Analysis
-
max time kernel
285s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00433.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00433.7z
-
Size
35.7MB
-
MD5
9fbb9ec824a27440e55952383c31ded6
-
SHA1
109af893f6fa5311d202b88e879eb7356cb7a5d9
-
SHA256
b3ece445ea196b4992b214680c43f76f9ca182c56f6c07a1362b5045a1be88e9
-
SHA512
6fab12555b0b2462d2e2640a808d362f286207c471b629c181b8b25f59e0ae889acc0f1045178c84587373f9a5ba3537485716f096c0298ec67f21723be7a8d1
-
SSDEEP
786432:OkFkaZ1mtXsBZCAuaHNS/XFHfzRXXBqY6fRmdCUn2elo7LlEP:tyWcRK8a0/ZzRXcFgdCUToXlI
Malware Config
Extracted
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\!!FAQ for Decryption!!.txt
Extracted
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?8B87A11BCEAB4AA5AD4D982C940D49D8
http://lockbitks2tvnmwk.onion/?8B87A11BCEAB4AA5AD4D982C940D49D8
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Extracted
sodinokibi
$2a$10$dfjpLrXuDytfF.kmYtQ1ROgsXjTJEe8EmQT65ftxlTpJtXPZrhsAq
7178
kamahouse.net
bridgeloanslenders.com
abitur-undwieweiter.de
live-your-life.jp
xn--rumung-bua.online
anteniti.com
marcuswhitten.site
ostheimer.at
joseconstela.com
deepsouthclothingcompany.com
dr-seleznev.com
ecpmedia.vn
aunexis.ch
anthonystreetrimming.com
pocket-opera.de
mooreslawngarden.com
osterberg.fi
extraordinaryoutdoors.com
kamienny-dywan24.pl
fitovitaforum.com
carlosja.com
klusbeter.nl
zflas.com
lenreactiv-shop.ru
notmissingout.com
fiscalsort.com
hugoversichert.de
operaslovakia.sk
stopilhan.com
spacecitysisters.org
drfoyle.com
jenniferandersonwriter.com
thomas-hospital.de
wmiadmin.com
worldhealthbasicinfo.com
321play.com.hk
meusharklinithome.wordpress.com
hushavefritid.dk
spargel-kochen.de
wien-mitte.co.at
notsilentmd.org
pickanose.com
sw1m.ru
verytycs.com
fibrofolliculoma.info
balticdermatology.lt
zimmerei-deboer.de
licor43.de
cnoia.org
mylolis.com
parking.netgateway.eu
mirjamholleman.nl
kadesignandbuild.co.uk
ledmes.ru
mrsplans.net
sanaia.com
koko-nora.dk
1team.es
associationanalytics.com
unetica.fr
onlyresultsmarketing.com
easytrans.com.au
iphoneszervizbudapest.hu
gaiam.nl
paradicepacks.com
travelffeine.com
phantastyk.com
werkkring.nl
glennroberts.co.nz
burkert-ideenreich.de
transliminaltribe.wordpress.com
ruralarcoiris.com
copystar.co.uk
kuntokeskusrok.fi
purposeadvisorsolutions.com
nataschawessels.com
vox-surveys.com
4youbeautysalon.com
partnertaxi.sk
bauertree.com
tomaso.gr
dutchbrewingcoffee.com
modestmanagement.com
hashkasolutindo.com
lynsayshepherd.co.uk
thewellnessmimi.com
peterstrobos.com
run4study.com
odiclinic.org
almosthomedogrescue.dog
praxis-foerderdiagnostik.de
ussmontanacommittee.us
smejump.co.th
cafemattmeera.com
lubetkinmediacompanies.com
bodyfulls.com
boompinoy.com
nosuchthingasgovernment.com
ki-lowroermond.nl
aakritpatel.com
iqbalscientific.com
nandistribution.nl
thenewrejuveme.com
allfortheloveofyou.com
fatfreezingmachines.com
autodemontagenijmegen.nl
higadograsoweb.com
layrshift.eu
jandaonline.com
grelot-home.com
lapinvihreat.fi
geekwork.pl
conasmanagement.de
selfoutlet.com
hebkft.hu
skanah.com
pixelarttees.com
katketytaanet.fi
stefanpasch.me
biortaggivaldelsa.com
ausair.com.au
tanciu.com
micahkoleoso.de
oceanastudios.com
asgestion.com
prochain-voyage.net
ilive.lt
trapiantofue.it
manijaipur.com
crediacces.com
tstaffing.nl
urmasiimariiuniri.ro
presseclub-magdeburg.de
bordercollie-nim.nl
tarotdeseidel.com
bargningavesta.se
forskolorna.org
tomoiyuma.com
mank.de
zzyjtsgls.com
kedak.de
csgospeltips.se
nestor-swiss.ch
insigniapmg.com
thomasvicino.com
lloydconstruction.com
shsthepapercut.com
hotelsolbh.com.br
ouryoungminds.wordpress.com
jorgobe.at
verbisonline.com
kenhnoithatgo.com
bildungsunderlebnis.haus
stampagrafica.es
lachofikschiet.nl
gastsicht.de
senson.fi
karacaoglu.nl
tophumanservicescourses.com
chaotrang.com
coursio.com
answerstest.ru
happyeasterimages.org
walkingdeadnj.com
tsklogistik.eu
hannah-fink.de
fotoideaymedia.es
irinaverwer.com
the-virtualizer.com
ecoledansemulhouse.fr
homesdollar.com
petnest.ir
portoesdofarrobo.com
qualitus.com
hypozentrum.com
craigmccabe.fun
mariposapropaneaz.com
rimborsobancario.net
kosterra.com
tigsltd.com
zweerscreatives.nl
pasivect.co.uk
visiativ-industry.fr
groupe-cets.com
whyinterestingly.ru
directwindowco.com
eaglemeetstiger.de
rhinosfootballacademy.com
lichencafe.com
arteservicefabbro.com
connectedace.com
summitmarketingstrategies.com
rushhourappliances.com
mrsfieldskc.com
hhcourier.com
quickyfunds.com
i-arslan.de
antenanavi.com
gw2guilds.org
kath-kirche-gera.de
wsoil.com.sg
fannmedias.com
baustb.de
kmbshipping.co.uk
iwr.nl
andersongilmour.co.uk
filmvideoweb.com
eco-southafrica.com
collaborativeclassroom.org
vannesteconstruct.be
haremnick.com
moveonnews.com
solinegraphic.com
helenekowalsky.com
schoolofpassivewealth.com
jasonbaileystudio.com
live-con-arte.de
sairaku.net
milanonotai.it
shhealthlaw.com
woodworkersolution.com
humanityplus.org
candyhouseusa.com
piajeppesen.dk
baptisttabernacle.com
x-ray.ca
polzine.net
healthyyworkout.com
pivoineetc.fr
drinkseed.com
sobreholanda.com
ceid.info.tr
marketingsulweb.com
stupbratt.no
makeurvoiceheard.com
schraven.de
firstpaymentservices.com
maratonaclubedeportugal.com
mikeramirezcpa.com
body-armour.online
corendonhotels.com
tulsawaterheaterinstallation.com
quemargrasa.net
opatrovanie-ako.sk
blog.solutionsarchitect.guru
wari.com.pe
leoben.at
zonamovie21.net
rksbusiness.com
miraclediet.fun
coding-machine.com
turkcaparbariatrics.com
monark.com
victoriousfestival.co.uk
nativeformulas.com
berlin-bamboo-bikes.org
farhaani.com
craftleathermnl.com
jeanlouissibomana.com
mezhdu-delom.ru
alvinschwartz.wordpress.com
sporthamper.com
securityfmm.com
body-guards.it
poultrypartners.nl
div-vertriebsforschung.de
ctrler.cn
fensterbau-ziegler.de
serce.info.pl
fransespiegels.nl
ausbeverage.com.au
asteriag.com
binder-buerotechnik.at
aarvorg.com
slupetzky.at
punchbaby.com
pmcimpact.com
lykkeliv.net
suncrestcabinets.ca
faizanullah.com
mapawood.com
saarland-thermen-resort.com
sterlingessay.com
tanzprojekt.com
shadebarandgrillorlando.com
gemeentehetkompas.nl
id-et-d.fr
gporf.fr
highlinesouthasc.com
vietlawconsultancy.com
blumenhof-wegleitner.at
waywithwords.net
buymedical.biz
wychowanieprzedszkolne.pl
kalkulator-oszczednosci.pl
ivivo.es
uimaan.fi
charlottepoudroux-photographie.fr
i-trust.dk
heliomotion.com
smalltownideamill.wordpress.com
hotelzentral.at
alysonhoward.com
sarbatkhalsafoundation.org
huehnerauge-entfernen.de
outcomeisincome.com
waveneyrivercentre.co.uk
sevenadvertising.com
apolomarcas.com
juneauopioidworkgroup.org
waermetauscher-berechnen.de
executiveairllc.com
pubweb.carnet.hr
madinblack.com
ogdenvision.com
toreria.es
365questions.org
nancy-informatique.fr
zso-mannheim.de
naturalrapids.com
latestmodsapks.com
siliconbeach-realestate.com
croftprecision.co.uk
birnam-wood.com
galserwis.pl
fundaciongregal.org
platformier.com
bptdmaluku.com
kaliber.co.jp
shiftinspiration.com
caribbeansunpoker.com
aco-media.nl
satyayoga.de
renergysolution.com
longislandelderlaw.com
narcert.com
strandcampingdoonbeg.com
kafu.ch
rostoncastings.co.uk
foryourhealth.live
spd-ehningen.de
lionware.de
milsing.hr
lebellevue.fr
atozdistribution.co.uk
ncuccr.org
atalent.fi
shonacox.com
alsace-first.com
stallbyggen.se
ralister.co.uk
eraorastudio.com
sojamindbody.com
songunceliptv.com
bouquet-de-roses.com
comparatif-lave-linge.fr
bigbaguettes.eu
esope-formation.fr
smart-light.co.uk
rebeccarisher.com
cortec-neuro.com
financescorecard.com
idemblogs.com
biapi-coaching.fr
izzi360.com
oneplusresource.org
plotlinecreative.com
walter-lemm.de
12starhd.online
olejack.ru
navyfederalautooverseas.com
freie-gewerkschaften.de
levdittliv.se
plantag.de
vibehouse.rw
instatron.net
qlog.de
vdberg-autoimport.nl
blgr.be
durganews.com
deltacleta.cat
35-40konkatsu.net
ceres.org.au
physiofischer.de
parks-nuernberg.de
pmc-services.de
tanzschule-kieber.de
sandd.nl
stemplusacademy.com
boulderwelt-muenchen-west.de
mousepad-direkt.de
bouncingbonanza.com
