Analysis
-
max time kernel
82s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 22:52
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00393.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00393.7z
-
Size
42.9MB
-
MD5
c669c4fc12893f651e89581f9988813c
-
SHA1
ecc05197cfa3d2dbfb34826c8593807445b1f963
-
SHA256
fa1da5867ebac2dddcf4b73fd40052b86847b66dd90019ab3f1f4d3f228b8739
-
SHA512
304dfc4f7d143ae65a49848510367a65ccd1756c9b58c5e28ca33981cc9885803115ed310024ae33ef80bce1b3b82d74d0727005c3df3090d0165651d97d4db2
-
SSDEEP
786432:sEpOmv03qjWHKUuSdZVZFhxZYTBudpPsuoVgThdqNiF+j85BMxw/zoy+aG7O9gci:sEUbqjQzuSdZVXhxStudJzoVg9Q8F+jN
Malware Config
Extracted
cryptbot
bibinene06.top
moraass11.top
Extracted
djvu
http://cjto.top/nddddhsspen6/get.php
-
extension
.moss
-
offline_id
JfQF2MdGDbN6Jyv88cdFwKcakT7HML8XzQtzmYt1
-
payload_url
http://cjto.top/files/penelop/updatewin1.exe
http://cjto.top/files/penelop/updatewin2.exe
http://cjto.top/files/penelop/updatewin.exe
http://cjto.top/files/penelop/3.exe
http://cjto.top/files/penelop/4.exe
http://cjto.top/files/penelop/5.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-7596obcC8h Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0255Wdasde
Signatures
-
CryptBot payload 9 IoCs
resource yara_rule behavioral1/memory/1332-1338-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-2441-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-4763-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-4762-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-7357-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-16435-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-21621-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-26054-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot behavioral1/memory/1332-28452-0x0000000000BF0000-0x0000000001124000-memory.dmp family_cryptbot -
Cryptbot family
-
Detected Djvu ransomware 3 IoCs
resource yara_rule behavioral1/memory/4172-4772-0x0000000000400000-0x0000000000869000-memory.dmp family_djvu behavioral1/memory/4172-16897-0x0000000000400000-0x0000000000869000-memory.dmp family_djvu behavioral1/memory/4172-22216-0x0000000000400000-0x0000000000869000-memory.dmp family_djvu -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Djvu family
-
GandCrab payload 2 IoCs
resource yara_rule behavioral1/memory/3160-178-0x0000000000400000-0x000000000045F000-memory.dmp family_gandcrab behavioral1/memory/3160-179-0x00000000020A0000-0x00000000020B7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/files/0x000b000000023b87-3273.dat family_stormkitty behavioral1/memory/5240-3391-0x00000000005D0000-0x0000000000630000-memory.dmp family_stormkitty behavioral1/memory/5240-3394-0x0000000001420000-0x000000000149C000-memory.dmp family_stormkitty -
Stormkitty family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\heur-trojan-ransom.win32.crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe taskmgr.exe -
Executes dropped EXE 13 IoCs
pid Process 5044 HEUR-Trojan-Ransom.MSIL.Blocker.gen-309d2137aeb704f62360370cadceb1812d81790f23399ca9f229e88d94971fb6.exe 4668 HEUR-Trojan-Ransom.MSIL.Encoder.gen-e0a681902f4f331582670e535a7d1eb3d6eff18d3fbed3ffd2433f898219576f.exe 3888 HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe 720 HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe 3540 HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe 2692 zbhnd.exe 2028 HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe 3160 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-7e111ee1fed7c4739c4fd3a8ca32a4d44a6714ee26708449e9312da254747166.exe 1904 HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe 2672 VirtualNES.exe 4172 HEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exe 3552 Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe 1332 Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe -
Loads dropped DLL 2 IoCs
