Analysis
-
max time kernel
470s -
max time network
472s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00409.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00409.7z
-
Size
21.9MB
-
MD5
2b3532d723da17993253cf1177d60353
-
SHA1
c3ba17fa6e7cba1d56b249d0172939a88479970f
-
SHA256
e9dcab6c8daf2d1e5e3bfb114abb6a712e3d88434f61e9e8a2e1fda67b12e0e6
-
SHA512
38b4d7ab086eba672aa5b562d669c345f20b5977c04440b306e34d6faac634409015ead030e74cc72fff612edb10bbba9b1b5d48cdd5b089a63a0d3242e65512
-
SSDEEP
393216:wtn7WUHzs1g6LuXtFVRCPbMzyBSUPNUz5udv8nH9jjiieVPSR7UMdka2G18hyHA9:qfkKnmPlXw5av8nH9q4YSka2XhyH8
Malware Config
Extracted
darkcomet
Guest16
fantomazzz.ddns.net:1604
DC_MUTEX-WB00FV3
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
058yy4Fpjp6w
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
C:\ProgramData\Microsoft\AppV\Setup\YOUR_FILES_ARE_ENCRYPTED.HTML
Extracted
growtopia
https://discord.com/api/webhooks/780416990140694560/Rv9Dt6aXO_jwSBUytdlrYD0xRmVZ-TRjS-VN_rVJyUGInUZG9tQ74zrBQkWp8ra_rO6t
https://discord.com/api/webhooks/780417200812064838/AxlXPJdiiiyzr1AD-VwaKwgmi1d_r6kSqhEOkzYbJoTaBN4Mi8BeaLGVanbylFg2lyte
-
payload_url
https://cdn.discordapp.com/attachments/652852711808565258/780420698606272512/d.png
https://cdn.discordapp.com/attachments/652852711808565258/780420220920791060/AOh14GjonoJ9cL49y6uZta-q3iCNSa-rfYbkn6UPvgs68-c-k-c0x00ffffff-no-rj-mo.png
Extracted
bitrat
1.32
192.236.195.143:44220
-
communication_password
4d528518d1e67adc6d7688e281f1028d
-
install_dir
windows
-
install_file
tst.exe
-
tor_process
tor
Signatures
-
Bitrat family
-
Darkcomet family
-
Detected SunCrypt ransomware 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023cae-156.dat family_suncrypt -
GandCrab payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4708-105-0x0000000000400000-0x000000000045F000-memory.dmp family_gandcrab behavioral1/memory/4708-104-0x0000000000710000-0x0000000000727000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Growtopia family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
Processes:
crypted.exeFile1.execrypted.execrypted.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\crypted.exe" crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" File1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\crypted.exe" crypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\crypted.exe" crypted.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
msdcsc.exemsdcsc.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exemsdcsc.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
SunCrypt Ransomware
Family which threatens to leak data alongside encrypting files. Has claimed to be collaborating with the Maze ransomware group.
-
Suncrypt family
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
taskmgr.exedescription pid Process procid_target PID 2836 created 1944 2836 taskmgr.exe 124 PID 2836 created 1944 2836 taskmgr.exe 124 PID 2836 created 5708 2836 taskmgr.exe 137 PID 2836 created 5708 2836 taskmgr.exe 137 -
Processes:
msdcsc.exemsdcsc.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeTrojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 9 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid Process 5932 attrib.exe 6076 attrib.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeTrojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exeKartinka.execmd.exetor-browser-windows-x86_64-portable-14.0.exefirefox.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exeTrojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exefirefox.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exeCDS.exeKartinka.sfx.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exeFile1.exeWScript.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Kartinka.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation tor-browser-windows-x86_64-portable-14.0.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation firefox.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation firefox.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CDS.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Kartinka.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation File1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
Processes:
Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\YOUR_FILES_ARE_ENCRYPTED.HTML Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe -
Executes dropped EXE 46 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeHEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exeTrojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeTrojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exeTrojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exeTrojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exeTrojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exeUDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exeCDS.exeKartinka.sfx.execrypted.exeKartinka.exeJava Updater.exejusched.exeFile1.exemsdcsc.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exemsdcsc.execrypted.execrypted.exetor-browser-windows-x86_64-portable-14.0.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exetor.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exelyrebird.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exepid Process 5116 HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exe 4908 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe 1776 HEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exe 1304 HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe 3724 HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe 4708 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exe 4604 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 3816 HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe 4644 Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe 2076 Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe 1944 Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe 2852 Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe 3884 Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe 1436 UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe 1896 CDS.exe 5488 Kartinka.sfx.exe 5708 crypted.exe 5728 Kartinka.exe 5832 Java Updater.exe 6036 jusched.exe 6104 File1.exe 4600 msdcsc.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 4572 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe 3696 msdcsc.exe 1812 crypted.exe 5916 crypted.exe 4252 tor-browser-windows-x86_64-portable-14.0.exe 5792 firefox.exe 3604 firefox.exe 1328 firefox.exe 5392 firefox.exe 1032 firefox.exe 3656 tor.exe 5912 firefox.exe 1636 firefox.exe 5820 firefox.exe 3880 firefox.exe 6100 firefox.exe 1016 firefox.exe 4952 lyrebird.exe 1604 firefox.exe 3352 firefox.exe 960 firefox.exe 6340 firefox.exe 7068 firefox.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeTrojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe -
Loads dropped DLL 64 IoCs
Processes:
CDS.exetor-browser-windows-x86_64-portable-14.0.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exepid Process 1896 CDS.exe 4252 tor-browser-windows-x86_64-portable-14.0.exe 4252 tor-browser-windows-x86_64-portable-14.0.exe 4252 tor-browser-windows-x86_64-portable-14.0.exe 5792 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 1328 firefox.exe 1328 firefox.exe 1328 firefox.exe 1328 firefox.exe 1328 firefox.exe 5392 firefox.exe 5392 firefox.exe 5392 firefox.exe 5392 firefox.exe 5392 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 5912 firefox.exe 5912 firefox.exe 5912 firefox.exe 5912 firefox.exe 5912 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1032 firefox.exe 1032 firefox.exe 1636 firefox.exe 1636 firefox.exe 5912 firefox.exe 5912 firefox.exe 5820 firefox.exe 5820 firefox.exe 5820 firefox.exe 5820 firefox.exe 5820 firefox.exe 5820 firefox.exe 5820 firefox.exe 3880 firefox.exe 3880 firefox.exe 3880 firefox.exe 3880 firefox.exe 3880 firefox.exe 6100 firefox.exe 1016 firefox.exe 6100 firefox.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
