee450ee84bfc2e8140704e8c72725ccab77d39e
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-9668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2.exe
Filesize423KB
MD50c5a14574c87776a012e01ba2db01f9d
SHA145cb22f676665db7b1b0655615a5f1b2776f65c4
SHA2569668bbd926bf73dd307e8eb9acb69e68ddee127c940a67bf0d6c0c9d889a6bf2
SHA512838931705b2a58da60b1ba726ac45834a0d0593f4c5cede437724bcd6e5f7df9a45e43b960d76358a9efbd24702d7fee956fff9e97780ca11ecf0dda872f1f12
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff.exe
Filesize6.5MB
MD533300ce155ce544a9be453c5d2372a34
SHA1f119b62b49a1ce99883285f4f69a711a5c2d5393
SHA256a9fb5eb534dc6bd3b5ba5d57349efd9c55c9d8020f63b2d6d21835f36d635aff
SHA5121a8578008e6216e00fd8cb268c03dea186bd6eed4bb41c976fc892bdacfed2a09510df6777996a77f7444f585faf904dee86bb90c32c760d4211a64d53f8f51b
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa.exe
Filesize309KB
MD50f8f3c508e4bcda6108dc61714e94d07
SHA1fd262760bc91d1d7762f3f1e453634a2c0af6c0f
SHA256d2890c754ab95d16d9d1d93f680a850db565a61c68bbaf0337696bfbb485e8fa
SHA51218eb1ffed8d56a09a8829d61e04f0266333317e6fac858c886443a5551c094b77663c272fb0cf50455e42ac0445c68dc69e88de8c2791c87ae6abbfe5375b562
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7.exe
Filesize2.1MB
MD55193bfdb36d398a7f71c1145c969060a
SHA142eaaf362ff6ce327c391d8a9ad2b7795f1f1d42
SHA256d7ec622cd33aa5ae0a66337357f724a2a013b9d3ff91c51694e28065c5ea59d7
SHA51235b3470bb11d4015eea20c8d430cde206589ae7c6ca735c9744e0259ec2701a45214757619129fab7f8732e383dee22c037480a99176a8c8a269ed5bfde0f7d8
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453.exe
Filesize1.6MB
MD5d33d2cc2bb1c1021b6342d926cf11116
SHA10e7d157df42bfce3629a890255f4863f49fa1d6e
SHA256f82ddb5a7484a583727029b8474105a7fa4af2f61f2bd0a71c4794e5aad39453
SHA512f6231a770781c96485573f1c9d06a36214d8755556d1c68a0da2cca4d6de04a62b3a3f3d251056da5f3d6b980ad057bc356b8698f4d21f6f389a1d329b1062d1
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Python.Agent.gen-01846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb.exe
Filesize23.5MB
MD5cede0a34e9d113730c70ff5bf98a26ba
SHA16afb850b76ca0bff6ed1aaadd4b5232351807611
SHA25601846406554cd4b29e1d9bd0f35396fcb437b8f264edf4f86431bda7a530edbb
SHA5126da7515ba7b9bf1678e52d3fa1437a375b627376a84635a8b0c494daab5b2de49baba1b50ddb72eed8b33600a14259eceaf3aa13ec7f268751fd9cdcc2d65c24
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Blocker.gen-18e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18.exe
Filesize461KB
MD5c8f3719f09fa3745d000e418825cb947
SHA1a92d5a33dd958c47e2d4d2632298b4100f4905b5
SHA25618e9bcf34eddc90a695dbbc6e9979b163affc9288e7ea7f2e7dbb4a2f693cf18
SHA5129c6596e719a4e49e22301bd80a92c94173b138aaa51e6cd7f12117724acf8f3c52996cb53c08cfbd78f039e1d14f580751b21849feaf0e0333229174c02ac246
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Blocker.pef-fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3.exe