pid Process 2672 VirtualNES.exe 2672 VirtualNES.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 6944 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe = "C:\\Windows\\System32\\HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe" HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 64 raw.githubusercontent.com 63 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.2ip.ua 57 api.2ip.ua 68 api.2ip.ua -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\System32\HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe File created C:\Windows\SysWOW64\Tasks\Microsoft\Windows\Application Experience\PcaPatchDbTask HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe File created C:\Windows\SysWOW64\Tasks\Microsoft\Windows\Application Experience HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1904 HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe 3552 Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe 1332 Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\CompressStart.wma.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\officeinventoryagentlogon.xml HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Data.dll.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\webkit.md HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-006E-0409-1000-0000000FF1CE.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.XLA.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\7z.sfx.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\c2rpridslicensefiles_auto.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.dll.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\freebxml.md.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\JoinBlock.m4v.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OneNote.OneNote.x-none.msi.16.x-none.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-errorhandling-l1-1-0.dll.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\loc\AppXManifestLoc.16.en-us.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.Win32.Registry.dll HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\7zG.exe.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\lcms.md HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ONENOTE_WHATSNEW.XML.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\ecc.md HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-multibyte-l1-1-0.dll HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.DataAnnotations.dll.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\v8_context_snapshot.bin HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\jpeg.md.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\pkcs11wrapper.md HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0000-1000-0000000FF1CE.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Cambria.xml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.FileSystem.Primitives.dll HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\7-Zip\Lang\be.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\relaxngcc.md.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0409-1000-0000000FF1CE.xml HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.Native.dll HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\7-Zip\Lang\hu.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\dom.md.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSQRY32.CHM.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Numerics.dll.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msadcor.dll.mui HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\external_extensions.json.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql90.xsl.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.MemoryMappedFiles.dll HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\7-Zip\Lang\de.txt.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\dotnet\ThirdPartyNotices.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\icu_web.md.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Linq.Queryable.dll.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\[email protected].[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File created C:\Program Files\MeasureEnter.mhtml.id-7AC1849B.[telegram_@spacedatax].ROGER HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Cambria.xml HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\appcompat\Programs\Amcache.hve.tmp HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe File created C:\Windows\appcompat\Programs HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3664 3160 WerFault.exe 117 2828 3552 WerFault.exe 128 5180 4172 WerFault.exe 126 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirtualNES.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-7e111ee1fed7c4739c4fd3a8ca32a4d44a6714ee26708449e9312da254747166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-e0a681902f4f331582670e535a7d1eb3d6eff18d3fbed3ffd2433f898219576f.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3428 vssadmin.exe 5504 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 4412 powershell.exe 4412 powershell.exe 4412 powershell.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3912 7zFM.exe 1704 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 3912 7zFM.exe Token: 35 3912 7zFM.exe Token: SeSecurityPrivilege 3912 7zFM.exe Token: SeDebugPrivilege 2496 taskmgr.exe Token: SeSystemProfilePrivilege 2496 taskmgr.exe Token: SeCreateGlobalPrivilege 2496 taskmgr.exe Token: SeDebugPrivilege 1704 taskmgr.exe Token: SeSystemProfilePrivilege 1704 taskmgr.exe Token: SeCreateGlobalPrivilege 1704 taskmgr.exe Token: 33 2496 taskmgr.exe Token: SeIncBasePriorityPrivilege 2496 taskmgr.exe Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 3888 HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe Token: 33 1632 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1632 AUDIODG.EXE Token: SeDebugPrivilege 1904 HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe Token: SeDebugPrivilege 5044 HEUR-Trojan-Ransom.MSIL.Blocker.gen-309d2137aeb704f62360370cadceb1812d81790f23399ca9f229e88d94971fb6.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3912 7zFM.exe 3912 7zFM.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 2496 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2672 VirtualNES.exe 2672 VirtualNES.exe 2672 VirtualNES.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1704 2496 taskmgr.exe 100 PID 2496 wrote to memory of 1704 2496 taskmgr.exe 100 PID 4412 wrote to memory of 1068 4412 powershell.exe 107 PID 4412 wrote to memory of 1068 4412 powershell.exe 107 PID 1068 wrote to memory of 5044 1068 cmd.exe 108 PID 1068 wrote to memory of 5044 1068 cmd.exe 108 PID 1068 wrote to memory of 4668 1068 cmd.exe 109 PID 1068 wrote to memory of 4668 1068 cmd.exe 109 PID 1068 wrote to memory of 4668 1068 cmd.exe 109 PID 1068 wrote to memory of 3888 1068 cmd.exe 110 PID 1068 wrote to memory of 3888 1068 cmd.exe 110 PID 1068 wrote to memory of 3888 1068 cmd.exe 110 PID 1068 wrote to memory of 720 1068 cmd.exe 111 PID 1068 wrote to memory of 720 1068 cmd.exe 111 PID 1068 wrote to memory of 720 1068 cmd.exe 111 PID 1068 wrote to memory of 3540 1068 cmd.exe 112 PID 1068 wrote to memory of 3540 1068 cmd.exe 112 PID 1068 wrote to memory of 3540 1068 cmd.exe 112 PID 720 wrote to memory of 2692 720 HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe 113 PID 720 wrote to memory of 2692 720 HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe 113 PID 720 wrote to memory of 2692 720 HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe 113 PID 1068 wrote to memory of 2028 1068 cmd.exe 114 PID 1068 wrote to memory of 2028 1068 cmd.exe 114 PID 1068 wrote to memory of 2028 1068 cmd.exe 114 PID 2028 wrote to memory of 3628 2028 HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe 115 PID 2028 wrote to memory of 3628 2028 HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe 115 PID 2028 wrote to memory of 3628 2028 HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe 115 PID 1068 wrote to memory of 3160 1068 cmd.exe 117 PID 1068 wrote to memory of 3160 1068 cmd.exe 117 PID 1068 wrote to memory of 3160 1068 cmd.exe 117 PID 1068 wrote to memory of 1904 1068 cmd.exe 123 PID 1068 wrote to memory of 1904 1068 cmd.exe 123 PID 1068 wrote to memory of 1904 1068 cmd.exe 123 PID 3628 wrote to memory of 2672 3628 cmd.exe 124 PID 3628 wrote to memory of 2672 3628 cmd.exe 124 PID 3628 wrote to memory of 2672 3628 cmd.exe 124 PID 1068 wrote to memory of 4172 1068 cmd.exe 126 PID 1068 wrote to memory of 4172 1068 cmd.exe 126 PID 1068 wrote to memory of 4172 1068 cmd.exe 126 PID 1068 wrote to memory of 3552 1068 cmd.exe 128 PID 1068 wrote to memory of 3552 1068 cmd.exe 128 PID 1068 wrote to memory of 3552 1068 cmd.exe 128 PID 3540 wrote to memory of 3236 3540 HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe 130 PID 3540 wrote to memory of 3236 3540 HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe 130 PID 1068 wrote to memory of 1332 1068 cmd.exe 132 PID 1068 wrote to memory of 1332 1068 cmd.exe 132 PID 1068 wrote to memory of 1332 1068 cmd.exe 132