msdcsc.exemsdcsc.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
File1.exemsdcsc.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.execrypted.execrypted.exeUDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.execrypted.exemsdcsc.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" File1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tst = "C:\\Users\\Admin\\AppData\\Local\\windows\\tst.exe먀" HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\userini = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\crypted.exe" crypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tst = "C:\\Users\\Admin\\AppData\\Local\\windows\\tst.exe" HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\userini = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\crypted.exe" crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Java Updater.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\userini = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\crypted.exe" crypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Processes:
firefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA firefox.exe -
Drops desktop.ini file(s) 33 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exeexplorer.exeTrojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exedescription ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Links\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification \??\M:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini explorer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Searches\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini explorer.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened for modification C:\Users\Public\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\Libraries\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Music\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\Music\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Admin\Documents\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe File opened for modification C:\Users\Public\Documents\desktop.ini HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe -
Enumerates connected drives 3 TTPs 49 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exeexplorer.exeexplorer.exetaskmgr.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process File opened (read-only) \??\V: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: taskmgr.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\M: taskmgr.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\F: taskmgr.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exepid Process 4644 Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exedescription pid Process procid_target PID 4604 set thread context of 5636 4604 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 159 PID 4908 set thread context of 4572 4908 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe 160 -
Processes:
resource yara_rule behavioral1/memory/5636-7120-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7122-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7123-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7121-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7133-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7128-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7136-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7137-0x0000000000400000-0x00000000007B1000-memory.dmp upx behavioral1/memory/5636-7139-0x0000000000400000-0x00000000007B1000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
Processes:
Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exedescription ioc Process File created C:\Program Files (x86)\411a82d8\jusched.exe Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe File created C:\Program Files (x86)\411a82d8\411a82d8 Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe -
Drops file in Windows directory 2 IoCs
Processes:
Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exedescription ioc Process File created C:\Windows\Tasks\Update23.job Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3012 4708 WerFault.exe 109 4424 1776 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exeTrojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exeCDS.exenotepad.exeattrib.exeKartinka.exeIEXPLORE.EXEcmd.execrypted.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeTrojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.execrypted.execmd.execrypted.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exeTrojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeTrojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exenotepad.execmd.exeFile1.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exeUDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exemsdcsc.exemsdcsc.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.execmd.exejusched.exeattrib.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exeTrojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exeKartinka.sfx.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CDS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kartinka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kartinka.sfx.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid Process 5464 timeout.exe 5660 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3426200673" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3413075610" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000028e76085f1f7640a0643881d549bbfc00000000020000000000106600000001000020000000483bb609c5550827f68ad887ad5f190fa078b1366159e8d767b147ac1dc2c3ac000000000e800000000200002000000017e65d053c047c9b24f837985048e386460eb458d63dd401d738dec58f42394520000000d46042788dfdb037a5a03d62cb0119836d9cdb751d576a50a3d027e897f31262400000001f0aeebc98b381608c84a3436ac1d671139d758abcc9a532e0fa5ce33c92f0d18b631f5f44e12b948e31791fc5b7b2f77da4d043bf9d57f623ce25f7e21bf769 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06072cd7129db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31140209" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31140209" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31140209" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F6DBC2D7-9564-11EF-A4B7-7E3D785E6C2E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3413075610" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000028e76085f1f7640a0643881d549bbfc00000000020000000000106600000001000020000000667c9f202c8c960e7d43b5579cb6735e3eee70ff1f5124b7c265c3fbc6e23896000000000e8000000002000020000000631ac4657c6f6fd452266216fd689bcc5230401077d18c35c5c0aa117859c06d200000003771d6bb1292d9a17fedc62a78da4c7f9d4e36633499115f914c09861381d83b400000008ab12f8628eeee351cbe2aff11aba9f3037325ff7afcd84adf699c7a31ad087459cfd2d48d50b2bd3b1de67225b396560070d4b6544efba2dcfa7be613143fa3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906579cd7129db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436909610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE -
Modifies registry class 64 IoCs
Processes:
SearchApp.exeSearchApp.exeexplorer.exeexplorer.exetaskmgr.exeexplorer.exeSearchApp.exeexplorer.exeSearchApp.exeexplorer.exeStartMenuExperienceHost.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "11.0.2016.0129" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "MS-3082-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "spell=NativeSupported; cardinal=GlobalSupported; ordinal=NativeSupported; date=GlobalSupported; time=GlobalSupported; telephone=NativeSupported; address=NativeSupported; message=NativeSupported; url=NativeSupported; currency=NativeSupported; alphanumeric=NativeSupported" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Ichiro" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 5a003100000000005c595d9d100053797374656d33320000420009000400efbe874f77485c595d9d2e000000b90c000000000100000000000000000000000000000067670d01530079007300740065006d0033003200000018000000 taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "804" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{37A9D401-0BF5-4366-9530-C75C6DC23EC9}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "SR de-DE Lookup Lexicon" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{2984A9DB-5689-43AD-877D-14999A15DD46}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\de-DE-N\\c1031.fe" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = 49553b76dbc112bcd96e2ce32f82aa3750d88abb05779f5fac65e84c5363077e SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{90F5FAC7-71AC-4ECE-86AC-496ECB50C1C3} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "1" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "409;9" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 56003100000000004759064c100057696e646f777300400009000400efbe874f77485c59639d2e00000000060000000001000000000000000000000000000000b8560300570069006e0064006f0077007300000016000000 taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{81218F10-A8AA-44C4-9436-33A42C3852E9}" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "40C" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "L1033" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Pablo" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "SR es-ES Lts Lexicon" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\es-ES\\VoiceActivation_es-ES.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\ja-JP-N\\lsr1041.lxa" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\fr-FR-N\\lsr1036.lxa" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{06405088-BC01-4E08-B392-5303E75090C8}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Anywhere;Trailing" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\TTS\\es-ES\\MSTTSLocesES.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "SpeechUXPlugin" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "SR en-US Lookup Lexicon" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\ja-JP-N\\c1041.fe" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "L1031" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{31350404-77AC-4471-B33A-9020A2EDA1D1}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\TTS\\ja-JP\\M1041Ichiro" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{9B06AA67-56EA-4A40-B87B-F089C13DE447} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" taskmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "- 0001 ! 0002 & 0003 , 0004 . 0005 ? 0006 _ 0007 1 0008 ~ 0009 aa 000a a 000b oh 000c ax 000d b 000e d 000f eh 0010 ey 0011 f 0012 g 0013 hy 0014 uy 0015 iy 0016 k 0017 l 0018 m 0019 n 001a ng 001b nj 001c oe 001d eu 001e ow 001f p 0020 r 0021 s 0022 sh 0023 t 0024 uw 0025 v 0026 w 0027 y 0028 z 0029 zh 002a" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "SR fr-FR Lookup Lexicon" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" taskmgr.exe -
Processes:
lyrebird.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 lyrebird.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 lyrebird.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 lyrebird.exe -
NTFS ADS 3 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exemsedge.exedescription ioc Process File created C:\Users\Admin\AppData\Local:28-10-2024 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe File opened for modification C:\Users\Admin\AppData\Local:28-10-2024 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 135054.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exetaskmgr.exepowershell.exepid Process 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 964 powershell.exe 964 powershell.exe 964 powershell.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
7zFM.exetaskmgr.exemsdcsc.exeexplorer.exetor-browser-windows-x86_64-portable-14.0.exepid Process 2476 7zFM.exe 2836 taskmgr.exe 3696 msdcsc.exe 2056 explorer.exe 4252 tor-browser-windows-x86_64-portable-14.0.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
Processes:
msedge.exepid Process 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exepid Process 3884 Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepowershell.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exevssvc.exeAUDIODG.EXEFile1.exeJava Updater.exemsdcsc.exedescription pid Process Token: SeRestorePrivilege 2476 7zFM.exe Token: 35 2476 7zFM.exe Token: SeSecurityPrivilege 2476 7zFM.exe Token: SeDebugPrivilege 1160 taskmgr.exe Token: SeSystemProfilePrivilege 1160 taskmgr.exe Token: SeCreateGlobalPrivilege 1160 taskmgr.exe Token: SeDebugPrivilege 2836 taskmgr.exe Token: SeSystemProfilePrivilege 2836 taskmgr.exe Token: SeCreateGlobalPrivilege 2836 taskmgr.exe Token: 33 1160 taskmgr.exe Token: SeIncBasePriorityPrivilege 1160 taskmgr.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 5116 HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exe Token: SeBackupPrivilege 364 vssvc.exe Token: SeRestorePrivilege 364 vssvc.exe Token: SeAuditPrivilege 364 vssvc.exe Token: 33 1696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1696 AUDIODG.EXE Token: SeIncreaseQuotaPrivilege 6104 File1.exe Token: SeSecurityPrivilege 6104 File1.exe Token: SeTakeOwnershipPrivilege 6104 File1.exe Token: SeLoadDriverPrivilege 6104 File1.exe Token: SeSystemProfilePrivilege 6104 File1.exe Token: SeSystemtimePrivilege 6104 File1.exe Token: SeProfSingleProcessPrivilege 6104 File1.exe Token: SeIncBasePriorityPrivilege 6104 File1.exe Token: SeCreatePagefilePrivilege 6104 File1.exe Token: SeBackupPrivilege 6104 File1.exe Token: SeRestorePrivilege 6104 File1.exe Token: SeShutdownPrivilege 6104 File1.exe Token: SeDebugPrivilege 6104 File1.exe Token: SeSystemEnvironmentPrivilege 6104 File1.exe Token: SeChangeNotifyPrivilege 6104 File1.exe Token: SeRemoteShutdownPrivilege 6104 File1.exe Token: SeUndockPrivilege 6104 File1.exe Token: SeManageVolumePrivilege 6104 File1.exe Token: SeImpersonatePrivilege 6104 File1.exe Token: SeCreateGlobalPrivilege 6104 File1.exe Token: 33 6104 File1.exe Token: 34 6104 File1.exe Token: 35 6104 File1.exe Token: 36 6104 File1.exe Token: SeDebugPrivilege 5832 Java Updater.exe Token: SeIncreaseQuotaPrivilege 4600 msdcsc.exe Token: SeSecurityPrivilege 4600 msdcsc.exe Token: SeTakeOwnershipPrivilege 4600 msdcsc.exe Token: SeLoadDriverPrivilege 4600 msdcsc.exe Token: SeSystemProfilePrivilege 4600 msdcsc.exe Token: SeSystemtimePrivilege 4600 msdcsc.exe Token: SeProfSingleProcessPrivilege 4600 msdcsc.exe Token: SeIncBasePriorityPrivilege 4600 msdcsc.exe Token: SeCreatePagefilePrivilege 4600 msdcsc.exe Token: SeBackupPrivilege 4600 msdcsc.exe Token: SeRestorePrivilege 4600 msdcsc.exe Token: SeShutdownPrivilege 4600 msdcsc.exe Token: SeDebugPrivilege 4600 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4600 msdcsc.exe Token: SeChangeNotifyPrivilege 4600 msdcsc.exe Token: SeRemoteShutdownPrivilege 4600 msdcsc.exe Token: SeUndockPrivilege 4600 msdcsc.exe Token: SeManageVolumePrivilege 4600 msdcsc.exe Token: SeImpersonatePrivilege 4600 msdcsc.exe Token: SeCreateGlobalPrivilege 4600 msdcsc.exe Token: 33 4600 msdcsc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid Process 2476 7zFM.exe 2476 7zFM.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid Process 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 1160 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
Processes:
CDS.exeiexplore.exeIEXPLORE.EXEmsdcsc.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exemsdcsc.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exetaskmgr.exefirefox.exepid Process 1896 CDS.exe 1896 CDS.exe 5948 iexplore.exe 5948 iexplore.exe 288 IEXPLORE.EXE 288 IEXPLORE.EXE 4600 msdcsc.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 5636 HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe 3696 msdcsc.exe 4572 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe 5700 StartMenuExperienceHost.exe 5964 StartMenuExperienceHost.exe 4636 StartMenuExperienceHost.exe 4204 SearchApp.exe 3332 StartMenuExperienceHost.exe 700 StartMenuExperienceHost.exe 60 SearchApp.exe 5464 StartMenuExperienceHost.exe 920 SearchApp.exe 2016 StartMenuExperienceHost.exe 3312 StartMenuExperienceHost.exe 5096 SearchApp.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 2836 taskmgr.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskmgr.exepowershell.execmd.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exeTrojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exeUDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.execmd.execmd.exeCDS.exeKartinka.sfx.exedescription pid Process procid_target PID 1160 wrote to memory of 2836 1160 taskmgr.exe 97 PID 1160 wrote to memory of 2836 1160 taskmgr.exe 97 PID 964 wrote to memory of 4716 964 powershell.exe 103 PID 964 wrote to memory of 4716 964 powershell.exe 103 PID 4716 wrote to memory of 5116 4716 cmd.exe 104 PID 4716 wrote to memory of 5116 4716 cmd.exe 104 PID 4716 wrote to memory of 4908 4716 cmd.exe 105 PID 4716 wrote to memory of 4908 4716 cmd.exe 105 PID 4716 wrote to memory of 4908 4716 cmd.exe 105 PID 4716 wrote to memory of 1776 4716 cmd.exe 106 PID 4716 wrote to memory of 1776 4716 cmd.exe 106 PID 4716 wrote to memory of 1776 4716 cmd.exe 106 PID 4716 wrote to memory of 1304 4716 cmd.exe 107 PID 4716 wrote to memory of 1304 4716 cmd.exe 107 PID 4716 wrote to memory of 1304 4716 cmd.exe 107 PID 4716 wrote to memory of 3724 4716 cmd.exe 108 PID 4716 wrote to memory of 3724 4716 cmd.exe 108 PID 4716 wrote to memory of 3724 4716 cmd.exe 108 PID 4716 wrote to memory of 4708 4716 cmd.exe 109 PID 4716 wrote to memory of 4708 4716 cmd.exe 109 PID 4716 wrote to memory of 4708 4716 cmd.exe 109 PID 3724 wrote to memory of 4284 3724 HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe 111 PID 3724 wrote to memory of 4284 3724 HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe 111 PID 3724 wrote to memory of 4284 3724 HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe 111 PID 1304 wrote to memory of 4620 1304 HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe 112 PID 1304 wrote to memory of 4620 1304 HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe 112 PID 1304 wrote to memory of 4620 1304 HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe 112 PID 4716 wrote to memory of 4604 4716 cmd.exe 117 PID 4716 wrote to memory of 4604 4716 cmd.exe 117 PID 4716 wrote to memory of 4604 4716 cmd.exe 117 PID 4716 wrote to memory of 3816 4716 cmd.exe 119 PID 4716 wrote to memory of 3816 4716 cmd.exe 119 PID 4716 wrote to memory of 4644 4716 cmd.exe 121 PID 4716 wrote to memory of 4644 4716 cmd.exe 121 PID 4716 wrote to memory of 4644 4716 cmd.exe 121 PID 4716 wrote to memory of 2076 4716 cmd.exe 122 PID 4716 wrote to memory of 2076 4716 cmd.exe 122 PID 4716 wrote to memory of 2076 4716 cmd.exe 122 PID 2076 wrote to memory of 4180 2076 Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe 123 PID 2076 wrote to memory of 4180 2076 Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe 123 PID 4716 wrote to memory of 1944 4716 cmd.exe 124 PID 4716 wrote to memory of 1944 4716 cmd.exe 124 PID 4716 wrote to memory of 1944 4716 cmd.exe 124 PID 4716 wrote to memory of 2852 4716 cmd.exe 127 PID 4716 wrote to memory of 2852 4716 cmd.exe 127 PID 4716 wrote to memory of 2852 4716 cmd.exe 127 PID 4716 wrote to memory of 3884 4716 cmd.exe 128 PID 4716 wrote to memory of 3884 4716 cmd.exe 128 PID 4716 wrote to memory of 3884 4716 cmd.exe 128 PID 4716 wrote to memory of 1436 4716 cmd.exe 129 PID 4716 wrote to memory of 1436 4716 cmd.exe 129 PID 4716 wrote to memory of 1436 4716 cmd.exe 129 PID 1436 wrote to memory of 1896 1436 UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe 130 PID 1436 wrote to memory of 1896 1436 UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe 130 PID 1436 wrote to memory of 1896 1436 UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe 130 PID 4180 wrote to memory of 5464 4180 cmd.exe 134 PID 4180 wrote to memory of 5464 4180 cmd.exe 134 PID 4284 wrote to memory of 5488 4284 cmd.exe 135 PID 4284 wrote to memory of 5488 4284 cmd.exe 135 PID 4284 wrote to memory of 5488 4284 cmd.exe 135 PID 1896 wrote to memory of 5708 1896 CDS.exe 137 PID 1896 wrote to memory of 5708 1896 CDS.exe 137 PID 1896 wrote to memory of 5708 1896 CDS.exe 137 PID 5488 wrote to memory of 5728 5488 Kartinka.sfx.exe 138 -
System policy modification 1 TTPs 6 IoCs
Processes:
msdcsc.exemsdcsc.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 5932 attrib.exe 6076 attrib.exe -
outlook_office_path 1 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe -
outlook_win_path 1 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00409.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2476
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:5276
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4284
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Users\Admin\AppData\Roaming\Java Updater.exe"C:\Users\Admin\AppData\Roaming\Java Updater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exeHEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe"C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4572
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 14204⤵
- Program crash
PID:4424
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\batch.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\File3.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Kartinka.sfx.exeKartinka.sfx.exe -pqawsedrftg -dC:\Users\Admin\AppData\Local\Temp5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Kartinka.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Kartinka.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Îòêðûòêà.gif7⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5948 CREDAT:17410 /prefetch:28⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:288
-
-
-
C:\Users\Admin\AppData\Local\Temp\File1.exe"C:\Users\Admin\AppData\Local\Temp\File1.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\File1.exe" +s +h8⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\File1.exe" +s +h9⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h8⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h9⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:6076
-
-
-
C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"8⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4600 -
C:\Windows\SysWOW64\notepad.exenotepad9⤵
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exeC:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe10⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3696 -
C:\Windows\SysWOW64\notepad.exenotepad11⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 4804⤵
- Program crash
PID:3012
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:5636
-
-
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exeHEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
PID:3816
-
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exeTrojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exeTrojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7318.tmp\7328.tmp\7329.bat C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\system32\timeout.exetimeout /t 7 /nobreak5⤵
- Delays execution with timeout.exe
PID:5464
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:5660
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msg.vbs"5⤵
- Checks computer location settings
PID:5476 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\remove.bat" "6⤵PID:2564
-
-
-
-
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exeTrojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exeTrojan-Ransom.Win32.PornoBlocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Program Files (x86)\411a82d8\jusched.exe"C:\Program Files (x86)\411a82d8\jusched.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6036
-
-
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exeTrojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3884
-
-
C:\Users\Admin\Desktop\00409\UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exeUDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5708
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4708 -ip 47081⤵PID:1536