dekkinngay.com
socialonemedia.com
rocketccw.com
advokathuset.dk
architecturalfiberglass.org
vorotauu.ru
lapmangfpt.info.vn
asiluxury.com
lbcframingelectrical.com
pcp-nc.com
imaginado.de
starsarecircular.org
vickiegrayimages.com
maineemploymentlawyerblog.com
xtptrack.com
all-turtles.com
nsec.se
bristolaeroclub.co.uk
gantungankunciakrilikbandung.com
penco.ie
galleryartfair.com
maxadams.london
web.ion.ag
citymax-cr.com
tinkoff-mobayl.ru
vesinhnha.com.vn
kojinsaisei.info
mepavex.nl
takeflat.com
mrtour.site
accountancywijchen.nl
rota-installations.co.uk
devok.info
first-2-aid-u.com
girlillamarketing.com
lescomtesdemean.be
iwelt.de
otto-bollmann.de
smessier.com
webmaster-peloton.com
mmgdouai.fr
beyondmarcomdotcom.wordpress.com
personalenhancementcenter.com
innote.fi
sla-paris.com
craigvalentineacademy.com
geoffreymeuli.com
maureenbreezedancetheater.org
desert-trails.com
deoudedorpskernnoordwijk.nl
marietteaernoudts.nl
pawsuppetlovers.com
skiltogprint.no
dramagickcom.wordpress.com
ymca-cw.org.uk
wacochamber.com
mooshine.com
jyzdesign.com
zieglerbrothers.de
xn--singlebrsen-vergleich-nec.com
xltyu.com
grupocarvalhoerodrigues.com.br
amerikansktgodis.se
theapifactory.com
fairfriends18.de
noskierrenteria.com
ncs-graphic-studio.com
neuschelectrical.co.za
jusibe.com
insp.bi
whittier5k.com
naswrrg.org
jiloc.com
importardechina.info
seevilla-dr-sturm.at
caffeinternet.it
space.ua
greenko.pl
miriamgrimm.de
adultgamezone.com
hmsdanmark.dk
refluxreducer.com
socstrp.org
evangelische-pfarrgemeinde-tuniberg.de
calabasasdigest.com
mardenherefordshire-pc.gov.uk
baumkuchenexpo.jp
ateliergamila.com
drugdevice.org
naturstein-hotte.de
nuzech.com
trackyourconstruction.com
ihr-news.jp
myteamgenius.com
onlybacklink.com
parkstreetauto.net
retroearthstudio.com
noixdecocom.fr
restaurantesszimmer.de
woodleyacademy.org
nhadatcanho247.com
hardinggroup.com
mrxermon.de
thedresserie.com
ccpbroadband.com
promalaga.es
handi-jack-llc.com
garage-lecompte-rouen.fr
allentownpapershow.com
raschlosser.de
porno-gringo.com
figura.team
love30-chanko.com
xn--logopdie-leverkusen-kwb.de
krlosdavid.com
elpa.se
rafaut.com
denifl-consulting.at
jerling.de
quizzingbee.com
bargningharnosand.se
littlebird.salon
americafirstcommittee.org
maasreusel.nl
twohourswithlena.wordpress.com
lightair.com
wurmpower.at
creamery201.com
ravensnesthomegoods.com
henricekupper.com
kaminscy.com
otsu-bon.com
seagatesthreecharters.com
musictreehouse.net
pinkexcel.com
daklesa.de
falcou.fr
pierrehale.com
vloeren-nu.nl
facettenreich27.de
minipara.com
bayoga.co.uk
koken-voor-baby.nl
zervicethai.co.th
rumahminangberdaya.com
team-montage.dk
stingraybeach.com
cyntox.com
cityorchardhtx.com
calxplus.eu
simulatebrain.com
global-kids.info
polymedia.dk
pv-design.de
aniblinova.wordpress.com
corelifenutrition.com
theadventureedge.com
imadarchid.com
enovos.de
seitzdruck.com
carrybrands.nl
troegs.com
hairnetty.wordpress.com
epwritescom.wordpress.com
completeweddingkansas.com
appsformacpc.com
gymnasedumanagement.com
brevitempore.net
ilcdover.com
withahmed.com
tradiematepro.com.au
macabaneaupaysflechois.com
thaysa.com
work2live.de
imperfectstore.com
edv-live.de
groupe-frayssinet.fr
tenacitytenfold.com
dinslips.se
agence-chocolat-noir.com
brawnmediany.com
1kbk.com.ua
mirkoreisser.de
centrospgolega.com
urist-bogatyr.ru
cheminpsy.fr
y-archive.com
knowledgemuseumbd.com
profectis.de
mymoneyforex.com
myhealth.net.au
psa-sec.de
shiresresidential.com
resortmtn.com
liliesandbeauties.org
airconditioning-waalwijk.nl
norovirus-ratgeber.de
nacktfalter.de
heurigen-bauer.at
oneheartwarriors.at
rosavalamedahr.com
spectrmash.ru
yousay.site
backstreetpub.com
dpo-as-a-service.com
daniel-akermann-architektur-und-planung.ch
lmtprovisions.com
real-estate-experts.com
dnepr-beskid.com.ua
greenpark.ch
courteney-cox.net
aodaichandung.com
edgewoodestates.org
testzandbakmetmening.online
analiticapublica.es
cursosgratuitosnainternet.com
artotelamsterdam.com
people-biz.com
xoabigail.com
ecopro-kanto.com
fitnessingbyjessica.com
echtveilig.nl
dubnew.com
kariokids.com
faronics.com
cursoporcelanatoliquido.online
nurturingwisdom.com
compliancesolutionsstrategies.com
kaotikkustomz.com
beaconhealthsystem.org
pelorus.group
gopackapp.com
diversiapsicologia.es
offroadbeasts.com
villa-marrakesch.de
triggi.de
sauschneider.info
alfa-stroy72.com
systemate.dk
xlarge.at
danielblum.info
sanyue119.com
bradynursery.com
streamerzradio1.site
mountsoul.de
muamuadolls.com
kidbucketlist.com.au
morawe-krueger.de
unim.su
lefumetdesdombes.com
pasvenska.se
qualitaetstag.de
romeguidedvisit.com
vanswigchemdesign.com
commercialboatbuilding.com
ncid.bc.ca
jakekozmor.com
bigasgrup.com
cuspdental.com
newyou.at
eadsmurraypugh.com
abuelos.com
lecantou-coworking.com
syndikat-asphaltfieber.de
manutouchmassage.com
trulynolen.co.uk
deschl.net
igrealestate.com
klimt2012.info
kindersitze-vergleich.de
blossombeyond50.com
employeesurveys.com
bricotienda.com
michaelsmeriglioracing.com
paymybill.guru
tastewilliamsburg.com
bundabergeyeclinic.com.au
tuuliautio.fi
richard-felix.co.uk
lapinlviasennus.fi
simplyblessedbykeepingitreal.com
jameskibbie.com
the-domain-trader.com
edrcreditservices.nl
bafuncs.org
fayrecreations.com
urclan.net
eglectonk.online
servicegsm.net
zewatchers.com
lillegrandpalais.com
ikads.org
verifort-capital.de
campusoutreach.org
igfap.com
carolinepenn.com
smartypractice.com
clos-galant.com
aglend.com.au
broseller.com
southeasternacademyofprosthodontics.org
todocaracoles.com
paulisdogshop.de
comarenterprises.com
forestlakeuca.org.au
abogados-en-alicante.es
bimnapratica.com
finde-deine-marke.de
limassoldriving.com
despedidascostablanca.es
homng.net
sinal.org
globedivers.wordpress.com
blacksirius.de
highimpactoutdoors.net
mytechnoway.com
brigitte-erler.com
devlaur.com
stoneys.ch
lorenacarnero.com
projetlyonturin.fr
yassir.pro
mbfagency.com
myhostcloud.com
sportiomsportfondsen.nl
rerekatu.com
ampisolabergeggi.it
vibethink.net
pogypneu.sk
smogathon.com
roygolden.com
ligiercenter-sachsen.de
kisplanning.com.au
samnewbyjax.com
tips.technology
promesapuertorico.com
crowd-patch.co.uk
balticdentists.com
kirkepartner.dk
bsaship.com
celeclub.org
fizzl.ru
hihaho.com
tonelektro.nl
synlab.lt
harpershologram.wordpress.com
surespark.org.uk
hkr-reise.de
jolly-events.com
winrace.no
spylista.com
agence-referencement-naturel-geneve.net
journeybacktolife.com
fitnessbazaar.com
huissier-creteil.com
wolf-glas-und-kunst.de
ivfminiua.com
baronloan.org
blewback.com
charlesreger.com
xn--vrftet-pua.biz
dlc.berlin
tux-espacios.com
slashdb.com
pferdebiester.de
dw-css.de
plastidip.com.ar
dutchcoder.nl
iviaggisonciliegie.it
pointos.com
ventti.com.ar
hoteledenpadova.it
stoeberstuuv.de
stemenstilte.nl
theshungiteexperience.com.au
micro-automation.de
fotoscondron.com
smithmediastrategies.com
commonground-stories.com
boldcitydowntown.com
chavesdoareeiro.com
jbbjw.com
sachnendoc.com
latribuessentielle.com
artallnightdc.com
stoeferlehalle.de
dushka.ua
basisschooldezonnewijzer.nl
darrenkeslerministries.com
ai-spt.jp
argenblogs.com.ar
ungsvenskarna.se
officehymy.com
liveottelut.com
devstyle.org
reddysbakery.com
tandartspraktijkhartjegroningen.nl
kunze-immobilien.de
tongdaifpthaiphong.net
augenta.com
geisterradler.de
euro-trend.pl
spsshomeworkhelp.com
schutting-info.nl
sahalstore.com
2ekeus.nl
remcakram.com
datacenters-in-europe.com
lusak.at
coffreo.biz
webhostingsrbija.rs
effortlesspromo.com
judithjansen.com
precisionbevel.com
deprobatehelp.com
mbxvii.com
schoellhammer.com
abogadosadomicilio.es
gonzalezfornes.es
bowengroup.com.au
rehabilitationcentersinhouston.net
123vrachi.ru
sabel-bf.com
besttechie.com
dr-pipi.de
midmohandyman.com
caribdoctor.org
destinationclients.fr
wellplast.se
bee4win.com
danubecloud.com
parebrise-tla.fr
nakupunafoundation.org
nachhilfe-unterricht.com
havecamerawilltravel2017.wordpress.com
anybookreader.de
kikedeoliveira.com
rollingrockcolumbia.com
educar.org
darnallwellbeing.org.uk
ulyssemarketing.com