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00393.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3912
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.MSIL.Blocker.gen-309d2137aeb704f62360370cadceb1812d81790f23399ca9f229e88d94971fb6.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-309d2137aeb704f62360370cadceb1812d81790f23399ca9f229e88d94971fb6.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Users\Admin\AppData\Roaming\ServicesHost.exe"C:\Users\Admin\AppData\Roaming\ServicesHost.exe"4⤵PID:7272
-
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.MSIL.Encoder.gen-e0a681902f4f331582670e535a7d1eb3d6eff18d3fbed3ffd2433f898219576f.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-e0a681902f4f331582670e535a7d1eb3d6eff18d3fbed3ffd2433f898219576f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exeHEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:3236
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:5136
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3428
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:11004
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:5804
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:5504
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:11784
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:13088
-
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\game.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VirtualNES.exeVirtualNES.exe Adventure Island 3.nes5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-7e111ee1fed7c4739c4fd3a8ca32a4d44a6714ee26708449e9312da254747166.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-7e111ee1fed7c4739c4fd3a8ca32a4d44a6714ee26708449e9312da254747166.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 4804⤵
- Program crash
PID:3664
-
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exeHEUR-Trojan-Ransom.Win32.Generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exeHEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\0b1ef4c2-f2de-4270-8962-6183cb1c9d12" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:6944
-
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exe"C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:7340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 20804⤵
- Program crash
PID:5180
-
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exeTrojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 12164⤵
- Program crash
PID:2828
-
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exeTrojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1332
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Encoder.kgw-7bf88c29a699bee4f5820fc4c575bd326845e25523c62db03efa80d253261fab.exeTrojan-Ransom.Win32.Encoder.kgw-7bf88c29a699bee4f5820fc4c575bd326845e25523c62db03efa80d253261fab.exe3⤵PID:5256
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Gen.yjd-931dff77886dfdc1de5850939c4947eb0f84ff73fde56cb5eed8882334865097.exeTrojan-Ransom.Win32.Gen.yjd-931dff77886dfdc1de5850939c4947eb0f84ff73fde56cb5eed8882334865097.exe3⤵PID:5240
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Phpw.zg-dc4c72b5c43cf93b2be3a7b490f54758174fe4af15f9d9d470723079ec8814cb.exeTrojan-Ransom.Win32.Phpw.zg-dc4c72b5c43cf93b2be3a7b490f54758174fe4af15f9d9d470723079ec8814cb.exe3⤵PID:7508
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.PornoAsset.dagf-41761a8269465f9922a9a7a13f159a6c3091433d5891b49c839bcf286c85bafe.exeTrojan-Ransom.Win32.PornoAsset.dagf-41761a8269465f9922a9a7a13f159a6c3091433d5891b49c839bcf286c85bafe.exe3⤵PID:7532
-
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Rector.vju-7b3b61a8297a4e42545649365420ed6782a9b07db2faf991c574a2247652f3e5.exeTrojan-Ransom.Win32.Rector.vju-7b3b61a8297a4e42545649365420ed6782a9b07db2faf991c574a2247652f3e5.exe3⤵PID:6388
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Rector.vju-7b3b61a8297a4e42545649365420ed6782a9b07db2faf991c574a2247652f3e5.exeTrojan-Ransom.Win32.Rector.vju-7b3b61a8297a4e42545649365420ed6782a9b07db2faf991c574a2247652f3e5.exe4⤵PID:5800