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1776 -ip 17761⤵PID:660
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\d719735fc0e14e33912a8e730dcfa2fb /t 5712 /p 57081⤵PID:304
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5700
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:1748
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5964
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:2708
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4636
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4204
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4156
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3332
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:5364
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:700
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:60
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1812
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5464
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:920
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
PID:5692
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2016
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.HTML2⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7ff9302646f8,0x7ff930264708,0x7ff9302647183⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:33⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:83⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:83⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:83⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:13⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:13⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:13⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4760 /prefetch:83⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:13⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:13⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:13⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6668 /prefetch:83⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:83⤵PID:4120
-
-
C:\Users\Admin\Downloads\tor-browser-windows-x86_64-portable-14.0.exe"C:\Users\Admin\Downloads\tor-browser-windows-x86_64-portable-14.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:4252 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5792 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3604 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2560 -parentBuildID 20241016164500 -prefsHandle 2540 -prefMapHandle 2532 -prefsLen 21009 -prefMapSize 251695 -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {48066ba8-30eb-4d07-8d9f-f58d7bc323c0} 3604 gpu6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2228 -childID 1 -isForBrowser -prefsHandle 2304 -prefMapHandle 1936 -prefsLen 21821 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {67afd896-9d2b-4c91-9e53-4e5901e80e9c} 3604 tab6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5392
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe" -f "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc" DataDirectory "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor" ClientOnionAuthDir "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\onion-auth" --defaults-torrc "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc-defaults" GeoIPFile "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip" GeoIPv6File "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip6" +__ControlPort 127.0.0.1:9151 HashedControlPassword 16:16175209e2b7825b60b7cf6bbdbdbf771e869c6e22f27149db3629eae7 +__SocksPort "127.0.0.1:9150 ExtendedErrors IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth" __OwningControllerProcess 3604 DisableNetwork 16⤵
- Executes dropped EXE
PID:3656
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3136 -childID 2 -isForBrowser -prefsHandle 3144 -prefMapHandle 3148 -prefsLen 22587 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {1a995d19-aaf4-4b81-a243-9ea33af93495} 3604 tab6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3444 -childID 3 -isForBrowser -prefsHandle 3740 -prefMapHandle 3736 -prefsLen 22663 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {de6758ff-3452-4954-a682-6f9292793775} 3604 tab6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5912
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1996 -parentBuildID 20241016164500 -prefsHandle 3696 -prefMapHandle 3692 -prefsLen 24166 -prefMapSize 251695 -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {91d760be-b8a9-4ab4-bcfc-35282fe7f6de} 3604 rdd6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3580 -parentBuildID 20241016164500 -sandboxingKind 0 -prefsHandle 2284 -prefMapHandle 2200 -prefsLen 25409 -prefMapSize 251695 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {a4c610f5-2ed9-431c-95d0-eb8c27e8c0b1} 3604 utility6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5820
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2276 -childID 4 -isForBrowser -prefsHandle 4256 -prefMapHandle 4260 -prefsLen 24349 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {02166357-947b-48fb-bc65-5cb37385b734} 3604 tab6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3880
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4332 -childID 5 -isForBrowser -prefsHandle 1832 -prefMapHandle 3200 -prefsLen 24349 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {92a69322-5b1d-4832-81ec-227f21c28d7a} 3604 tab6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6100
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4436 -childID 6 -isForBrowser -prefsHandle 4444 -prefMapHandle 4448 -prefsLen 24349 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {09793748-7cd8-4af4-89e0-b54fd113b755} 3604 tab6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\PluggableTransports\lyrebird.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\PluggableTransports\lyrebird.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4952
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3616 -childID 7 -isForBrowser -prefsHandle 4828 -prefMapHandle 1964 -prefsLen 24856 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {fb1e04fa-6c9a-40ee-a498-f87d2d07d957} 3604 tab6⤵
- Executes dropped EXE
PID:1604
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4268 -childID 8 -isForBrowser -prefsHandle 3124 -prefMapHandle 1852 -prefsLen 24935 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {eb096b0c-29c3-426b-b672-c634bd92013f} 3604 tab6⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=5076 -childID 9 -isForBrowser -prefsHandle 5312 -prefMapHandle 5260 -prefsLen 26336 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {7a35d3bd-c8a9-4017-a0f5-c1c3ea691104} 3604 tab6⤵
- Executes dropped EXE
PID:960
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1348 -childID 10 -isForBrowser -prefsHandle 4712 -prefMapHandle 4884 -prefsLen 24935 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {0dad85e5-7378-4730-8c4d-83a7635c0fd8} 3604 tab6⤵
- Executes dropped EXE
PID:6340
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4536 -childID 11 -isForBrowser -prefsHandle 5220 -prefMapHandle 5392 -prefsLen 24935 -prefMapSize 251695 -jsInitHandle 1244 -jsInitLen 234780 -parentBuildID 20241016164500 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {98774030-a42e-42dd-953f-ea5aaa6eb5fa} 3604 tab6⤵
- Executes dropped EXE
PID:7068
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:23⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:13⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6584 /prefetch:83⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6704 /prefetch:13⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1732 /prefetch:13⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15580706743651477017,18411183894645385781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1412 /prefetch:13⤵PID:308
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3312
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5096
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
10Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
650B
MD5d045bc19f30fe8c48a529f48d480e491
SHA17c03804122850269d7d6267315c10a7ac9717440
SHA256db25db35070840caeb10724b7fc580aa5bcb4eaf5380dc722a731122fb4b8c5d
SHA5127f1cc70b3f597e98b239093fb3aec5a80a5834b6e65496aaad1f582f9c81171f9e7da0f72cc842280d3818f2b90338474dfb91ba9d303551e903175ea1bea561
-
Filesize
1KB
MD5104a4f8cb68234e77c8ab5b6f1078c48
SHA1d33b58dcf89473309ab6a35ee066a8354f3a0993
SHA256c16a32812e8dcaa18760dffd997d59b603d8624f56c5d5f959f19a55e262001a
SHA5122dfa4e6a0bf99129d8ea9ef77ad1c062a9b1cda1b44b4ba51be2145dd43ee2aad049126bcf04fd1b00b3e4f47d2f91ec95237a317c4bab00d1f597fa3162f351
-
Filesize
209KB
MD5cd9b59c8bf06232052bc871d219ca88d
SHA1b7684b442cff844865ff51f3ab8f84b190192b4d
SHA256f6401411dfa24b4bf9c3af9d0040435e6240eaec9c9f1b397d6ae4f702ceb87d
SHA5120528ee60e02c4155dd7ff03b41b4beb7530c5e4dff6c78463134162358aa414031aa2dd38caa0871891707b67c0be255bd24557fe3e88e57d72683d716dc7143
-
Filesize
15KB
MD5a7399c28a49b723780edd82de862171a
SHA1f047f0f71579e04a242d35cebb885f65864913bf
SHA25695844858be75594d92a0bfac364f51fd2c05b4eb24dc861828e33af5b146dc0a
SHA5126116eb44ccfca5270a25497e8af79c8fe46f2b39456f2a7e69c91bfe4858437c9687dfc6fe0515a920cb69a7752d2a39dec32010bd32d4c4a9fab54042a3bac0
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD594184405b2a5c22d8cdb3c56d243166e
SHA133085f16f413e877cd5ea1b9d3a152e0b474ea92
SHA256fc47e56b6352232cc4a9c8ad37445f9758217a4f2667717714b4ebc63f4d742e
SHA512164b7af2c77df5951e684e703878ee6b8e20a4d649c5951ce9e091034e6d21dc70cab365fe4556dc71ed25c06304df52ab962c110820725f5a85efff24ca5c24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5bd6a6.TMP
Filesize48B
MD53fd736ee1e5df82551f7eb57d671700e
SHA16a28c8c0dbef7a3d0c0b25eb89235a471abb79f4
SHA256458393fff87afe5166b16ed20a114571815d3b1968bf483791aeb171066d7310
SHA512fd0870acbd4539883145f46c65ad0faf3e4b812092ef257d2c59ebf1ee46eb3b5a1dffbf21db171d5d6e337e70957ba450a0632098f5536b1947ae8034c13780
-
Filesize
6KB
MD59f3c46ac2f27af8674d56f257c25c232
SHA1a01ddda9e088e12e61c70d7ff3e282d3cb321e28
SHA256a866d3a97eeaeda3067ca093757b54eb80872efcd8db52370b312bd35e0330ad
SHA512ac6e125c672cd7c843accf891105a9049018578064593c407ef52a68d912c3149551c5fd581600b8955873156f4b3a79b4517199642c2a98f32edfab4b306247
-
Filesize
6KB
MD578a2819a15156dcd3d0e65b8e6ae7b44
SHA129eb66fdced3ccfb6d9f757ff8c592890cbef6f6
SHA256d8fb77872715f89881d678d766820b65fd322ede4f62f641086570c27f2103d9
SHA512acdc9dfe77a0231f15c76649c6a90ac426371da1e1251a68076ade0ef276541ea1317ae217eca65737805a30c45131d8d9c3a5c89af1e74ec6143032b0ea65a9
-
Filesize
6KB
MD5a1229fdf924ce61a12fde5e89cf31ee0
SHA11ccaa376ec0f22101d9d7176e1805956da5bb1fc
SHA256f9ac64ae8c62320d51ed558c1c0c2e7f6092402d6c7660f4a30b7d77c332a930
SHA51237110477270ffcb370ac8328416425d31edc3d5e459c2244d8641bd796ae8acec7be4126b13f1bc25c5e8c3694b70280d6bcedff5454adec57b7666857a3146d
-
Filesize
6KB
MD532df6df2e40d6b17bd08c83d981d8634
SHA17c71b82e17404c7c520e226deb281a9073494824
SHA25624da3c93f498d0695e1d8a27edc0c6a7d79f4c99d65f4c2bf2603a69b208bb59
SHA5125034b122387ab6a3cb576d39dc34632554b95566e33eaed055e749a36a686b6e0840d2a8f66a6086107a13f83a3f6c68182d0feb5b1f5cee498275c61fc703e1
-
Filesize
6KB
MD5ff3855beed0dd79f1b1c9fdd3d2bd6bc
SHA12a9791d3f20bbd08c4d4f65299b77d9e1b3d4e6c
SHA25671a6edf08ff2b204edf90ad6b2bc7293ec8b48dd96b6f4da15e28f4048cde2f4
SHA51225d8ebaf9f7a843a7688b633fc6923bafc16333c7cbb52189440a878b57d1e25da698f90f71369f0afbe299d714cf322d3d0e83067025b7a52fa3ab5ff5e5e40
-
Filesize
5KB
MD5aa04b3558e6746b9e2e52c404d744bb1
SHA18f051ef41dfd7855bce855697ff6023a4af5e42c
SHA2561cf0787f61c6e5ba843c9a86d60d4f8e1b0917c474f1472f04a3a2d7ae889a14
SHA512fc79af9885dfcd5cf48e686ebd70698e8c98f9aad889980a229032718ead950bcb5eab4fc232bdb7938278d093be2ee217684d2934bb61c216be051b4c77447e
-
Filesize
540B
MD58470d18ab6ce0184d17e7b34d2580270
SHA1a90f71544a4059e2bcd897b056d4ca2487ceb80b
SHA25671671ca0dcc20112ff48e98e88d5ec51336bd01dca5022b174591a537b16e182
SHA51234c0e75f2fb34049437069a0494ca2a8f960b8d5b1bf0d4c82af5f0155fe0b3e8f925539bf5a551e6b63ecbf73d0523a480dc3dc90649ed61c64d84b8ebe39ab
-
Filesize
372B
MD50e2ef23552466586918e87390a032cba
SHA1cc3c2b16aca593e26588b764e3045519a71ebb65
SHA256866708af1b9596311cdd7972490c13dde7b368064cfebaef47d0e31dee6fc692
SHA5128c1b7ec8e39a30916b9a144ba43995ab878d4a8755d6e462cb05f34a8be6b8ec513d1215d71c40934edb94993ad76f0620d63e29a90be6fdbb23c01d4bb0f467
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bcb7a29638892275207092ee3dc9b5af
SHA1604399a95b1c9a302285e173fc70531a6784d697
SHA256321209bbe8ccbb00692c4f2306ac6cb35ad7b755071eeb46c1b62f7ef5cf24b2
SHA51241573ce922df12c90d3673224518d25148787a34e260ca9e6c57ed8ecb63ff8c7ab47bb109ac2771bfc2078175a4e0dd79acddf0ca17fa82af1f12311d55e22f
-
Filesize
11KB
MD5c35c232e1993b580a55dc99368c35e99
SHA1515348d3dfde044face7a8b2da82ac3a78b39bd8
SHA2563a90a31aac0a49a0fe03213cf6a580cb6d443e73ec5054b06d63880d8e359a83
SHA5123bf5b96104b45f6553559d706bf8749db222baa5a6111be1f7c4e00492e74f76213505855d8042febef2a7112fa95400d4a913f0f9d2a88750ed9951e3fbf4c9
-
Filesize
11KB
MD5e60f1362de401297156b69742b8af012
SHA1ca36dad8090f6c23ce9e98de62195998d1703630
SHA256f00df282bc72dac51c5236f59e2d7f85874ac16205c8889510259ef50c2a9122
SHA512512934c5e3ea3619f7fe9bb3b72df4add7b8b2c21a77e70d953c2951f7ddd9e9164b7d9dd6d59383ce89e436695f639a16cb2b36685caca78d5f4fd84e6642d0
-
Filesize
12KB
MD5484424ea0430ba17f146ee1c68fbe90a
SHA1e9ebecadabc1a4356b1c6de48bd5458e819b309b
SHA256e16900aa42b18ae2a407ee3762de470a9728b66f7a93625c12101ee7ff31814a
SHA512a91f8585a0a8bb807e6edaadce2a386c97deb40de31a4a99681a5c64ebe37538ad579a5972f70d219f064c2973dc47090f515250245f853cf3fc220254affca1
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\LLDJA3WI\microsoft.windows[1].xml
Filesize97B
MD5372706547a804b876522fe741dbfc040
SHA19bca733d6804f24c6841ef02b52e8ade1b45d7e4
SHA25609fe1eb66c953d75dc66ff6df9237cde5f419fb25fab6327de9cde6676219651
SHA512cc8057de048bf5646e41bed6f01111328bceae9abb4282a4ee1be635d086b6b3647cb5cc17cc3564980e5e31342a767dc639e536edbd3720df6b35ac7ebce34a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___java_com_
Filesize36KB
MD58aaad0f4eb7d3c65f81c6e6b496ba889
SHA1231237a501b9433c292991e4ec200b25c1589050
SHA256813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1
SHA5121a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe
Filesize36KB
MD5406347732c383e23c3b1af590a47bccd
SHA1fae764f62a396f2503dd81eefd3c7f06a5fb8e5f
SHA256e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e
SHA51218905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133746184095952241.txt
Filesize75KB
MD596c94a7627f4f58d88d4e36700494c51
SHA1d90e9627098d125cbcf2a90384edf1613e3cbc0d
SHA256fde5d4e364971a6012484001962282970e6407bde6779fe880c512c2613b9818
SHA512028ef37aeb1942fcf4ef28c786a52095068232bc59bd071772cb8118cefd6523bf04eb975826a855815e9d7898d56278f5f4ad4c145cc1ad9783412a77630ecb
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize10KB
MD55b1ad0aa0e99df7804f302fe1fc56519
SHA1bce26024ac836b9a8605052c246856a882b440ff
SHA256409b9b30b77df1408f85aef3ec53cb452a84cded1d70a4c8f2dbd5d0756d0329
SHA5124a0816fa9234433a2b3a18326264c5b6ace1ced6f840f82a732cb2a82abbeedd8e1d2a9f3bfb6424293e4fdc25b1682ee16be9b5a229c6894030d4341648b8ea
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize13KB
MD5cf7d2d2a0d101bbb4cd88075d121b3af
SHA1adc21da1907b8ed489044995250866b56c95f0a7
SHA25653df3d9e3aeb03fd53ec311c6af1ffde0eef0b975f17816cb6486f91f821bdce
SHA512adc3c5d3ab70d3eb2f96e5b6668e61b91c07af2ecef1f1c579046108505f52ca6b017113d499f341bc93edc30a71afba0e275772384ef6cbe52aee3561bc5bd7
-
Filesize
472B
MD5e3656940bb543358b59cb27ff6d5a177
SHA111aeeaee1b09d234039975df7d2bb1401587ea5f
SHA2568c65f51c79963f75f7058c889d603fb9350a9235a09a683cd2d75462ecde1d05
SHA5120533c85a6c92bc1370f43b730319743a6bb1dade85f05b3b040b29465796be77bce7895ac614b63018ed0abfe7273fc19dc27698faf8fefec5372aded5e190bd
-
Filesize
839KB
MD571e866b44b2ff6fb9b5009fb9c0259df
SHA13b7e247574aeefb8592c643d4583ace11f92879a
SHA256efd271f51c473f231535d749753e7d6b6c9b3adc0da325bcd5bc66b4341d505e