toponlinecasinosuk.co.uk
ftf.or.at
lukeshepley.wordpress.com
vitalyscenter.es
bigler-hrconsulting.ch
sagadc.com
mooglee.com
faroairporttransfers.net
botanicinnovations.com
art2gointerieurprojecten.nl
theduke.de
levihotelspa.fi
nokesvilledentistry.com
webcodingstudio.com
saxtec.com
krcove-zily.eu
steampluscarpetandfloors.com
amylendscrestview.com
schmalhorst.de
mindpackstudios.com
bingonearme.org
philippedebroca.com
ianaswanson.com
funjose.org.gt
sotsioloogia.ee
jvanvlietdichter.nl
nmiec.com
schlafsack-test.net
gasbarre.com
perbudget.com
gadgetedges.com
sportsmassoren.com
logopaedie-blomberg.de
hvccfloorcare.com
frontierweldingllc.com
jobmap.at
4net.guru
cerebralforce.net
blogdecachorros.com
femxarxa.cat
lucidinvestbank.com
leda-ukraine.com.ua
justinvieira.com
oldschoolfun.net
centromarysalud.com
luxurytv.jp
kostenlose-webcams.com
videomarketing.pro
campus2day.de
exenberger.at
joyeriaorindia.com
autofolierung-lu.de
elimchan.com
blood-sports.net
pier40forall.org
yourobgyn.net
markelbroch.com
pay4essays.net
vihannesporssi.fi
tandartspraktijkheesch.nl
babcockchurch.org
abl1.net
slimani.net
brandl-blumen.de
leeuwardenstudentcity.nl
upplandsspar.se
puertamatic.es
kampotpepper.gives
slimidealherbal.com
westdeptfordbuyrite.com
erstatningsadvokaterne.dk
braffinjurylawfirm.com
iyengaryogacharlotte.com
herbstfeststaefa.ch
controldekk.com
bunburyfreightservices.com.au
danskretursystem.dk
waynela.com
jacquin-maquettes.com
edelman.jp
gratispresent.se
heidelbergartstudio.gallery
c2e-poitiers.com
dontpassthepepper.com
you-bysia.com.au
ftlc.es
adoptioperheet.fi
thee.network
tetinfo.in
deko4you.at
theletter.company
actecfoundation.org
radaradvies.nl
entopic.com
jadwalbolanet.info
familypark40.com
yamalevents.com
itelagen.com
artige.com
christinarebuffetcourses.com
aurum-juweliere.de
freie-baugutachterpraxis.de
launchhubl.com
microcirc.net
chandlerpd.com
catholicmusicfest.com
scenepublique.net
huesges-gruppe.de
interactcenter.org
bbsmobler.se
101gowrie.com
irishmachineryauctions.com
modamilyon.com
xn--thucmctc-13a1357egba.com
associacioesportivapolitg.cat
patrickfoundation.net
sweering.fr
crosspointefellowship.church
spinheal.ru
torgbodenbollnas.se
smale-opticiens.nl
kao.at
polychromelabs.com
beautychance.se
creative-waves.co.uk
embracinghiscall.com
camsadviser.com
triactis.com
ditog.fr
myzk.site
no-plans.com
antonmack.de
allure-cosmetics.at
vermoote.de
filmstreamingvfcomplet.be
pomodori-pizzeria.de
ilso.net
igorbarbosa.com
atmos-show.com
loprus.pl
teknoz.net
advizewealth.com
cwsitservices.co.uk
hiddencitysecrets.com.au
helikoptervluchtnewyork.nl
hatech.io
goodgirlrecovery.com
montrium.com
leather-factory.co.jp
better.town
themadbotter.com
ora-it.de
upmrkt.co
crowcanyon.com
autodujos.lt
sofavietxinh.com
jsfg.com
evologic-technologies.com
aselbermachen.com
flexicloud.hk
berliner-versicherungsvergleich.de
n1-headache.com
kissit.ca
marchand-sloboda.com
expandet.dk
merzi.info
corola.es
psc.de
homecomingstudio.com
seproc.hn
jobcenterkenya.com
zenderthelender.com
conexa4papers.trade
gamesboard.info
pt-arnold.de
vitavia.lt
bxdf.info
assurancesalextrespaille.fr
acomprarseguidores.com
8449nohate.org
ladelirante.fr
em-gmbh.ch
siluet-decor.ru
nvwoodwerks.com
houseofplus.com
coding-marking.com
corona-handles.com
international-sound-awards.com
vancouver-print.ca
julis-lsa.de
htchorst.nl
bestbet.com
dezatec.es
xn--fnsterputssollentuna-39b.se
celularity.com
aprepol.com
hellohope.com
foretprivee.ca
hexcreatives.co
zimmerei-fl.de
memaag.com
linnankellari.fi
sexandfessenjoon.wordpress.com
veybachcenter.de
cranleighscoutgroup.org
trystana.com
abogadosaccidentetraficosevilla.es
pcprofessor.com
softsproductkey.com
mylovelybluesky.com
humancondition.com
simpkinsedwards.co.uk
talentwunder.com
sloverse.com
bookspeopleplaces.com
naturavetal.hr
planchaavapor.net
proudground.org
boisehosting.net
centuryrs.com
sportverein-tambach.de
katiekerr.co.uk
pridoxmaterieel.nl
dsl-ip.de
wraithco.com
lascuola.nl
dareckleyministries.com
dubscollective.com
mercantedifiori.com
delchacay.com.ar
delawarecorporatelaw.com
dr-tremel-rednitzhembach.de
newstap.com.ng
smhydro.com.pl
milltimber.aberdeen.sch.uk
mediaplayertest.net
vyhino-zhulebino-24.ru
makeitcount.at
mdk-mediadesign.de
gasolspecialisten.se
mdacares.com
cactusthebrand.com
wasmachtmeinfonds.at
mastertechengineering.com
simpliza.com
argos.wityu.fund
ahouseforlease.com
revezlimage.com
kojima-shihou.com
luckypatcher-apkz.com
testcoreprohealthuk.com
cite4me.org
bodyforwife.com
bhwlawfirm.com
abogadoengijon.es
architekturbuero-wagner.net
hokagestore.com
saka.gr
tennisclubetten.nl
lange.host
malychanieruchomoscipremium.com
castillobalduz.es
evergreen-fishing.com
ohidesign.com
antiaginghealthbenefits.com
maryloutaylor.com
behavioralmedicinespecialists.com
apprendrelaudit.com
teczowadolina.bytom.pl
icpcnj.org
www1.proresult.no
vetapharma.fr
oslomf.no
mediaacademy-iraq.org
mediaclan.info
dirittosanitario.biz
finediningweek.pl
makeflowers.ru
aminaboutique247.com
cleliaekiko.online
stormwall.se
strategicstatements.com
c-a.co.in
roadwarrior.app
solerluethi-allart.ch
norpol-yachting.com
id-vet.com
rozemondcoaching.nl
oemands.dk
harveybp.com
hairstylesnow.site
seminoc.com
kingfamily.construction
transportesycementoshidalgo.es
cuppacap.com
thedad.com
chrissieperry.com
oncarrot.com
labobit.it
bastutunnan.se
baylegacy.com
consultaractadenacimiento.com
johnsonfamilyfarmblog.wordpress.com
parkcf.nl
podsosnami.ru
teresianmedia.org
plv.media
mir-na-iznanku.com
praxis-management-plus.de
boosthybrid.com.au
chatizel-paysage.fr
d1franchise.com
manifestinglab.com
carriagehousesalonvt.com
coastalbridgeadvisors.com
nijaplay.com
modelmaking.nl
nicoleaeschbachorg.wordpress.com
slwgs.org
bierensgebakkramen.nl
friendsandbrgrs.com
readberserk.com
bouldercafe-wuppertal.de
herbayupro.com
stacyloeb.com
ino-professional.ru
colorofhorses.com
iyahayki.nl
new.devon.gov.uk
alhashem.net
tinyagency.com
smokeysstoves.com
dublikator.com
noesis.tech
alten-mebel63.ru
DupontSellsHomes.com
cirugiauretra.es
buroludo.nl
denovofoodsgroup.com
xn--fn-kka.no
cimanchesterescorts.co.uk
milestoneshows.com
ra-staudte.de
uranus.nl
austinlchurch.com
simoneblum.de
bogdanpeptine.ro
degroenetunnel.com
rieed.de
chefdays.de
tampaallen.com
theclubms.com
ontrailsandboulevards.com
truenyc.co
tecnojobsnet.com
allamatberedare.se
gmto.fr
digi-talents.com
ziegler-praezisionsteile.de
solhaug.tk
thefixhut.com
drnice.de
bockamp.com
kevinjodea.com
sipstroysochi.ru
extensionmaison.info
intecwi.com
supportsumba.nl
danholzmann.com
mountaintoptinyhomes.com
classycurtainsltd.co.uk
bloggyboulga.net
liikelataamo.fi
insidegarage.pl
digivod.de
panelsandwichmadrid.es
greenfieldoptimaldentalcare.com
marathonerpaolo.com
admos-gleitlager.de
d2marketing.co.uk
autopfand24.de
hrabritelefon.hr
fax-payday-loans.com
christ-michael.net
haar-spange.com
psnacademy.in
thailandholic.com
symphonyenvironmental.com
-
net
false
-
pid
$2a$10$dfjpLrXuDytfF.kmYtQ1ROgsXjTJEe8EmQT65ftxlTpJtXPZrhsAq
-
prc
avgadmsv
BackupUpdater
ocautoupds
synctime
thebat
excel
isqlplussvc
ccSetMgr
SPBBCSvc
Sage.NA.AT_AU.SysTray
lmibackupvssservice
CarboniteUI
powerpnt
BackupMaint
onenote
klnagent
sql
Rtvscan
xfssvccon
Smc
mspub
encsvc
LogmeInBackupService
kavfsscs
ccSvcHst
BackupExtender
NSCTOP
outlook
dbsnmp
mydesktopservice
tbirdconfig
ShadowProtectSvc
msaccess
wordpad
mydesktopqos
BackupAgent
visio
kavfswp
ocssd
thunderbird
infopath
agntsvc
sqbcoreservice
steam
AmitiAvSrv
dlomaintsvcu
Microsoft.exchange.store.worker.exe
winword
dbeng50
firefox
TSSchBkpService
DLOAdminSvcu
kavfs
ocomm
oracle
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Attention!!! [+] Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
7178
-
svc
ssistelemetry
adsync
svc$
msseces
mbamservice
ssastelemetry
altaro
sbamsvc
ds_notifier
ntrtscan
ofcservice
code42service
macmnsvc
memtas
auservice
telemetryserver
tmccsf
psqlwge
sppsvc
viprepplsvc
azurea
ds_monitor
swi_filter
protectedstorage