-
-
-
C:\Users\Admin\Desktop\00393\VHO-Trojan-Ransom.Win32.Convagent.gen-fd0db123c10a3750ea976ca7fc91a84679f1dda151e756a181b70f033ac33b7d.exeVHO-Trojan-Ransom.Win32.Convagent.gen-fd0db123c10a3750ea976ca7fc91a84679f1dda151e756a181b70f033ac33b7d.exe3⤵PID:5816
-
-
C:\Users\Admin\Desktop\00393\VHO-Trojan-Ransom.Win32.Cryptor.gen-ea08290069cbe60107293e4275d5e1970f178177495bdd433cf50d69c1f4d99b.exeVHO-Trojan-Ransom.Win32.Cryptor.gen-ea08290069cbe60107293e4275d5e1970f178177495bdd433cf50d69c1f4d99b.exe3⤵PID:5456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3160 -ip 31601⤵PID:4220
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x4e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3552 -ip 35521⤵PID:5084
-
\??\c:\windows\system32\calc.exec:\windows\system32\calc.exe1⤵PID:5192
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4172 -ip 41721⤵PID:6600
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Indicator Removal
2File Deletion
2Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-7AC1849B.[telegram_@spacedatax].ROGER
Filesize2.7MB
MD52b2bce9a33b6253520de39e399bdb3c0
SHA136782f7592e36d47a9d2ac3f5bd8b586b86c7a7b
SHA2566526204f3844661aaa8a568218e127eab87e57e83b38c2739e1c64a4f25cdaf4
SHA512b2a6ef89fa076c45acd2983a092c32fabc833ad91368c9a34fecc54714355ca16ff80a4b4ae42313ac82dc2c4ea6627e2b959f65f7669b91c91c5cd8e54d1b67
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
256KB
MD5cb461ebe2ca2c9f6e89b9502abaf648e
SHA16463127b4c9c31e6a0f5a068b6f283a9f03dd5e9
SHA25663741ae44731d285cd1fc499178b64e960e64d7f1445f41ddc76bb5b71bd1899
SHA51273d03931ad368142cdfc3242278373cd2e805b35edacef88a7da41158dedbdf1a2f3a1da327cdcc6358a6d67929cdb07277175890f90eea7ac73db4387e16109
-
Filesize
7KB
MD55790a1ba99f4b7f0831fb01ca63d338a
SHA151e7ca923d496ea365b30c81c1058214d4855e64
SHA2561ddc8308be1a149047cf8cab3ef1efbe6ca9178e832a86d72ac34c577f633514
SHA512a9386f59f053db2bd533a2bf4498c22c5fb245b731ef2471919f831996c32d5de928600a310736e4302a42594f5a97e56e3520ce05a1c400a85c69f7b519ba2c
-
Filesize
1KB
MD5e3b99c2952bf3ba87d2af70d5ce51f30
SHA182973f951aa6208584bf6cb5d0874d4c49ddec71
SHA2562c3bc42104e19657f93ddb265ed370a80330ab21cad4662018e6739971f5bb7a
SHA5129f7427f39fed591aa35d34e3b8d62c74c984ba96ef09a2873e30b16807cbcb11a333912684f49ef6e99327372cb1b99fcd2ae9ddd74b1ef782de374291846b86
-
Filesize
495B
MD59ae0142a83ec040f96ecaba1c16b65e5
SHA1183282d929bddbcaa901756f20de27d0950ef088
SHA2563f11775157365025f50aa1fd8d9e9bf5e566fe1427ac1fd0a196d689652075d9
SHA5120685c8bfb628115c021437a9e3eac77f01c4d593201656025d63110bd9e7f1324e4d25b7de13f85dc2f924847526b0e4f96903450d02e12f6bd01e0fe86dd9b6
-
Filesize
163B
MD552a28809e0a6b6ed3954fb31bccecec1
SHA1cf7fcf02252e449477fc55b1e8b1459c988a90fc
SHA256b20ee28d84754a7b2be177b6142265dd32a2b7aeb37555117c928e4c03edf677
SHA512aa1a87f7953a1c7953ba01e9277765b050c71e27844860e26a16984694d44dcf1187a0309d47b92d7e8ab1d0e8d6514442c5bebde067ceeac35806b6cfc30c44
-
Filesize
156B
MD52cc5ec1bbe2a92a34848a51c11704832
SHA19a2a08a1df224351a6dde1c1bf14bab21f056018
SHA256546bfbecfa8d8cb4a5aa4b59180230667ebd95affeef6f2b9368d0c8908d704e
SHA5129fbe4556942b22f6910e5c058a2f8db4ea1dcea7b44b4b17dee5f72ca1933a11389042f7b9d5a2eb953935edf66e3441f3664e52d35a60e0eef194f889b35088
-
Filesize
185B
MD508b694b9208b5249e0486f0988843d07
SHA17c0ec2c413850f306d2ff0d17733ab3725914178
SHA2561226be6fe6dd71e209cb369cb2f150ec352fc30a4b6affc690e0920bff81bde9
SHA512311f3730ffbd053a91ab22e480b2ba98d9aae9c4932f4405f092d45344a9ef19ac8e5be11fb86cf5b09a07d555278af740d0075a1f0314984094565b2148669a
-
Filesize
2KB
MD53f3b8a712502de3e35f49351048a25d0
SHA18e02ee34acacfae1088892e5993802861079e3ca
SHA256c9c3a54ad3cb6e2b28acccb8f93d9e1d35f91c7860a11a48800119cf2a93b659
SHA512e7cac7427f384c28dbc89ad9551e89c4043dc77040bea4d6de990bf52ea245b35fa4e9dad252e73757689c4838f7a29e86b0e75618c989bfcde1492882d32e63
-
Filesize
2KB
MD53c9f6a28f7171845ed57d00d6a62abd4
SHA1947d18112bfb801dc3cd48ebb6979dd6856a2594
SHA256ede4768f9552741d3f58f73346b06df84a191567104fcbfc4bf87210573b05ff
SHA512984c301b843c7701819ea3030039da5dbde63d55765f6052d5fdf5c2caa178601bb2193dde87d9028c51d504f21de5ebe044ebf7cc6c06600a23596ea56d1dab
-
Filesize
2KB
MD54a7a75434136c74671b876215aafc5f3