Filesize50KB
MD5b71397649522d063e1c619a7cdbc177a
SHA1ea5a2156544d0c64d675da978144feed41bbd7b2
SHA256fa83fcf1d8e11178d12f7b7cb9a064d7125e1c7b0ea412f82bee14d37316d2a3
SHA5127b1c475ee0659a8a364a8ca066a1ddf14316dc727c1e739e6a7f3a1abdf904972868d50abd874273d41fa2fdac13e42ae01b1b29c47273267252e8cde8e0dbb3
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe
Filesize385KB
MD5403562b9b515c98ddd563cd73fc08b13
SHA1d5464be8f8093f3acca7e15b0c9b4611ef9ee31b
SHA256ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02
SHA512847b0faf9d6726e338dd469072be221efec625aa1e89a40427b33a551bbbd68e79c071979ba670a7daf2808c459b15f6df1069f240b29d8020573487d786f96e
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Convagent.gen-ab97531316f9accb0212142ba0d64acf4596f13da35ffe9c9ceda718784b2e02.exe
Filesize385KB
MD59ae3a9b77f71c15afd7b64db9f9804ef
SHA1395e4e6e3d26d9ad9ef5db6c4a65bd8fb789a818
SHA256e8ace770b68937b02d4c17465981d49b82aef2568001a86ed82b026310bbc377
SHA5125705c0852a709e11944e56a41e803ee3f57575df4cbfa34a7bf7a985308dfdb9d1f13b8707114653f42d6c3ffefa87d95394077d7b8461f8fa39ca180fa99046
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2.exe
Filesize1.8MB
MD53efd6f02c8000aaf8cd95a6f670b81ba
SHA13a285486f6893184aac18f9d5391415e0b7f913c
SHA256f41d2bb776d1af7c88f91c03951197a8d41ff02bcaa8e5d1dc9099cf16827de2
SHA512aafc06666446be7575bbcde3de248aff7f41d7994de58b17d7dda47ec17855053619433753acb4acb777cf49ccc595fd05b22840ab9ffcd4adc6f4c029691058
-
C:\Users\Admin\Desktop\00463\HEUR-Trojan-Ransom.Win32.Encoder.gen-c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2.exe
Filesize96KB
MD5486e7f80b803f8074ee51ca382ffc6e4
SHA1ac9d7c92fdec13d475954346d6a3c6f32e041836
SHA256c4a98a97c1d41eca96c3e4f21cdc4b1da50d42f31c8f6f4f2d0d7cc9065813e2
SHA512632b915a069ea72122ccca80c2b3961a0c3486a148f7301e59799a919c5b54fc233bc923e21ab9960ca686c7b49c4d064ad74fc9abf7434e13fa329559036199
-
Filesize
737B
MD53f6a14606b7e88b4d8efdf08554617a7
SHA17ab21eb1fbd4c148b1753d9fe9af6c5a8eb56547
SHA256166a9482d6b60e7fd49e7463efc04e62f3edf57b11f0b5b77b8d138a736aa801
SHA512666be8da3f2d737dd9f26fa38818efb412bf6b01b675647797a3b748c4330a5ae7051ea810a4c1c9047d262382886e9c7fc9a2bd49642e94a5ecc2b93291434f
-
Filesize
575B
MD5efd54055b28e173ea64831fc59a0aca8
SHA1cdf18b0692a53cbeed66ee14fa0f54666cf04013
SHA256e3cf65e96fcf774320e0ae4a42d6544f1aef476cd67184432465b2c595180a99
SHA5125ecf69dbdf824a6e0221e7f953ed58889bbd76ee563e9fc7e5d95b68245d0f4af0e0ec5f13f002975b65bacf0cd29027964b9f8c4174134ed08358e41b58f4d5
-
Filesize
1.2MB
MD5cedb9852248ba1aa431006bcfbcd2e76
SHA182f4d844967b57128f89a634c4da5f1cbff74804
SHA2561fc9d8075c177847560b3efe00f9b61ee27dfb4073693ed13ccf431f2b5ece73
SHA5121888a7257d92939a48a08277a6eeb6125c5da1981ae8f49daabf4e371074902a96dd5c1555bd1ecf5a5de1b9dd907212636f81b9757ec016482162fefa756ef8
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47