mfemms
mfevtp
kaseyaagentendpoint
ltservice
dssvc
altiback
masvc
huntressagent
mcafee
kaendchips
kavfs
reportserver
savservice
altiftpuploader
sophos
svcgenerichost
altiphoneserv
klnagent
mepocs
ds_agent
threadlocker
sql
vss
tmlisten
backup
tmbmserver
savadminservice
vipreaapsvc
mfewc
altictproxy
ltsvcmon
altivrm
huntressupdater
kaseyaagent
teamviewer
msdtsserver
amsp
storagecraft
veeam
bedbg
Signatures
-
Detecting the common Go functions and variables names used by Snatch ransomware 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023c11-633.dat family_snatch behavioral1/memory/532-634-0x0000000000400000-0x000000000082C000-memory.dmp family_snatch behavioral1/memory/532-3765-0x0000000000400000-0x000000000082C000-memory.dmp family_snatch -
GandCrab payload 2 IoCs
resource yara_rule behavioral1/memory/3912-316-0x00000000020B0000-0x00000000020C7000-memory.dmp family_gandcrab behavioral1/memory/3912-311-0x0000000000400000-0x0000000000460000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Snatch family
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Urelas family
-
VanillaRat
VanillaRat is an advanced remote administration tool coded in C#.
-
Vanillarat family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/4704-555-0x0000000004EE0000-0x0000000004F76000-memory.dmp Nirsoft -
Modifies boot configuration data using bcdedit 1 TTPs 3 IoCs
pid Process 2584 bcdedit.exe 5848 bcdedit.exe 1224 bcdedit.exe -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/4704-555-0x0000000004EE0000-0x0000000004F76000-memory.dmp WebBrowserPassView -
Renames multiple (2378) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Vanilla Rat payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c06-98.dat vanillarat behavioral1/memory/4412-110-0x0000000000F90000-0x0000000000FB2000-memory.dmp vanillarat -
pid Process 4692 wbadmin.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Agent.iso-aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202.exe -
Executes dropped EXE 12 IoCs
pid Process 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-772bf3f4ef4a19ce3fb1bd2be9478cbb387176f396285e9dd2c100e7e2e01135.exe 4704 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exe 3548 HEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exe 312 HEUR-Trojan-Ransom.Win32.Cuba.gen-33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e.exe 3912 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6f0a702fe075d823e866a3c261d056e3275b68bd630e0a59b4901695a81c469a.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 3728 HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 1496 HEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exe 4820 HEUR-Trojan-Ransom.Win32.Stop.gen-f2eb0628c0974c82facf6ae281ef3a5d73e8b1808558e8a0c2b4dd3709593003.exe 2836 MsMpEng.exe 1484 Trojan-Ransom.Win32.Agent.iso-aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SuperBackupMan HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SuperBackupMan\(Default) = "Service" HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\VSS HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\VSS\(Default) = "Service" HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 MsMpEng.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0008000000023c07-100.dat vmprotect behavioral1/memory/4704-109-0x0000000000320000-0x00000000005DA000-memory.dmp vmprotect behavioral1/memory/5632-4966-0x0000000000400000-0x0000000000B8A000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 = "\"C:\\Users\\Admin\\Desktop\\00433\\HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe\"" HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\sysnetwin.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\v: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\x: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\y: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\b: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\m: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\p: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\s: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\q: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\r: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\u: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\e: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\h: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\j: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\o: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\g: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\l: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\n: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\w: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\z: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\F: HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened (read-only) \??\a: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\i: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe File opened (read-only) \??\k: HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3728-493-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe behavioral1/memory/3728-749-0x0000000000400000-0x00000000004C8000-memory.dmp autoit_exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Web\\Wallpaper\\Windows\\img0.jpg" HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe -
resource yara_rule behavioral1/files/0x0008000000023c10-487.dat upx behavioral1/memory/3728-493-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/files/0x0008000000023c11-633.dat upx behavioral1/memory/532-634-0x0000000000400000-0x000000000082C000-memory.dmp upx behavioral1/memory/3728-749-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/532-3765-0x0000000000400000-0x000000000082C000-memory.dmp upx behavioral1/memory/3824-4908-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1340-4948-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2476-4945-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/696-4968-0x00000000001B0000-0x00000000001D7000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremDemoR_BypassTrial365-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\officeinventoryagentlogon.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\sound.properties HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Subtle Solids.eftx HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_OEM_Perp-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe.config HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\en-us\msipc.dll.mui HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OMML2MML.XSL HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_Subscription-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MicrosoftDataStreamerforExcel.dll.manifest HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt.cuba HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File created C:\Program Files\Java\jre-1.8\lib\jfr\Restore-My-Files.txt HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0000-1000-0000000FF1CE.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Restore-My-Files.txt HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\BREEZE.WAV HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\openssl64.dlla.manifest HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Top Shadow.eftx HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-180.png HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\tr\Restore-My-Files.txt HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\zlib.md HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\[email protected] HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL065.XML HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL095.XML HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\Restore-My-Files.txt HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\dt.jar HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART8.BDR HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\en\LocalizedStrings.