SHA12cd9d9557a6a6f6ece0106bc42bde9480eb8a5df
SHA256fa7793ea2b2f18d9f721d47fd26ec2a9badd06bcef1abcc46b4ade0b9f1d5f66
SHA51231bb9b54414a4014ef423cb7915e287a4a774d1d34bae2a7361e89cce17aff9e30199cf953f0f8a2e2f180915a2421f73b4534a77462271442841eb6e5bd86e0
-
Filesize
48KB
MD53ccb04331a9d9261f0d333093962ea28
SHA18803fc291c82058a55d68965c229e67dd24a53dc
SHA256ce87248a960bbd8c35f1d3f3a7db8220083eb537ebbc58f8cc9148f2ce696be3
SHA512dc0996b2b796ca25dfcb498bd1f5f54c608e830e355caa2558906bcb02c736c0e0c8d0ae61feae9697d1ea4d7498398d21a1e867e2ba6652f2a6540e41c2a7ed
-
Filesize
3KB
MD5823cd2ae1e4ac8ac2bb280f9ccad3d25
SHA12dc730c94410997b8c57474310d480bf27deef50
SHA2567efcfd0fa6b595ac370b14a24a7fa34b7f72b1ad491fbb72a1ea67134e79718d
SHA512e2746df27a86d9bca332daa9630161f8f3b76a9c33c48a87af9523f880bb35d81911eb1e63f383c68d79c977dc4c97ac9807dcd7f12ed6dbe4d4d7f51ea78b62
-
Filesize
7KB
MD5e95ea10b40e1c449685a42e26aa791e6
SHA1bdffbd986f7a13c76f81c2940cced5d85983a5f7
SHA2560c4b75d10a823a89c45db705048c84920464115c0619608aea873ad512f34a45
SHA5124793e154e13425650699ba6ddd0dc94309a230bc2793360c44751199edf601e480aa6ec52a9de57e792cd187b2af69f9f06f0961336126f402fd22137c6b75a8
-
Filesize
36KB
MD5de4fb5fd5521d596fcf39dc22608c544
SHA169449d49823d8ffd90559bc2df79839719ca5a21
SHA2569838e3207d227d71b3eb13317ae19ada6a1f487fbc1283c00b9ea570d33a4bc7
SHA512a88ba8fc6ab22f7a266a84370c18ed96108ff0734bd29b4a6d0081065f4c72f5530c41329bbee0ee50a8c350a892536d26d1ca3f76de76fdc4b8abd3d7983f82
-
Filesize
72KB
MD52c8aea8253301911c5d3972fdbe253b9
SHA1baac1a411ddc736392feefad97903f0cafa44f00
SHA2567a3f0ac7aa2b277de15eb935162c0ef096c157468e79c42ce94736289c7a7c39
SHA5121decde58f5bdd4a9a4b0b910283a2968c586e6ee7a8f759eb93eb0915323b5c1c48bf7c380e275c34f7df28c30ee8588d94db16d98b8d8fe93d600343156b67d
-
Filesize
9KB
MD50d2170d18c07b87b9d471c99b454c7d0
SHA16648b10cbb22426d1a27627dc6314ed764c84160
SHA256fb319571e7e12fdbbd9dabb5dd8460ab18f0dfc6a98ccc403f4eeb750240bb6e
SHA512a39a2b031fc2ee76386320b8126ee8e463a125fc854cee48c5e46229ba91e37031fe286a493fd33cba88ecf8c4efbead54258d538891ba257cab4862268c5e8a
-
Filesize
744KB
MD5f9c7c80681ac40d1836c8ec1bf59dc24
SHA125fa98ae13be80b9f7c996b10adbca9232a73b92
SHA2568039687a5274b46763677deb477d00b22466824d93d52db1306efaf05aa80f20
SHA512cc4e0a68b3a29a2fb9b9c29a5bf1aca6fc85684ff5b5b83dd2fcaebe02863b6eb47891d0b817721ebe9c0c2e896bb008da663d7a0401604e75a256d4f176309a
-
Filesize
37B
MD552280031a0d63a26de344b293a64ace3
SHA1c9a33575c01b7904f5bab228d0597da4fe5c4ef6
SHA256fb1c1bb62f5f11824c306bc6d70798ed4c73b954e9d898e73e422c6fd86c3adb
SHA512c5a3cc523c8657dd274296c4d0573d69d0d3a44ccc283677074626818dbc09b6551d5f577a65c9fe61c99485c27af1a694860ba2305f7c4bd415e9377de56a26
-
Filesize
16KB
MD56ab94fff31e28752ff225f5c83bb2123
SHA17d2b9fde60fd026156eb2a646408773d33faef3c
SHA25661c192e6d7e5067217c3fc16d818a8410d30a85be2f358b2b3add28767eced00
SHA5129bde2127ddc3d75db8a221459fca7dac569bbb106b6b6ac28943e138a36001d415d9b25d2959b33e43968489a3ec12e1d6500ea47ca27c483fea58965af72348
-
Filesize
16KB
MD5028e5eb1baaf933e011207339d409d71
SHA1c3060c985a0f3a2c929f34ff127c4183b32bc2f5
SHA256d9dd572fe8c864bcb39112e8c856d20cd2c7d99756dcbde240d4832759dc93cf
SHA5124fea2162260881446bed4aba492ff2415301ec0213bb492db426b6f11b905a93c67ca566f10640c9a0412c8d5fce06e3351d8d5aefeac8a6c4020a6725bee967
-
Filesize
16KB
MD5ecbdd402bd08435285064c0639086551
SHA10095d824084f3be410505fadc7156355ecd4816f
SHA25687cde38f8c6f640f596e87e50a99193ecae0477f40311d83e0f152ed6bb0de25
SHA5126b2dea67fe103d93bc8f3f1ca4503843053e1ebdc328b80bf37604426b84c262403bc04fad159acdcf6da02bfc3af65d9468b0aa64c5e605f799f200b67fa949
-
Filesize
16KB
MD570a0d4bd4bc1d9766d4faed9f0fb12b1
SHA1f88e7e5f5c7c994062a5421f3bac4d1e1b87ef99
SHA2562a8bd388bdd56c123c137ce6ff65f3d16d930834052ecba0b7eba1f3b68da110
SHA512bff6431257772f45bdba7da80bd2a15a2e5a95121efffeafbed4ff93854d87bcec331f8f00b4f2861f2294a574441ca370de8cf8d07d780b093998ae8a4f09e1
-
Filesize
24KB
MD52965c0074004097bbe93842fcf6e2357
SHA14a53d7947eff5de82e3a4361cce3c9664784333e
SHA2561920931d425b51e04d02f66176e4de70d288c75a08426a8c8e9f4adbf5b8e444
SHA512826d6806834fd0cf87aaab0042c620715d47497a50ef4ef83b253add20ad6726c312c2872c06591ac184728ff2c617673364cbea9cf7f3747364a22596bb59b5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