SHA5126ab92660dfaa05f87442ab8ae92f22353266b991bee6a876a32b921f144c68b2e94421bea6b0564daf6ff39a82de48166533c3d79b22c50be47962442e29d790
-
Filesize
2KB
MD5340b294efc691d1b20c64175d565ebc7
SHA181cb9649bd1c9a62ae79e781818fc24d15c29ce7
SHA25672566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9
SHA5121395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d
-
Filesize
13KB
MD53e7ecaeb51c2812d13b07ec852d74aaf
SHA1e9bdab93596ffb0f7f8c65243c579180939acb26
SHA256e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96
SHA512635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d
-
Filesize
6.1MB
MD5424bf196deaeb4ddcafb78e137fa560a
SHA1007738e9486c904a3115daa6e8ba2ee692af58c8
SHA2560963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2
SHA512a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797
-
Filesize
436KB
MD581e8d04825b072c58cabc23668e89dd9
SHA1148e65ba5c5f7552ddf64d2e62988ea10353aa9c
SHA25622b0a392709dfce316a22823d360b319c3e980dbb2423d2d75dd3e8c2f983cc9
SHA5125e6ace88da069659c158f0afd60551ce0ea4dfcfac8466ce4dc79aad278c081b8096c3fd954da65c960207cf05d334f7682baa63f670a890462616576bebd681
-
Filesize
436KB
MD564685a8b7f2950d2f3ccd43a42882718
SHA1e3e940e3d2f3d1e257ee79f1b36d5a9d81fe5d4b
SHA2562ee4e13b9dead39f87ae8cfa12cfd17ae546eb1856db6e41dfea2d088218dab6
SHA51239fa4375bc59edd8535fa5d6316bc2ebe8afe0b07332a49dd2674256bff13b6a0db6d8f50ad5306983c7dca944652a9e6347922a1ece68a261ae45cc21a8f2fe
-
Filesize
5B
MD568934a3e9455fa72420237eb05902327
SHA17cb6efb98ba5972a9b5090dc2e517fe14d12cb04
SHA256fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa
SHA512719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d
-
Filesize
322KB
MD5c3256800dce47c14acc83ccca4c3e2ac
SHA19d126818c66991dbc3813a65eddb88bbcf77f30a
SHA256f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866
SHA5126865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25
-
Filesize
55B
MD50ef412e91c72943328940dab74e26c42
SHA11ea9601a19301fb655cede420c6e91a48a9c94a6
SHA25608492ece760f7ae3d4f3f86c178a6764adb757a3134db67b12309ece392b131b
SHA51226dfa727f9bc4f7df678d39d49b0315e0afa8a1cd6397687ee1695b092eca1efe152097b3f3174a78630041e4bc343ba16740a94d958ef2bd92bf3e921c4e215
-
Filesize
1.3MB
MD55d96b91d39d3ec3e816f80fbbabfc436
SHA1952dc8967acc6487b636b2ed10b6b46cc358483f
SHA2569ac3fa5134b70582275c08dac96ba0beafef684da452752c269adcf9f72dff3d
SHA512b076749a40a8500aea07b6f2dcd700eab6b43e751cab6f92163d6d80d470152e43eb25f728bd9ce5f1a32305a3f28ad73cc915685b7aacaada775b9b8814baf7
-
Filesize
1.6MB
MD5d24bad55ee9c5fefc8dfef09e32bcc0a
SHA1b1ba7aeb57673f6ea10ccffe2b3d3af3a73b7084
SHA25673038b22ae7eaef535a7e77edc7f64ce2bc785d324735c8df9671c28cfff3a17
SHA512299f7a40a4e9b2ca766806baba149398bc7d5afb334e6830d23ba44a7e30510888693058fc3465d04076100f1c45ba32f7bd8bf249066c42aaa8c464ac55c2c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD53ccc706b6d7aad667aab36847864d347
SHA19a332ccc7817a49c9239c71555e4e90b42177080
SHA2560e9fea8f66abad52ea4e9faee8bd33adde51f8c78c12d0aa9321dd287a11c359
SHA51201886aa31ee50b95938e98163965c27c6219e04e699bb3d8a0afc813b92f623852f301c12102f3a440b930d3ad7065bf6aa116898d476fb403c8d4e9fee02dd4
-
Filesize
7KB
MD59888fb6b91a680305b2a3e7b71d6561d
SHA14a7935da38f88e9f74f425078ee39eb6269c4e63
SHA25681726604d47b192620bcf90d6e42ba8ee8b4c54935b0081655e08247d6b6c675
SHA512f50755e5624bfc3a60a23a7dda012509c1e31d9772d6a0ccaca88e32ae8d4602e10e38003d78b1626464502db7ea7c47d772efb7b3ea7c3e2238bf3b9809f833
-
Filesize
24KB
MD5d997606c77e880be2744c44128843d60
SHA192bb9003dc14ae03963f503e82a668877ca4295f
SHA256abb2613ff851b2cbfb61bf97e4eef9d4912abcb46e04774ad84812ab75d4dde9
SHA512714d7ce786e9fbb6f0d0e537a146a3a24aa79089669dd168b7c110dfba667fa7afb794b3dd2b93fa76e1d1771af3347a0f568cbb0fbcc8d9755de9e6e54382b3
-
Filesize
13KB
MD5bd0d7a73d0fc619e280372587e9e3115
SHA10cde473dda5d4fda8190e6460f3229cae2571af5
SHA256c7f2afe3a2424e71563e69d862dc027d299d84fba4ac1ba11e593361daec0a80
SHA512914983bfa336f9ea019bf5dc9ee403af56a6c7c1d88b8092609e4026a3377daa6ef9a8e51a93537f6769ae165c264763645a363fb6a89f8689f59caf985c18b2
-
Filesize
935KB
MD56ad76c39784b6c9a8b10d4b409fed6da
SHA1062af32a1abb32e21730a158b76d5420a549b39c
SHA256999244c7be75e58fe16cb2880711013ca079822da1dab65e7eb375c1faf5baad
SHA512d2589827323d7b4ca09025553a248a78dfbb376e03d7e38ff522d98c9d26d6262c385296fac440fdc89bb62d9236d5698db614d655a9b1907ef5224a8b0bfd6e
-
Filesize
643KB
MD51185fd00bed0e72cf839fc3b9e485811
SHA1653ac6e8c0aeeef8b1158ab637ee97b61ab92445
SHA256fc4c960f749616006706211c7e19935140fb8a14ee79753493c438dd7dace520
SHA512c458718965a6a5bbae022c64c6d71dd69eec07183fa0d29932c2581d66f5fd23e04e7802c03193fc820bb4d4883e08eb77a4a60ad68fde6d979c0624ac3736c5
-
Filesize
6KB
MD5675622258b256d20e88fa07a37e77eea
SHA113bed8e26bda2ed61751acca3222174495e48f17
SHA25631f1790f9f2c8714c0c274836b71577916541d8ca45fb398a9fc9fdb765b5d23
SHA5126763f52afad8740298a767db7c80ddf3242e96732b3e1bd92eea6ce50a1ff7fd0210dcad5cb6040b11917d66f2a1dfc86f8424031f52815d21525f2ed54d281b
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.MSIL.Blocker.gen-54e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6.exe
Filesize6.1MB
MD5897e682e74f06b75d31092219581d5cf
SHA16300dbd5474208d4f883365169ab5acae6bbe714
SHA25654e8b5e94998f65f38265104450daf8565391ecc487eed0ef0ed1201656aa8c6
SHA5127a581ca84cbff4bc1f48e85b41f2b27b9c9752844be7a64c7df2fa8570135d592e132436e8b4b68778ca27dabfacf0702736dc9a0aa356d937f40fbbb831085c
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.MSIL.Makop.gen-3bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da.exe
Filesize1.4MB
MD51242cee90febf334ea5ca6d5fdb8e674
SHA1eb15b2498f6511ac0943c998a45e20576a465cfe
SHA2563bb0cdbdeecde31726bbc0ea5fb4b9dfadb8874d78719975377ac6498baf74da
SHA51251c02eef3fb0d8ed526823c25a11f4200fc135d25c09ad36ede8227a43901af758571db877984dbba635185899ce6ccb654183dfc33ffa5d86e9d88026b2a3c0
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Blocker.gen-957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c.exe
Filesize1.4MB
MD54047a1a03be9df604f06fdb28647891d
SHA11b40243a8e6a025eef866f09b7b4361b70777494
SHA256957ef05564cba68f526fe7d881b3957a933b14196205f2cf6d9e287c100ab85c
SHA5124bae1b68abcfa4a91c27a9f01f1a9b06336dd0e28b8fa7d6dbbc50a2d5120e7467fec564966991945ac9b6dd91321bf49e9ba92794dbff55ea094177952b06fa
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Encoder.gen-01adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b.exe
Filesize1.0MB
MD544b1491cdfc5e297e5f0fe26f6fe3c73
SHA192f6f6af7c3ba1ca93f9c620873eb223616ffd25
SHA25601adfd916d94200342161f5dd0f585859921ac2a4c9f7196d765271b49699d6b
SHA5120b4b0487516f63224714e77782b958c7fb9512bee337fa303a470c7f2e069c7b22bed15c9e3ff91db8779e94214d81b54327c88b19af0a71092fb9252067892a
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Encoder.gen-d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9.exe
Filesize1.6MB
MD56c367fc8675ecd5fc6ff7b8c46caa2a4
SHA1079580cf77c9fe00d928e15918745f1f0931ce66
SHA256d641070218aece6e82d4e0c532e0eed71b23a912bf97379f3ab71c1e97cbe7e9
SHA512f0d52d52cc7b4b61cfee6aba21a399b7a1f2783808c7501f766166e90bfea7348c5e63823927a7fc429241bf60c5daa285d7d6c32548dd97593c31d6e4e7a5e5
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-26f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a.exe
Filesize321KB
MD504f4838a3e5b9aede7f209f2cd4dc092
SHA11891d22c5b1baadc3a97094c7c775099a530e332
SHA25626f050108095378962e1a61d59fc7faeb804fdd93f87618c2f3e5dbdda137b8a
SHA5126f851e01c35bd099018a334be4afd3b080552a7f82a0c03981c035dec5ef2cf70c7dab8dc6b143f23539b8b0ed76de0d5e4206d6e0691ce39fce4baaeb60e32d
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.Gen.gen-50589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f.exe
Filesize1.8MB
MD554a5643d84bfd5ac8bfd297a5a063368
SHA183936f4e27a1b5610d0438efb40ff31e62d8e3c4
SHA25650589127250c689565adf1dd57ab0bb19be202246514fe8b63eeed6de681336f
SHA512225c5adadf6a7623290c29101f27da9612dfbb81d5d8fceb7ea5f2042dfe6a62f48a7fb088ee351d162825beec6c065a851e7a8073f01f6a271368fa5673c921
-
C:\Users\Admin\Desktop\00409\HEUR-Trojan-Ransom.Win32.SuspFile.vho-c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e.exe