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\osfFPA\addins.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\Office.Runtime.js HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\cryptix.md.cuba HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\libxslt.md HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_Grace-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_MAK_AE-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\!!FAQ for Decryption!!.txt HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.osmuxmui.msi.16.en-us.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.powerpointmui.msi.16.en-us.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txt HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\CT_ROOTS.XML HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-140.png HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\dom.md HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_MAK-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunjce_provider.jar.cuba HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemui.msi.16.en-us.xml HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4540 3912 WerFault.exe 121 1424 4704 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-772bf3f4ef4a19ce3fb1bd2be9478cbb387176f396285e9dd2c100e7e2e01135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6f0a702fe075d823e866a3c261d056e3275b68bd630e0a59b4901695a81c469a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-f2eb0628c0974c82facf6ae281ef3a5d73e8b1808558e8a0c2b4dd3709593003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsMpEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.iso-aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cuba.gen-33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 6816 vssadmin.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1808 7zFM.exe 1040 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeRestorePrivilege 1808 7zFM.exe Token: 35 1808 7zFM.exe Token: SeSecurityPrivilege 1808 7zFM.exe Token: SeDebugPrivilege 2256 taskmgr.exe Token: SeSystemProfilePrivilege 2256 taskmgr.exe Token: SeCreateGlobalPrivilege 2256 taskmgr.exe Token: SeDebugPrivilege 1040 taskmgr.exe Token: SeSystemProfilePrivilege 1040 taskmgr.exe Token: SeCreateGlobalPrivilege 1040 taskmgr.exe Token: 33 2256 taskmgr.exe Token: SeIncBasePriorityPrivilege 2256 taskmgr.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 312 HEUR-Trojan-Ransom.Win32.Cuba.gen-33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e.exe Token: SeTakeOwnershipPrivilege 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe Token: SeDebugPrivilege 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe Token: SeBackupPrivilege 4616 vssvc.exe Token: SeRestorePrivilege 4616 vssvc.exe Token: SeAuditPrivilege 4616 vssvc.exe Token: SeDebugPrivilege 4704 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exe Token: SeShutdownPrivilege 7064 shutdown.exe Token: SeRemoteShutdownPrivilege 7064 shutdown.exe Token: SeShutdownPrivilege 7072 shutdown.exe Token: SeRemoteShutdownPrivilege 7072 shutdown.exe Token: SeShutdownPrivilege 6332 shutdown.exe Token: SeRemoteShutdownPrivilege 6332 shutdown.exe Token: SeShutdownPrivilege 7056 shutdown.exe Token: SeRemoteShutdownPrivilege 7056 shutdown.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1808 7zFM.exe 1808 7zFM.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 2256 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe 1040 taskmgr.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1040 2256 taskmgr.exe 102 PID 2256 wrote to memory of 1040 2256 taskmgr.exe 102 PID 4032 wrote to memory of 3692 4032 powershell.exe 116 PID 4032 wrote to memory of 3692 4032 powershell.exe 116 PID 3692 wrote to memory of 4412 3692 cmd.exe 117 PID 3692 wrote to memory of 4412 3692 cmd.exe 117 PID 3692 wrote to memory of 4412 3692 cmd.exe 117 PID 3692 wrote to memory of 4704 3692 cmd.exe 118 PID 3692 wrote to memory of 4704 3692 cmd.exe 118 PID 3692 wrote to memory of 4704 3692 cmd.exe 118 PID 3692 wrote to memory of 3548 3692 cmd.exe 119 PID 3692 wrote to memory of 3548 3692 cmd.exe 119 PID 3692 wrote to memory of 3548 3692 cmd.exe 119 PID 3692 wrote to memory of 312 3692 cmd.exe 120 PID 3692 wrote to memory of 312 3692 cmd.exe 120 PID 3692 wrote to memory of 312 3692 cmd.exe 120 PID 3692 wrote to memory of 3912 3692 cmd.exe 121 PID 3692 wrote to memory of 3912 3692 cmd.exe 121 PID 3692 wrote to memory of 3912 3692 cmd.exe 121 PID 3692 wrote to memory of 1516 3692 cmd.exe 123 PID 3692 wrote to memory of 1516 3692 cmd.exe 123 PID 3692 wrote to memory of 1516 3692 cmd.exe 123 PID 3692 wrote to memory of 3728 3692 cmd.exe 128 PID 3692 wrote to memory of 3728 3692 cmd.exe 128 PID 3692 wrote to memory of 3728 3692 cmd.exe 128 PID 3692 wrote to memory of 532 3692 cmd.exe 130 PID 3692 wrote to memory of 532 3692 cmd.exe 130 PID 3692 wrote to memory of 532 3692 cmd.exe 130 PID 3692 wrote to memory of 1496 3692 cmd.exe 133 PID 3692 wrote to memory of 1496 3692 cmd.exe 133 PID 3692 wrote to memory of 1496 3692 cmd.exe 133 PID 3692 wrote to memory of 4820 3692 cmd.exe 134 PID 3692 wrote to memory of 4820 3692 cmd.exe 134 PID 3692 wrote to memory of 4820 3692 cmd.exe 134 PID 1516 wrote to memory of 3588 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 135 PID 1516 wrote to memory of 3588 1516 HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe 135 PID 1496 wrote to memory of 824 1496 HEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exe 136 PID 1496 wrote to memory of 824 1496 HEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exe 136 PID 1496 wrote to memory of 824 1496 HEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exe 136 PID 824 wrote to memory of 2836 824 cmd.exe 138 PID 824 wrote to memory of 2836 824 cmd.exe 138 PID 824 wrote to memory of 2836 824 cmd.exe 138 PID 3548 wrote to memory of 1216 3548 HEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exe 140 PID 3548 wrote to memory of 1216 3548 HEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exe 140 PID 3692 wrote to memory of 1484 3692 cmd.exe 144 PID 3692 wrote to memory of 1484 3692 cmd.exe 144 PID 3692 wrote to memory of 1484 3692 cmd.exe 144 PID 532 wrote to memory of 2584 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 143 PID 532 wrote to memory of 2584 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 143 PID 532 wrote to memory of 6332 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 146 PID 532 wrote to memory of 6332 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 146 PID 532 wrote to memory of 6332 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 146 PID 532 wrote to memory of 7056 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 147 PID 532 wrote to memory of 7056 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 147 PID 532 wrote to memory of 7056 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 147 PID 532 wrote to memory of 7064 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 148 PID 532 wrote to memory of 7064 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 148 PID 532 wrote to memory of 7064 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 148 PID 532 wrote to memory of 7072 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 149 PID 532 wrote to memory of 7072 532 HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe 149 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00433.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1808
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.MSIL.Blocker.gen-772bf3f4ef4a19ce3fb1bd2be9478cbb387176f396285e9dd2c100e7e2e01135.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-772bf3f4ef4a19ce3fb1bd2be9478cbb387176f396285e9dd2c100e7e2e01135.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 18964⤵