69KB
MD5324f1dcce63f31ba271f261543bbf569
SHA19fea99622314abd49b677acb0633741ecc763209
SHA25661b3200767b96493a4101dbc9966519b95d14fcafb66d239c3a9409cc3f8c59d
SHA512da4ca9616573cc59521417600a7c0fe1bba1a84a349dae1470b0a2057411236a3d03f4b19fbf357f3aa29a509c8ece584d86b0ae2c5484a0e2100865276f09fa
-
Filesize
7KB
MD566cd43b11eb7385dbcf1ced416035e12
SHA1687097f01e3c65f7af833433fe7854ca10e7496b
SHA256f74624be00c9993f17013e3d89ee0861763a9f13b7c41e4d625d0d31767a3552
SHA5121f0b8693ea2b3d68f3617e01fd1d5bd600b740457e4c5891517d5958679c29b5c122a958a1e032c5bdff925b4696754b2fd5f167085c4f5c63bd346461cc235b
-
Filesize
81KB
MD5b97396afcff7eb4f14746e804802b968
SHA1415796a87bb2ae7c1c3d084872c05f6f6f6b8a02
SHA256472690fec1ad6b6542cc7397fb8b8c99da8acf41b2a85527926c13ce40875785
SHA512c9cfdef4f6d23477e08e797b05f5e45b737195bc61d13404689819697ba5150c5f2416670fb035a07ca37c4b6fc849c9c5f96fb632430a9bf6fc1ee7071d363c
-
Filesize
8KB
MD5e894240462464601fa70efd347dd8ec4
SHA1b2f33083e004552ea65d8aef21f204b1bede95b7
SHA256b06e0287485743915973e8f2c613a3374a8ef269fdd6cedbbbc7c51c93b8c31e
SHA512b037d0529c98527526ecad2add333f2ef566b91a1c9a06e46b86e15fe830d4504b873d5d9337cb560ef6765c59099022ad441959b32198a492c96a66c2aab0e4
-
Filesize
72KB
MD5cf424dd2eeb5e11885fc835447703a87
SHA19c38f63027d2b65a4c51d9fbfbcb338e3cf1168a
SHA2563dbe6c9df5a248a339f4e3905d8166ccdb14a4189580ebd575a8adb6e9ed41b8
SHA512bc664e447f536d0695ea2f8c9e9bae56f9b5bee5249b0f4f5a100d455e0dd3ced0fab5dfde1f81c3ea2a0f06a604ed190f7c89162fa3f18bc9587f6a96013726
-
Filesize
2KB
MD5719b78b93398493eaa400fcaa020b6ba
SHA120a53fe647f8af72cbbcabf7ee61c23ef411504e
SHA256b8ad46d1518283273af57e513efdd282948db43be3df9aa269afe07bd8c10ac1
SHA51219aca20b53bc9cf72dae20375d5434800ae35e2c174c816d7bd76b2c7ee599a432d5aa31002fb238f9d56fea3e6ad54e276fb9fd68e718b2305d076913dcd13a
-
Filesize
16B
MD5cabbd6e4945771eb211ea3b4704c3b46
SHA13d1ccf3ed2e7165c52e9d50679f340445051ee68
SHA256161721f9e825da030de98130a7267418b7fc7fb2f0aadae7dc0c9b25a8bed7e3
SHA512fd8a43967b028f9fcbc94cd8072ca4cec1c32e9e5e0816d789e2158e4ed62d907b9b269cf098141fb5c681880e931bc011cb9e1439beff90505945904756f11c
-
Filesize
30.6MB
MD51621135ac03ec0f180d778e0660f8e67
SHA194c946b8b35e8e7d2415389a682536d45f8f8c20
SHA256f7a4780d710f7b4efca968eca506ba992d383f04d881bee8b97fc66579be7154
SHA51206edc845e6d362ca66ab9bd28763da34ce83d538c131ba0f3e4f45b2edb046572f20dc3a9e0f249b09fdafaf754948e3bd45be005a9c778e0c84e56073f559e8
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.MSIL.Blocker.gen-309d2137aeb704f62360370cadceb1812d81790f23399ca9f229e88d94971fb6.exe
Filesize29.8MB
MD52ec04fe14b2eedc4892fa22510e9ca86
SHA1db78e8932611fba70fb0467c89be6ff451850709
SHA256309d2137aeb704f62360370cadceb1812d81790f23399ca9f229e88d94971fb6
SHA512a5a8aea88575ece2f8765dcfc08c82e42a3ea0a7b52136b60cd6bb533634efa5be431fadcbdd455a8dbe1c2d73074199ca3a7ad48302bcae1bcc185d983f6079
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.MSIL.Encoder.gen-e0a681902f4f331582670e535a7d1eb3d6eff18d3fbed3ffd2433f898219576f.exe
Filesize121KB
MD549d9d587a88074016a2042bdb42b9441
SHA15659837b54f1c48318025051c8541aa915b80aac
SHA256e0a681902f4f331582670e535a7d1eb3d6eff18d3fbed3ffd2433f898219576f
SHA512ad8a1f71eeea4dea8073886563191bce9aff27a5c0f28e1f23362787f8a759635996a0434d73792351f30bcbfbe17c455aa4774ff366cc6a79e18c7fc7e3c65d
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.MSIL.Gen.gen-f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499.exe
Filesize720KB
MD505225e6bf88496f42871145c68a56b76
SHA1342bda75db80a8ca5b915612944a417f562792e2
SHA256f3645997b7c66390311eec5630208e5a4e9df7cc6e8cc6b0ecbd988605eef499
SHA5123f6bc3b746c1b00d1a279249dff82c07c63a30cd8a8abd1ab4d06742d7edbf6b7c875cb9e5ba2a48f64358b96a900d3467023a77f8eaa0f35cf328d256f759f4
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Blocker.pef-240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404.exe
Filesize72KB
MD56e2f1bf0fb99dd0d683f8e9b54bff2d3
SHA133d1451d30864dc3bd7332a05d808263e346a7b1
SHA256240e1573bc56a760ce9e5ba36c43e94d573c464ac3ce50b4400a1d4ba43f2404
SHA512d43ac718ebaf32864f01c0b2485b12b63c8a444ee969afd97273585372f03b33aefd1bae52cf402d25446c3f5f27652df6f75a863356e2c0e116e745988cd82a