Filesize3.0MB
MD51441e78b9e6ce78dd02e7491b25e7f9e
SHA18c355fd0e062152a403cb0c42412850b60524aac
SHA256c81c2c539ccba4c38add72e271fe63a2e389f2f645050289257fc6af4f47a82e
SHA51252e34a8ea136783e2009700b330e7db32e817ab0420c77e6cf47ab79c385635036ac4b547d6d1ee7542eb1e2e0b88f741289b96bf66dde18f1fdd03cb554d023
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Blocker.mstb-33fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365.exe
Filesize4.7MB
MD5c95df8036bbb8e85ed96f538c47a8ff5
SHA1702d137ec3e59ee7683b4af1deee1d252926ca22
SHA25633fdf4f6aabfc32fea72ca804da80422410cffa743ae00466bb4eb728c758365
SHA512fe23d5a4c046205f5f06974faacc99063e65232250079d8c866aba5ef83c7649d9ae73db8d19d42fe92b8e415fc990edad159a5f30a2e92ace59b3d21faf77cb
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Encoder.kpq-ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c.exe
Filesize112KB
MD55c281ddacaddf036d2b836b656cc3a8f
SHA193c5595c540181395fac196acd3329fde0c1b1fd
SHA256ee453b4bb7c1037fcd146a9c61540ee567953a6a24f7fbe72fa5fb7f700d022c
SHA512fb5c92180b2713d92b26a220abd13ff529a2366327c76c84379b2742bb55e456440ce87fd142323e06969c23f973ba011836a29c1c660461b2a4eeb19c508974
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.PolyRansom.btzw-5548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d.exe
Filesize2.3MB
MD5c13d0ed4192acbe02389b1f8a03b86ff
SHA156903c2c0d61f67a0670e85b12cab953a4c0c9b1
SHA2565548b06eba1fa8a4fb462453a0a33b1722b01ac3752b6e87c04101af2fc1086d
SHA512cfaa596aab72fdcf51ab0126dcef23df5f22501ce8c683558ef1e73eefe0ed47a09623fe1415741a903b603c87de29cedeae24f8e97ff49138c3a64a162dec3e
-
C:\Users\Admin\Desktop\00409\Trojan-Ransom.Win32.Suncrypt.a-3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824.exe
Filesize425KB
MD58e2ccd9284e09ccc4e9eef325a83b435
SHA17710f609e7623a08f0dd7cb8fae1ff38d0c729ef
SHA2563f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824
SHA5129827bdb32c04127ee0ccc41be9c84df40e7d2aa30c68dc9f9e5bfabcd920478884bbec0f3f8ddcbe5fba2eafafa3437b37af161d59fc39daa92202e2f884247f
-
C:\Users\Admin\Desktop\00409\UDS-Trojan-Ransom.Win32.Blocker-ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976.exe
Filesize3.5MB
MD563ebdf13d4468bd1aa4c1f461f6b342a
SHA1c6d7d373637b95828cef644ec3950cc846c46148
SHA256ba959985ab5014a21067af034c23bb3d966bee4bb39b58b0de2c6df2c3709976
SHA512f5f41a55ae1e513d6cad226ff5f6508253c33904658d48d5a12a5404294cd368cd76fb0c6c857655dca4463457a6a94e834aa38355317b1e707a48472bfcd999
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\datareporting\glean\db\data.safe.tmp
Filesize182B
MD563b1bb87284efe954e1c3ae390e7ee44
SHA175b297779e1e2a8009276dd8df4507eb57e4e179
SHA256b017ee25a7f5c09eb4bf359ca721d67e6e9d9f95f8ce6f741d47f33bde6ef73a
SHA512f7768cbd7dd80408bd270e5a0dc47df588850203546bbc405adb0b096d00d45010d0fb64d8a6c050c83d81bd313094036f3d3af2916f1328f3899d76fad04895
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extension-store-menus\data.safe.tmp
Filesize245B
MD58d760775f3d310bc3a76e80614de59a8
SHA16c5284a6c3f6d9c96f02b0fa281193bf4aa26656
SHA256e679c4aefc4c606245e039b297e6b0313c550231b5914b2dee57c16b23bcc50f
SHA5121eece96a958a273fed24bdb10cf4534aac214d060645db7a7e00c272696a6a886b8f914a7487c688e3b3cd4265177edda9a940db17c67ea2e8e03552fcdb7d61
-
Filesize
16KB
MD5eed221cf4e6b170e88b23bbb5cd1e179
SHA181c3c10b3f7d9244b739626f7aab81907160735f
SHA256d69d8af4f57b45b18e07737c6fe453fdffce14c2886ec21e5bf9a5e2c8e311f6
SHA5122ae3735cd9a977fc32cfb571871ab28b060627787a9ddce1a9aebc6398de6086247cf7314b017f95c3249d4adb0b02a5496f39b5700b0227133b8342167116b9
-
Filesize
5KB
MD5f01b3bb8b61eb2984ae213ac1cf02b32
SHA1db225d7826242333dd47bda915827105293c3001
SHA256cc70ba6be4191d1d5500638b732627897976ebd14b479ce5bd35473dd6999751
SHA51283d0f69917e07a072eacbfebaa7eac1bbdda1b73917d54ed23b1d59495930e7c2a3af39a9b8a89c3abd492a04c4fc510c28810d52086374a24e1b2f9a62d012d
-
Filesize
5KB
MD50d63ebbf878a8a957a5742a1fb1b02f9
SHA104d222a9de7c17966fb37d5c15f66f0d89730349
SHA2564d786aadb58a363257b4b074900f09f50b6eeaf8c59df1b897bfca5d3d596745
SHA512acb4da8063dbbbd4ae8cd2d3a2e304269ffdc6e91d8dc3e1b6eb662d70c99c6b65b8ae4ee653be9c5d6c0312344f27e4e5bd3f640ae6ee0a2fcd132f1d4aa58f
-
Filesize
4KB
MD5251bd5f6a0ab923e3adaead0d0ef15e3
SHA19bfb9cf1bf656a5f978900f95ec520ebda47b9de
SHA2560ca1bf6ecacc97f80405e4479049ca2c3837c04c1085cd59cd49fac84ad00b04
SHA512c0fed86f10513367fafe59e408cff2b24ad98369486524ca2b4c0e7f1b9e40c302b6bbe8ec3c8d07403ceb50f5702770eca23b11bfb06202bf176397cdbf1eaa
-
Filesize
863B
MD58fd4bb65e342871a58fc22a5700a3db7
SHA1b08a91ca9f33b2c4b3902a1e8d92051fae7f2eb4
SHA256835507ff87394fb6bf96f863d189c382468a40b941b68c999b876d13b8ed0614
SHA5122cf2450dbf3cbbd37d2a8358eea661494f0f26e32875ed76967deb14eb30760e0e86c40215bd11bef0de8f408ffa3d41594cb25ea7003b7a5a1124cc8baa914c
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize56KB
MD5598e28144dba36cfda0a9a5acfc0fd9d
SHA1b6f0d2bb28a1953e8dbe0bde8852c0e31f9be706
SHA2562e7857a40b75624edaf12c8d6ddc034d26bad19cd3e506852555fe9d5807daed
SHA51292cc1a1fecd49d1f26639c6195544831379c2212aac0e5d282e3b4f706176d862b58ac5bd1d8d5cf779502d9664a9477825f6d018f53e9e8bc2ce3e110fd96ee
-
Filesize
2.8MB
MD5f1d357ba5604e28cca4320de4eff66ab
SHA165421d6f725237ea182740da57d23d34f5e28478
SHA256f31218c34a005bc420490a1ef91d0863938282e3508bf74f6f44117bb91f46bd
SHA512afdd23c1598651fdd92697db8daf3c6ba758cddb83044c3217c43d8a18a3b2c6e2ef3d19d3e9fb8b6413b1573b1ad22aa226dd5fbf909225b2ff4caca7c8847e
-
Filesize
10.4MB
MD521cfd3681923c6d86d2bb161c997e2ab
SHA146e8a7ce0629d730201ae5f9749c42db4c5127e4
SHA25656f84dbbba48d52df5c3433bd1b44585fa11685d1f6792df07134f39321740ac
SHA51283be729f4642ad2b751f5532cff91205ff22d8b314dea32540f9a42794383923ab7c346c28516cb8533d9e87a4849988f6dd3147ef0151fc7fdd1a9c2e72e9fd
-
Filesize
1.7MB
MD5fc77f7ad084c52daa4452fbe197bc429
SHA1a452346850d052bafce4bf3c42a9d4f57a6f8d96
SHA2569808bb370a6463625bac46ed0af68ad7710ce49f550f3cf567a46ad4d1fd77f4
SHA512a6b21b5073f396ed3b2334ef474121a67dad847b5fd06a04bf7faa1e810f29d5e3bb748d90de27a056f60d48e16244e2dcad498a0d04da9d123dc5c7a81bb8aa
-
Filesize
829B
MD5030a1c3c5ed33a454087142c40037c99
SHA15648f73b15adae17c6c8b09c88539c2cf261a832
SHA256a47ca26741f2e54c0d61f940358cafde03fe373da9d6fccdb3b9e80f4d67434f
SHA51217234c6c0856a5df1f7a1f1cc7d023b5b07f50c5138a3186b3dd74d18a62bf4d43f1cc3e8e518157ec30bf01245480a6b188703c6c01d3b4b4d5e85821130fad
-
Filesize
7KB
MD5599f453cdddc2643761c9d4d27a280b8
SHA18118350119476d6ea42202311b105fa60f6bb19c
SHA256d0ed8b6c83bce97e201594d1a24376331baf87b50a9156f708241d01a021e856
SHA5125268f05fa8ef823c3fca783fe19163c45e3fc1f679293a5d1d365b4fcee890fa816f8cbce05a2deced000f75115ed6d8c9a3676df76e40f7425d1e617a8141d9
-
Filesize
7KB
MD5ff85d117b0d93f1746a94148fe32ba60
SHA1e39251e6027a64f7a24d4abe65e059c1a781fafd
SHA25602c8d934fc27f3aa004d409023c726d86aaba2fb629a4e6c7e44508207a44150
SHA5120199fe734941c95c2ceafd4d713a8ce1dfac8d354a2278a9c960f96932788c368901e271d398997920ebdfbac99aa7511dfd0862946e838206ed9d1d160f6df0
-
Filesize
7KB
MD5f90a1af92326f3812c00260b6bf6e5fa
SHA11f7bbb8b8b67be106eeb4cc3ac6922400935589a
SHA25654465f7cfab43f761c8a4089a360c0997e6e88cfb8a5b748099e10c5fc18d355
SHA5122e6bb233845705bacdd6f5b23bd4557681eec79e39e0522dcf4e09f45d18c370f9b3748cfcd883207aa81f4bdea2c288058984dd6c5022d6047ac02eeb0e6ac6
-
Filesize
7KB
MD5c403e5fd26cda4d0b0f8dab25a999cdc
SHA18f4248626b7ac65e4e2a4e528abf46609532265b
SHA2564ea23064950c2650524f1926e1b84501a74f36c488f8db2041fbb0ed3e135068
SHA5123640b66857f639a0c565979cbaf6f9f708faf68e3eccfdd9d3a2eddebb781a2679e72a1d58309d61fdc8625b54a0845290d43b8956bf46577d0ef0ee1b0f621c
-
\??\c:\users\admin\desktop\00409\trojan-ransom.win32.pornoblocker.ajrm-ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9.exe
Filesize209KB
MD504b715760155290fc51094f5d1d81441
SHA1c0932b1e553514bf652ab5875635b68c5396de2f
SHA256ed5c8667c0dd2d7747f509a0e68d88fcf6d1338594f9b653790e814aa9b64ba9
SHA512165fa35add8474efc7cb067d17f521b4886fd0dd1e180a9f630e4683b5c3d1ed9417ddfece36ac08cf84a172b9b8752b183fffb3abfe0fa091c8aab72486597a
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88