- Program crash
PID:1424
-
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6CBC8F64-EC4A-4F4E-9582-FE10EAD0A5BE}'" delete4⤵PID:1216
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6CBC8F64-EC4A-4F4E-9582-FE10EAD0A5BE}'" delete5⤵PID:5984
-
-
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Cuba.gen-33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e.exeHEUR-Trojan-Ransom.Win32.Cuba.gen-33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6f0a702fe075d823e866a3c261d056e3275b68bd630e0a59b4901695a81c469a.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-6f0a702fe075d823e866a3c261d056e3275b68bd630e0a59b4901695a81c469a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 4804⤵
- Program crash
PID:4540
-
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exeHEUR-Trojan-Ransom.Win32.Lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:3588
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:6816
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:3716
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:5848
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:1224
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:4692
-
-
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exeHEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:3728
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exeHEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe3⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\windows\system32\bcdedit.exec:\windows\Sysnative\bcdedit.exe /set {current} safeboot minimal4⤵
- Modifies boot configuration data using bcdedit
PID:2584
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /f /t 004⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6332
-
-
\??\c:\windows\SysWOW64\shutdown.exec:\windows\SysWOW64\shutdown.exe /r /f /t 004⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7056
-
-
\??\c:\windows\SysWOW64\shutdown.exec:\windows\System32\shutdown.exe /r /f /t 004⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7064
-
-
\??\c:\windows\system32\shutdown.exec:\windows\Sysnative\shutdown.exe /r /f /t 004⤵
- Suspicious use of AdjustPrivilegeToken
PID:7072
-
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exeHEUR-Trojan-Ransom.Win32.Sodin.gen-1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\MsMpEng.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\MsMpEng.exeC:\Users\Admin\AppData\Local\Temp\MsMpEng.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Stop.gen-f2eb0628c0974c82facf6ae281ef3a5d73e8b1808558e8a0c2b4dd3709593003.exeHEUR-Trojan-Ransom.Win32.Stop.gen-f2eb0628c0974c82facf6ae281ef3a5d73e8b1808558e8a0c2b4dd3709593003.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Agent.iso-aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202.exeTrojan-Ransom.Win32.Agent.iso-aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo 2D4F861D8DCF8C8F4⤵PID:6404
-
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.AutoIt.zoh-7e9d389353d48d9df51e249ac61e06580f4bb7436f6ef220a4ff232a5ec13f8d.exeTrojan-Ransom.Win32.AutoIt.zoh-7e9d389353d48d9df51e249ac61e06580f4bb7436f6ef220a4ff232a5ec13f8d.exe3⤵PID:2024
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Blocker.kpuo-99d81d44bc47664fc48947f5b7617dd1457d523ae0d51e9e9bd8307d1a29776d.exeTrojan-Ransom.Win32.Blocker.kpuo-99d81d44bc47664fc48947f5b7617dd1457d523ae0d51e9e9bd8307d1a29776d.exe3⤵PID:3824
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Blocker.majh-e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee.exeTrojan-Ransom.Win32.Blocker.majh-e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee.exe3⤵PID:2628
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Crusis.to-324cb383fd7f47c079b162b725215bb4badfd4c0b2e41d330fa38344e59e77ce.exeTrojan-Ransom.Win32.Crusis.to-324cb383fd7f47c079b162b725215bb4badfd4c0b2e41d330fa38344e59e77ce.exe3⤵PID:4580
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Cryptor.eep-5688f2ea26edc7cc0ac41991b1f8de18b5c27dcb9b8f57c46574b7628086d010.exeTrojan-Ransom.Win32.Cryptor.eep-5688f2ea26edc7cc0ac41991b1f8de18b5c27dcb9b8f57c46574b7628086d010.exe3⤵PID:5728
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Encoder.kom-f4fc6d16cece4fa588803f99334af36dd33d3c0f2b1f204db53d49d876f459fe.exeTrojan-Ransom.Win32.Encoder.kom-f4fc6d16cece4fa588803f99334af36dd33d3c0f2b1f204db53d49d876f459fe.exe3⤵PID:5868
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Encoder.mgs-1059e8879dc495dd2239beba0b3533165ffebcab8dd5d194f32cbfa4c200752d.exeTrojan-Ransom.Win32.Encoder.mgs-1059e8879dc495dd2239beba0b3533165ffebcab8dd5d194f32cbfa4c200752d.exe3⤵PID:6248
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Gen.adag-508dd6f7ed6c143cf5e1ed6a4051dd8ee7b5bf4b7f55e0704d21ba785f2d5add.exeTrojan-Ransom.Win32.Gen.adag-508dd6f7ed6c143cf5e1ed6a4051dd8ee7b5bf4b7f55e0704d21ba785f2d5add.exe3⤵PID:1600
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.GenericCryptor.cys-7702971989d74ea700b3ac867a5a5ce488cacc657c6f373ef8b43be43e472d67.exeTrojan-Ransom.Win32.GenericCryptor.cys-7702971989d74ea700b3ac867a5a5ce488cacc657c6f373ef8b43be43e472d67.exe3⤵PID:2476
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.GenericCryptor.czo-3e3383f67ce3ca734e9515d77fc7ea120de11239498831d1fe2303c651debf4a.exeTrojan-Ransom.Win32.GenericCryptor.czo-3e3383f67ce3ca734e9515d77fc7ea120de11239498831d1fe2303c651debf4a.exe3⤵PID:2300
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.GenericCryptor.czx-6b9dbf223fca7dc3a4bee4657ae33e07c913043e2e71975ec319d26337d2a4b5.exeTrojan-Ransom.Win32.GenericCryptor.czx-6b9dbf223fca7dc3a4bee4657ae33e07c913043e2e71975ec319d26337d2a4b5.exe3⤵PID:1340
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Phpw.afn-61575d9d57533eca826ead2a88e4105d11125a30a0bce64489a4f5a0f05278b2.exeTrojan-Ransom.Win32.Phpw.afn-61575d9d57533eca826ead2a88e4105d11125a30a0bce64489a4f5a0f05278b2.exe3⤵PID:4956
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Purgen.apq-08b5e7c038cf4a31f6e14168497634c69e5903840bec9b42c15f006831b26499.exeTrojan-Ransom.Win32.Purgen.apq-08b5e7c038cf4a31f6e14168497634c69e5903840bec9b42c15f006831b26499.exe3⤵PID:5632
-
-
C:\Users\Admin\Desktop\00433\Trojan-Ransom.Win32.Sodin.agf-4f6ce92fccafa6d2454a12022e21fbd6adf1a6ec2d45c71de6f8729ec3ad195f.exeTrojan-Ransom.Win32.Sodin.agf-4f6ce92fccafa6d2454a12022e21fbd6adf1a6ec2d45c71de6f8729ec3ad195f.exe3⤵PID:696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3912 -ip 39121⤵PID:3352
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4704 -ip 47041⤵PID:5704
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3882055 /state1:0x41c64e6d1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Safe Mode Boot
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56aebef91c3cb27d23eced00745ebd284
SHA1143da1f9601c6f94cda42e660aa5bf24d05704ae
SHA256e60fd70c96a085d5e3e11756d62a2f0179c11b33269379ad69f017fe68a5d5a3
SHA512539ffdff4cbc3788a8b6a9c8f28229af39c37471db55a1c9b89fb75ad6c27140683a12f49c11d45cba88952fd804771deddd97dc63a60df4077fac906e70e02e
-
Filesize
115KB
MD5bd395cb5ab5c99b576743d931138bd9f
SHA1880a6f4344d795e232662b23a4bcd4dd5c5f20a2
SHA2566d1b5a2d43de5ead4c2cdbf8d8f8e1ff712631d720320850622d3a7f4d683515
SHA512b5622d817b11f862ce681278c760f28fe0ce233ba970c672d76c151cec7d759effc68510cd411bdbcfed4d48a95108350800a06f6c05e46ab01846050c997a6e
-
Filesize
212KB
MD52e7d91cfe66d52d1f8ea9a2f53275e78
SHA1ce8156582a6f59b54f72e3fc915f07e9187c9827
SHA2564886f26d4179db0739a010e530ae5a4a92d886f8a641f7966244bf930e315707
SHA5123a6dee9e923522a41d3cd181f3f35c7df2a4168888d8012425520d0f30c75daf267d4034af9f1d0087745072090de933044a75314ab91258488212577e5d821a
-
Filesize
191KB
MD54e0cea8f02d8f93112831295d6f41cb7
SHA15c31b2d356bdc01c0134af992d496ffffc2bc7be
SHA256bd6af58385419ef2eea6e4461f98653743d83748f1e27c1bffbb08b384d13cf9
SHA512a849b653ff93198ee1e76842633529fe50b5da6399518ced5c511db7fd0103820e7757676c6e00ed949be58c4d1c5fac6ba30cd64a06bad001712888c6877bc4
-