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Crypren.gen-87be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19.exe
Filesize180KB
MD5ea59aebcc5588a41fdb9929349bf74af
SHA1ddb409120441833252210b193785a15fbd381c5e
SHA25687be242c76c959d2f30288245e2221856f667d918a306b100046f9264146dc19
SHA51267e9c412db7c7aac590312f6407b1a7f6dac697b0325aed5c8501d033d8b866aa839c9720e60f38a85e409f8d99857004e615e91e04dca919919aaf35ac52232
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Encoder.gen-b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4.exe
Filesize976KB
MD5f3699b7b1bab29788fa470cd38c4c70e
SHA1563eb07031dd1d697d6ff932904c0930ca6ce5f9
SHA256b5941db3b04e8ddfbc5b8f52a12862e8203a54eda666b6ad685b566b0b1faba4
SHA512eb30d1d66788681d7d2bad7af50c0695460e6571a99c023d2424cfd5410de7ab7fda386d2551bb2314c0abebcc97a0b084345db7ab01077558deaf861a8180c2
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-7e111ee1fed7c4739c4fd3a8ca32a4d44a6714ee26708449e9312da254747166.exe
Filesize321KB
MD50bd62253820fab9473c9ca96d17c3bf8
SHA19605fd973b67fba2cbc71a044eb14fa95d1b481e
SHA2567e111ee1fed7c4739c4fd3a8ca32a4d44a6714ee26708449e9312da254747166
SHA512e8a307c20a5120feaedb35a68ad3d3e42544ec078e50cc465c2d46a737cf511f38a6af28d3d52ca7dc9805a0c010d1d4b463e5b55ea9de1280f137ad3904a457
-
C:\Users\Admin\Desktop\00393\HEUR-Trojan-Ransom.Win32.Stop.gen-65b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008.exe
Filesize687KB
MD57cfc5575759906a2de75c972578d9204
SHA1b911a17da3c8ce87fdc3bc1c2caca9d3439b7202
SHA25665b988f2abe4047f8940e2e98131e8d9b7eda217afca673ed99fd9adb6ab1008
SHA512a21cb93ed920a7bfd8d860e0ef93cfab7bc3079c69d095b15affc75e636823e94c163dd0c3981dc48ac5d13b0161ff87794853ecbca6ed59bea2889d8d9c0540
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Blocker.mqac-e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318.exe
Filesize5.0MB
MD5b5d58a934ba2c208dcfce8c7e1b50591
SHA1b62934882c9b19519cc74fc713f59b3eb8977a75
SHA256e39883848200cdeaadf1630d957ee7604f42828de65d754379d186767cc96318
SHA51282a347b9db4a7300a4af43455171fd15e6a6c4afd255f1de05bad308a4957595dd805bdf42d81be5d99ae62ab126957824dd682c4e0b8fa6e7ef238fc9f79d1a
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Cryptor.drf-3ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d.exe
Filesize2.2MB
MD520e58b35ab2282c5862c3cc33c467943
SHA18fb41048f0195abd4a65fdfcec6b40639a80e113
SHA2563ec819dfd426552acf4f0aa813135aec8a53a6f9d0883cd91de949990a18128d
SHA5123e4469d3ed20705dcbd1ed4b0059ca54dcb68f9d93a37cd0e37223bc83ba1ebf764c65c7dce8aa397188fdaa58cd39d40624d3aa94e54aa3b8c424b71aaf5dcc
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Encoder.kgw-7bf88c29a699bee4f5820fc4c575bd326845e25523c62db03efa80d253261fab.exe
Filesize2.9MB
MD55f8ba9ef3c2d07bbf28b0f280635e78f
SHA136322b3ecc6b1dc9330d25a1c30239ab1962fa99
SHA2567bf88c29a699bee4f5820fc4c575bd326845e25523c62db03efa80d253261fab
SHA5126a89ab4f375760bb29a00bc0ba6226f0f1bac744a0f8a5c3091ceb83bb29a1b722c7b0bff2cd4ad06267fc74bbf1e750a003d6a108a7ad48b89ea7a3bc29e772
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Gen.yjd-931dff77886dfdc1de5850939c4947eb0f84ff73fde56cb5eed8882334865097.exe
Filesize368KB
MD5164ad812a317942673055724eb89d2b6
SHA1bf639ce74a8b6127464acc48b976d8c3790cc41a
SHA256931dff77886dfdc1de5850939c4947eb0f84ff73fde56cb5eed8882334865097
SHA51283e8e46a4230ec447bb5122041dda2507f639bbb9a8f76bd6a517a4a2a191cc4df72be78dc6d0be93af836367659ff665c6f55fd9d0b7a5c7f103a96aa0f3e78
-
C:\Users\Admin\Desktop\00393\Trojan-Ransom.Win32.Phpw.zg-dc4c72b5c43cf93b2be3a7b490f54758174fe4af15f9d9d470723079ec8814cb.exe
Filesize2.0MB
MD51926454ee445dd6ac13e611f6e3f7741
SHA1e11aaca3123dc4fb63c5397bd8af76f2cd97e3e8
SHA256dc4c72b5c43cf93b2be3a7b490f54758174fe4af15f9d9d470723079ec8814cb
SHA512b196ba643c5d01ef64373f621de97fedf9cd42aa585efac36910c283bc0eb4f3b1226931361c0cc55a9dc6b52ecdc7236f97590dfcebf252dec8078d8353201d
-
\??\c:\users\admin\desktop\00393\heur-trojan-ransom.win32.generic-1164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074.exe
Filesize3.7MB
MD5c7f78e8eedb4e98f60438d8b3539caf0
SHA11d2ddfba9f6c23a2c25b848b757898547cd84ae7
SHA2561164f88212d87ff034707797c82c6d59a9f17f72bb641cf7dc83771e2c599074
SHA5121f8b943627e177ab32efe813f01a175c73576045f5942755e61611d71a22c618f7ae37d54bfddccc006820655f6a789bd7459b4d6ca5938a0f699edbed17ad2d