Filesize
59KB
MD56dc1afcec76e6a1c8e2900a3fe9203d2
SHA14dbfde3d3535075e1581bd52404578b5e485a4ce
SHA256c06ceebeddf681de8d8bd1cd30b1236ddebc1a1d7908506f3f0527f666d36e9b
SHA512d43ff03a5840957f626432ca01a90930e2721159985f7061ad7d636044b8120c262c3602e763148323c8e0898f46569857a46a2bc950029425de7b0dba21d48c
-
Filesize
1KB
MD52470a7db6ea4bd56fb6cb6cbf27f0c42
SHA1fbdf411cda3c7e0a8f4b6fc292594c087e030396
SHA256d2e6f68d4e67a60e0373ff5f77f7372a9abc2493a23abe76d2d9df2ac509d045
SHA512a865f14474da8283099cc56d02a6950f7969cb87d3ba9102b4c37fa1aead551fef8aff274832b8bb11e3a8ba32b4b0a50b28383c37546bf68cb07138ebf24d1e
-
Filesize
7KB
MD5a0d233c9e296495394d289eea5d76b41
SHA1693e7009436e4e4e02b6d46f8aec0063ca012907
SHA256a21cd8fe4cae37c512f471ef876b9723bd636ed6c6b1ee9d51061a54c09dee3b
SHA5127c0b68196462b321ab2f293791b17f5b8901f62c886945a7793c90c54e0205ee85e641e06a8442f429b28d787961e7a5af28b709d6ba1d9ccf6168641226d5c4
-
Filesize
10KB
MD5c6fefee01bbbfb1ebbe8f035ef1afad9
SHA1ad5c203eff6977f895314e723d95546955e79112
SHA256f9618720db66288a2a4ba45df885f413a85954073eba0b945a70366511abb03e
SHA512092589f55b51755963c2643764e33af242984c57bd9cde4c9f037ee063ca35ff0b64663f436e9efe82115284186929e5ef6cf42d5b2a562a910bfe3cb232ef06
-
Filesize
15KB
MD514a90d213405b6d7623f20283d59638b
SHA1eeb780c0661f41af0aee7b7bff9798887d51982c
SHA256bfc6673da3cd706bc50fb2efd7a018f26a4cf8be533f1e809709e66f5f05092b
SHA5124728390e635f8af8e35f162b12c65f2ce88604c8b7fa88a19839a2b3d8a603c6db256e39c194e247f32187ed5c9d21a0f85525d8e9440365132a9fe422709f96
-
Filesize
7KB
MD5673c3719b6a6395b01d5665acb02e758
SHA195d0865f3b950ae7aa67865d74ace1028655c2ad
SHA25608cf74118c0f1d9c1e83053d7893e670083c919b40f28854872befd4d97fb0f6
SHA512fa0c4da97e95e86e3420f4a2a7a2f9a685c99ac943e4f391b555a93d2efc4ca17191851dab91239522bd8437a08316b29fb53cb8504b66f2d40d5c96311f5f64
-
Filesize
11KB
MD5c07138eecd9ae26cdc2c99f9ba314042
SHA131e545b8ca25d40dbf30197b0569c0755acdcbb8
SHA25633f82d2a1acb305a4c6d24e7d24401b793be22ff7193fdd53126342d787dcc5f
SHA5126f05a27527f4f215688860d30b882096ff6d67f015b21e78c84517b1b8567fb3726a3669dcc17a8ecbb4a0ee59c0edd0c291a997fd0fd608e8a39634cbd31559
-
Filesize
13KB
MD550aa3e34c870da7391f97c55ddc94418
SHA19e9b15614ea5466e5f47557d49c189bc6d6cd262
SHA2566bf048e98c2c54323e87bf5f882237483d0916d833a3ee644658d0c3d27a157e
SHA5127a18457aa9ab3c6a21498e1c6562466c95bd62c0b03b5dfd497b3ea7e826164527acb39d1cb42c8228a0f8a593a340839d0ed53688f72941effc9cd23cf3b516
-
Filesize
14KB
MD586f109d4deb6e4aac37bf48725c47652
SHA11f75c62a40f681a3866bbe677e0fd4dbeb616a1d
SHA256defd84dfb18e8e6295ca23f009d17a24ea338eda9c6bdf32183d8a52b6b9eaf0
SHA512835a09d01cbb54f241f025b2493b91db10c100763c39ec78a54efda81f007d97d81de4e3bb655fc9df30faec18d5847945f971349709f7d0998fed00ace3ac20
-
Filesize
15KB
MD56c2476db5b6a1b81107dc5a839ac15df
SHA136c24d60e20e8455b4553b94a132419e51acf851
SHA256bc5270e680f7f5c84280ac32ad533fc94b8b2490af8a9082364cf0281461f764
SHA512d420b7707a66a8e3250cdfe920446682d4c7c379f2de79b9e7b016e4d4a8c7810b88c30f7e7cd7db17751fc6431c37b12c59170f17a23321989318841a5912b8
-
Filesize
17KB
MD56a4ff43a15271db28eed4f2c706cf7da
SHA1e7f6e521b8724a954557742b1813ca50dbe5e514
SHA25639477a672b66036dfa0eb3314c7362868c5064d97491e58eb2daba1ac7d27669
SHA512c325e1d17da855f43a7254fdc674ce83b72b0ccfb41494adc36ac94676e84aa6771ab308bab0a234f66d9213609584429fa6232eac0b582e2d109dadceafc0ec
-
Filesize
7KB
MD5402efb7c1f4ee8b6575627e24b255a10
SHA19b75fc3e58160dd7c9368810320b16ec3d251766
SHA256b48c8629e0c13bd83019af5afbf7d94f4d8b715779be7ab057167e6445160cde
SHA512d038c9b4768b25fe2f163a9b2c212d8bcbd7fb642675874e034acdcadf091e0589dbb910358e68c3b925fa141a32042e016b81601a5cb9ce78c99471135ae17f
-
Filesize
11KB
MD5cdefe26e20f8ec15435f910bfe90d416
SHA1d7b6163f69b2cdaafc4c9c07d9f2fa040919ccfd
SHA256bad4628b2f7092ff122559e0f000121c8b64f1a073ca68fa5521f15c3392d90e
SHA51258c687b99283e9dee6ff17c55723b34c91d4ffccfb8fe20b74dc9e0f9c572e27f748601e01229cbf8e5ff98cadca5e6f8fc45058a048cb3f9e87c4fd9b60b4a6
-
Filesize
13KB
MD595d6491694e9d8acb63a0620b708fed2
SHA1c20ebdac254a5190bf03f7d2ebf025d4a3e8483e
SHA256f6d432982ff6c00622a7133486de0343db7a517ca3ab256c0a1a95ecab3e763a
SHA512479a8e15580d57986a2cac3b12dad1f6a759d4324b777cccda929055be0bbcd69724ca79b685f07c73cf9fc2db018137cbc16e596e3e70448caf1e2013e495e9
-
Filesize
11KB
MD5312520cc5e765428abe9704095e16671
SHA14117ec7cabd31ef192c7a63c3b9b983c7ae6f3ac
SHA256c0d48d614b90fbbb568ddd42cd86c4d7c523d14362ec1541b89d3d135e782db0
SHA512717dfebb350a53ba1f1eaa63c277e1e1ea1cf86bf357d39b68fb4d6fae853ae55f060b430b4c08f128f3eda888e1d56a0f9e123d8f8e9244428cf4dcad484c06
-
Filesize
7KB
MD519405048a36365dcafee6d25caa40a03
SHA11f7bd9edda33d4e7861aa7936387a0e876d85bd2
SHA2560b2a497242e1852746a2564c0e2ee9b764536198552e5d5a96a22693b212d2ae
SHA5128694dde0d7517cc2ab7ffba7884be5dd83df46bdf362a71ce29909dc13dd25cf27ece4f0f1eb88785ab0ebb7c4facb5bd9433e69bf50130741777e483ddf47c7
-
Filesize
10KB
MD561a08b877e432d364200d762c2cc1dce
SHA18e11174dbf26f2570bd458147739ea125e5ae566
SHA2566d2a2d1c9b887eb62e8418970a994372826afb2729d9cb2ddfb974e5bbc8ecfe
SHA512f27223d732387cca8df661af9c411362996deefc553f991c48a4e8e4fa573e683dee48470da30aa1b466b07242252a34dd582aac5c2678fc30d8e3b11b6da077
-
Filesize
11KB
MD5c9cda3df6809265e8dd31f6f59314fc5
SHA113622f199b59f1af93c6403fb05abdce007ebc3c
SHA256065b854c940aa3530c2e0b39a7e828a243dc607c47464a4e64de33ca6a7a0b26
SHA512e4ce30a2564ca4378e744d89ec5478264b68799dd2dab97c7af0fd926c9ae9f75039d528f9a9eb26aeba08ea56eab3ed2d81a48cf689d65a59ecce2cf5614d32
-
Filesize
19KB
MD58968617d679abe84dfaca70776cd0791
SHA152d2bb8eb26508798dd8b9b6866e456fefa0b259
SHA256c566ff7ac5c6c8808af8f4791123e65518fca2fe8e6fb083951edd4fa35d483e
SHA51243303a42fc6b0afc9da21f0aa8dabf723a792072c2e12a8359a460f8791f73f4203725bdc27dcc814826947c9b8ebeb4f813a870d82e002e2894ed1b7de3f41a
-
Filesize
10KB
MD527c63684a127cc7f4fbb6e41b97ab0c8
SHA194db31795b35be81948e4197b127bdaac9fbed60
SHA256df590ddbc77592690fd04400948ab1b13ce38fc19f8a802c3b63306f7325f383
SHA5128bb2296d3e74a1ae79d8271a9609ff4312f78d6b55142fc4e94afc5d0ec7cb4b457178453a2a670a7db3232481e17908b503267629cdd7460b183b8f1717cf9a
-
Filesize
7KB
MD5cd2d01b9fdffeba1c31b5b3c038ac099
SHA130addb67cea47c4b6c73c613728f58934bad8ef5
SHA2561f9c10404122bec2ad455e114bdc20d93299d28e3efebe8b47f7526fa66eca8c
SHA512443243678ee25c2212d0dd828f07189096b33f5d26d690ae0ddcbf6d6c526e3cb4e3ede7127354c168e85067eac2a233c09edb43f5060672a378389c3f97bec5
-
Filesize
12KB
MD5b2b6ea71889b28a84c1201c3b746dc61
SHA1c5338399716336140b9529426ef42b0caee98ef3
SHA256b99ea6e43aff20d59e89f8e51cb1844b286688c2b799053253c1824ec3207374
SHA5125f303d4691abbd4b94f5b5bd51dbfb95cdf0a2227a293e53babd83af326c57a2b23d630d49fc1949ce6761bf55d9216359d3d328f6b15c0ac6ce640a9827c949
-
Filesize
9KB
MD5109575e7b5c2168f45091da3252a0024
SHA18e78427e20590001b74fcf34c19a229a32764737
SHA256ded3c63fc4c95947f4f4d7c4639389d5587d63abd88124653e4a5a24384f337d
SHA5123fe705e7c684d38ba5e76be4a56faa818d8653520fadbf2edc8a9dc1eea2350e24659b0184b638e25eb35234109be38cac1e7c646eb7defa85c9ac5a2a6fa845
-
Filesize
11KB
MD5322c7e662c8ac094bb5c1b20e3545201
SHA15c34d81c5428377a369d5e3ff170d7cc6a91b789
SHA25645aaaa63aa1fb1657ffa376a9774a0299185b97f82ab5485832cdba4862f8a0c
SHA512a46c435df3ce589a7ab359d1f98fd7a15496a56ee8c943dee088fa23047cefafff664b6ff6834325a33a0218c6d238e09425a2b931c96f6287a9c8239bf57b34
-
Filesize
10KB
MD5daedb04372930332056af27a84c14ed3
SHA1de90a15223775899df7b676e6dff989ba74329c2
SHA2562fd6349c887eee655ce158503d221960c128ab4e709e01f068a7a4b4456263c7
SHA512a4f87d0f076a85029c1d97bfeef61087e8f00ea98c72c5d1fbd6529094e280c13e2676f00faedb803ce80a6b17dc4c897730341dec0a7fd595e1eda01e73b46b
-
Filesize
16KB
MD5223bbefaf48c1ecbf2ffb712b16c7ef4
SHA1cc5672b63b0468a7c80ae13053d692edc0954cc9
SHA2568e87b56cce2684b5fd5b3de3e61aee0dd1f95d284d92b6d06f8dbacfe8201e83
SHA512bc978ae9eb2073e04ea6278f5495c19108dd4059b17731e09ac6fba7a3e00098d42ccdab0889ca1231ca3b94d55e39627ab9ee4536703bfa89beb6ef4e824f93
-
Filesize
11KB
MD55ad589a603745d0cd68c7413096b8289
SHA1e1cc735af33a468a3c9b2169203dc43e817acbd1
SHA256de7c46f2b174ca42912a55563da82f5d640a413dcb86c517f4aad67a6298866a
SHA5123b4984007ca4ee799e89b52cac398ffc6014683351b9adbe17c10cfae6064fe14b97419f15febc20ecebfe1004be51464345a3d38b0f6603c20f4944d1cc10ee
-
Filesize
12KB
MD5f7848dbfa2bc7b2660b8c43d062661a7
SHA10b849cde4080df8237cdf75f5cb61f79d5285505
SHA256d28dab0b03ff1cfd3f75ef68a49616ce6f0aea86c6b388b32edb238d5b88d5e5
SHA51218b582d6ba28fe978b7f057449b393e454259646647e4c8da502d53a08b35128465fa2b6310576a1a34ccde698b7f662e7822d08b92e881d897eaf523d47dd6a
-
Filesize
9KB
MD555353cf40cbd7768629b23c97785c3b8
SHA1f1f277744922731c8bf0aff89d4222193c0af949
SHA25637c85dfce9261e5c2cbc4dcca2020f5ae3ee510df14e8530a7159d30c03b2748
SHA5128a03dd3b2f6a2a3ccff467e413b309922f254dd60505c30c071317c35c283c5135f945190f7ac4d60139642b03e9395a3770ac2b08ea6c84df77c53c34d01740
-
Filesize
8KB
MD54fd0716b9c38e45f66ce49119390ab45
SHA1ed3dbaa0b2f2c857cdeffcfa1bcd499727668326
SHA256ce7be5ca9a1deb5292088b2f899114a3a6f441daeabbd2053936f1fe6f56e552
SHA512a1d9c7f7c3b45c9c6feb10fea071a9da33f02d1e436be32804bde4442a98ef392108f5821c41027098b611ff4801f7a141361414b065e07facdd6c102125383a
-
Filesize
10KB
MD53acc0b9a13089b13f2c17cab5715601a
SHA17de5f7fc392f514fc45f5317616b2ab0cea07428
SHA256a83d244c83c36eea0b6810bb786bacfda3e45fe670ffcfb553d9c2c6a9ee8536
SHA51251562a07c1d1a18c89a43af2b93d4b80152fe2e01b59954488a37de49e664c42bd0f1d1d54c74c44b16a15d93dd409638cafe30f9331ec8dfca7234be0664cba
-
Filesize
11KB
MD5c71eeeab302d0d2f424195ae01d8288e
SHA14c334fb8e6b5d2e8c9e8c950363bcb1539ba36b2
SHA2568f713354292bb8e9822a3e99f5fd291854bcd185e3b9adfec6747c49a69e9c55
SHA51209c021a4e5af929e33fc512581498fd2a9d6964561024f50358ce08194463cb90bcd1d7e3ea19b47fa2d76b4d52d7ce333849c9455776f5ae13a045687fd9fc4
-
Filesize
19KB
MD5196e73e2c40db562787a078d71d73654
SHA1157157a2cf472ae2cbcb23ed291370b2c23a1e1a
SHA25631dfde8ea94c046b4b7a7224c12d25639f4882583cd8a67f156dd27b2640ec08
SHA512649b7189e682d3cd9190940331b8f34e7bb04425b602c57e85de3e7381620764ce8a744597d369d108ef99888ce601efbb5e84c616577fd13130ba4458a44f27
-
Filesize
13KB
MD5f04f6dd1bbed9611317f906274c0bb65
SHA1eeba6fb7d9846a60bea02f671a6f773518db933d
SHA25626660a233964d1678126d789ee3640a0dd7f21e9c7d9423b51b36d2f6d4e1265
SHA512636cacd649a7be91ecc3c5085039dc5d8961c8d7c3a19fd5f53e253b96d6fe57ad0a602d40265bd87557ab9bc2ea4b26043faec687a036d23b1e0ef56aa0f33e
-
Filesize
19KB
MD5a55af22a67db1e587d337eb74b21a81d
SHA1b1c8eda9c0008a73b9f73d1a6b3f8c4347d376ff
SHA25695e90776df6ecbec34aef5e23f2b5e04eb8bcddc6c759fc42ce4a8e1276dc024
SHA512501586618c1ce11c7f6448273031a65df9dcd1acde98a05a9b1c757f5fe967c16f11fb28e9d5f1310518610617747df7c2d3a7dafb11738a732efcc55eeeb0e2
-
Filesize
10KB
MD5c3f3643bb6318832c4e1a100f96fa1a7
SHA1c76cfb031faad86e34008d1d8c3f980fb9f9b17a
SHA256ae658dcbf3569cd4006b43e54b384dfa33f7c344ef862b4d732535f51d076517
SHA5129741f691af2c6c0e4ced3b695e206152f28fd495e3a27ac79d66378081c88be1bf4e60162928fd620397b3ae5b78d815bf136f0c65963aaae2fd313ea86fa3e1
-
Filesize
12KB
MD5b7f7ade6d842cd1316c59599957c27ef
SHA1e3963f99cd5905dbc447baf6b1d879fa1965cca6
SHA2563a6f516147c48a622401f08e8ed7ab82c78dfc740ee148fd5eb6b858eb0c3b01
SHA5127d36b39515008614b83a03de928468386228ab4181d5857202040d9e21dd66b3ebd715fec70d0980c7bed5977ce0cd6da47ee5afaf271b94327ab6d320733821
-
Filesize
16KB
MD5f302c15a6e0be34d3175ec43961f656e
SHA19ee5ebc7603455365b7f71ae6018ecda60b10067
SHA256e7d0b0ba489a73f6e969f37d7e70d9274a33ec82c04c740703cfe107f5630151
SHA512668b23c4c89fb14b98152c70309f455043f330356e877fba4a2a711b9a345205b23106dd99a79de21cf4007847651bbdbc3691af1c5f2de750d11732c1c32d44
-
Filesize
2KB
MD5f47a1b518f2643c76f6c1882a68f5b15
SHA1a21140c02593aaea27d50c64e23d3eef19f4757f
SHA256e2af3e438bdedbe3b310bd07eaf433ee6523f3822625a0abe8ba919d36234cd0
SHA51278b5695ad531f636726f20fe9da2a9247b58bb7f46bbbd5a7d2271cef9cfc8b184906b6cfc773852e318dea3d84cc26420b7e947aea94254af596f647f877fd2
-
Filesize
462B
MD52d98abedc07579cb01fecd5f4b46a099
SHA1b253443b779329404ba1168eadba0888e5893794
SHA256feebfb5ad1b2a7c6c7f80d0a41313eb788b9d6087afcd2abc19fe947147c6afc
SHA5121d8480d8ba4667990477dc08cfa083420a87f02524ae696a5881f18248f6291229ffced8bd4e81b4c3a96189580a4945819754763232549479d4fb72825b1512
-
Filesize
1KB
MD513db383778fc48bce45e9e798abfe5cf
SHA128937dc3bfe182e68e5ba50acb77667ac661843d
SHA25645fe78f40b08e4efefb6e047e4fc1a3ee3fee074a598ae78720fc893ba20839e
SHA5123217aa906fdd211c7b0c83f15564de2dca36eda15bb048c5ee36f3f3d863db733fc83c92f80769faa2281aa1481512b7e9d34748b96f13a9a3261da945f4f467
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.MSIL.Blocker.gen-772bf3f4ef4a19ce3fb1bd2be9478cbb387176f396285e9dd2c100e7e2e01135.exe
Filesize114KB
MD513ac708881a28cef66a4425c456891a3
SHA1b58fd6e2562c8d2668a9bd95022a0945ac3e2700
SHA256772bf3f4ef4a19ce3fb1bd2be9478cbb387176f396285e9dd2c100e7e2e01135
SHA512a945e76df536bd7621e72523aac40b243ec9933d48dc2b50aa8d4a1bde24068e71cec30a649aca447cdf7185e9ab741927685f859e3c9f85871db2f7f73c6a91
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8.exe
Filesize1.3MB
MD5d487b46269cd624447f2f97466a16f6c
SHA1ad864c882e0f1f3b02c198fbe4e37719f30d9e94
SHA256a225cd8b8b809388e14eecd40c6bf48a1d0b154ec69cdd864ee610fe7112c9c8
SHA512565a7eaace87c3aa3b97d80f1775ad98eea1a268fd2e2738633ec9be14eaa3b384f741bd211697241767f87814638ebabfc93cb60e06673138416b6c05cd68f2
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Cryptor.gen-98bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b.exe
Filesize190KB
MD5cc761ff32d8365d76e5a0ae25fdbed9e
SHA1954d00cc3ad3c2c2495efe94474e66b9107b307f
SHA25698bfbdfb6a850a2f3f1e968a1e23c790fee1d8a80dc61f9cdd88394d50091c1b
SHA512d25e9bd1a14ead9ce51ece70c7366dc862614fdd73bf9c290cdf690d939cdce46d66694faa1f449260a41d10776802637f10c8a621d5d32a1c9409ffdd17e47f
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Cuba.gen-33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e.exe
Filesize160KB
MD5d8fd19fef4605b4217cb2546c470a918
SHA179786955d426945054e6d02050b8f9ada01e39ef
SHA25633352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e
SHA512903a230ca10b445e77057affec44d40160b6606e28ab5d734a8a6434948bf6a51b264a4505451412c0dee63b56cf44d50096e71db3c8d579eb63f9b6bd4465f4
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6f0a702fe075d823e866a3c261d056e3275b68bd630e0a59b4901695a81c469a.exe
Filesize328KB
MD58409411ea7576b916b5a17449fb1f38a
SHA19634e7737450343629b3e552dcd0a6029286a28e
SHA2566f0a702fe075d823e866a3c261d056e3275b68bd630e0a59b4901695a81c469a
SHA51235aa9d2b47c2d7784f20c4bbdfa8fb6861c960814dadd33405113a9c48bc44471227209bf2906b814ba8f6f5ba9ce3abc699c2f2bbff32d6c72b4a17a9aee1ef
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Mircop.gen-d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60.exe
Filesize314KB
MD53469ddc8a9b9f4b595e8afffc246810c
SHA178d4b781c73a95dc5e87fae05c6b830f880ecf62
SHA256d2cefef5ad5f20acab4bcfb4544f918b888c8bdae2be54b59889cf3cb6c97d60
SHA512cecda855fc3ed684aff61595f9d05bea628ef5fced77048e0b58258af8cdd47a5f366a29d479013c1e42f56a62f060e6c6e36289c536f3ddbd21b426e22cb5a4
-
C:\Users\Admin\Desktop\00433\HEUR-Trojan-Ransom.Win32.Snatch.vho-36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.exe
Filesize4.2MB
MD532de66a467db22cf0f5b65d1a9f4e19c
SHA1cdb5c200cba7da3f6e80e868ef7df380ac1259c2
SHA25636a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4
SHA512af200cc334c05e5fe0df1d4c76b5ce469d034c0d62288d207b6bb6562579e07dc4510e4bfc4b726cf1a9f82ae8cb69c4630e981f23d05fb85e3be842a34244f1
-
\??\c:\users\admin\desktop\00433\heur-trojan-ransom.win32.lockbit.vho-d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874.exe
Filesize146KB
MD5b3175331ae74ee277e94d3e0bc982bf4
SHA1db0731d693a1ac46706825dcb91193ae4efec482
SHA256d5ea463e0719ee2d1705ff305cdd8529bd2ff23dde79c502c4f478937a91f874
SHA51238318d3e6461b72c6111e96c4d5aab830e5824b8ef762360d894ea67d9e16b12d54087f7f0fcc8c579824753df039b137294ba6abab0171e294f2c538cc6fa8a