Analysis
-
max time kernel
130s -
max time network
388s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00375.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00375.7z
-
Size
40.8MB
-
MD5
b9cb855d8759e858e4c7267043774061
-
SHA1
b08bf37327071e56097f20d9e20820bd08a1d06c
-
SHA256
184d8f3a951d0a05dc121e7fe26c18edef88b710465f500c08eceefbf4600a80
-
SHA512
67f17a2ec8166849c2eb14331d76d226ee1b18f38dfdd1910551f7a4f5e01489cc2c7a2900990aaa55a5fc114d86845d19ff17209ebfe061b22f325dd2050b3f
-
SSDEEP
786432:/ZmXo4mvRp5JhfkurS0EIrGosbXA9gdOwwJmTHU1EGInRa9:4yzzI0NYj6Cz2GHWEGIn49
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
A1234567X
Extracted
crimsonrat
216.176.190.98
Extracted
systembc
146.0.75.34:4083
-
dns
5.132.191.104
92.163.33.248
206.189.120.27
Extracted
azorult
http://hyuifrfrfy.temp.swtest.ru/index.php
Extracted
F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\PKXIUTMLZ-DECRYPT.txt
http://gandcrabmfe6mnef.onion/903c55d7ccdfd7b2
Extracted
C:\Program Files\7-Zip\Lang\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
CrimsonRAT main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023c02-160.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Crimsonrat family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe -
Systembc family
-
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 12192 wevtutil.exe 7452 wevtutil.exe 4176 wevtutil.exe -
Contacts a large (3335) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe -
Renames multiple (334) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (519) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Clears Network RDP Connection History and Configurations 1 TTPs 4 IoCs
Remove evidence of malicious network connections to clean up operations traces.
pid Process 2120 cmd.exe 10792 reg.exe 7952 cmd.exe 11484 reg.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 11 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\PKXIUTMLZ-DECRYPT.txt HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\ccdfd05fccdfd7bf6c.lock HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\info.hta taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 29 IoCs
pid Process 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 2592 HEUR-Trojan-Ransom.MSIL.Foreign.gen-ff4c5f6a1a5b68b956970751d56ee7905ec48ad39cc05416ee8ee958ecd0c40e.exe 1600 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe 832 HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe 1528 HEUR-Trojan-Ransom.Win32.Blocker.gen-defa67780ca672a33df0f9b81634a2dd03877e1761ded62985800dcd24fbbec6.exe 2496 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 1240 HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe 1696 Build.exe 400 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe 7780 HEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exe 920 HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe 2640 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe 6660 HEUR-Trojan-Ransom.Win32.Shade.vho-a0d4700887c4093807fb98f2dd415aae6d2b81798d322961576ebbd1335365c2.exe 3960 Trojan-Ransom.MSIL.Blocker.bl-269662d5d2d7522fa2b88be8de2a3540e1443fba1a9d6c8139177a3a5a78bd2d.exe 5236 Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe 3640 Trojan-Ransom.Win32.Bitman.aewz-ef7f38b6083f22d04a2c5787a5d7a784e891d9cc329ed046ad5ad128ca1e5042.exe 8560 Trojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exe 6704 Trojan-Ransom.Win32.Blocker.mbys-25748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b.exe 3936 winsvcin32.exe 9144 dbxw.exe 8376 Build.exe 9880 Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe 11060 Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 8764 Trojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe 11956 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe 8672 Trojan-Ransom.Win32.Crypmod.acmi-2bf305e40252953154a29d0887a6703973a4523a77ed89de6b8803f5dd360f57.exe 12812 Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 12444 Trojan-Ransom.Win32.Crypmodadv.xzh-eb4c891dca0ae8172da731f80cd9576c191f964e27c075142ce6ee371690ec5f.exe 9440 Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe -
Loads dropped DLL 1 IoCs
pid Process 11640 explorer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0016000000023c3e-8905.dat vmprotect behavioral1/memory/6704-8907-0x0000000000400000-0x00000000005E4000-memory.dmp vmprotect behavioral1/memory/6704-9188-0x0000000000400000-0x00000000005E4000-memory.dmp vmprotect behavioral1/memory/6704-17217-0x0000000000400000-0x00000000005E4000-memory.dmp vmprotect behavioral1/memory/6704-20450-0x0000000000400000-0x00000000005E4000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer Svc = "C:\\Windows\\V49050494020\\winsvcin32.exe" HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe" Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe = "C:\\Windows\\System32\\HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe" HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer Svc = "C:\\Windows\\V49050494020\\winsvcin32.exe" HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\Libraries\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\Documents\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\Pictures\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Music\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Public\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Videos\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Links\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini Trojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe -
Enumerates connected drives 3 TTPs 50 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\D: Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\F: Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 icanhazip.com 70 geoiptool.com -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe File created C:\Windows\System32\Info.hta HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Windows\System32\HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1844 set thread context of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1600 set thread context of 11956 1600 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe 151 PID 11060 set thread context of 12812 11060 Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 167 PID 9880 set thread context of 9440 9880 Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe 173 -
resource yara_rule behavioral1/files/0x0008000000023c48-19093.dat upx behavioral1/memory/11060-19134-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/11060-23473-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/11060-26343-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Date.targetsize-24_contrast-black.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-si\ui-strings.js HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\In.ps1 HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-sysinfo-l1-1-0.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LEVEL\THMBNAIL.PNG.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_hr.json HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\goopdateres_ur.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\WideTile.scale-200.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ppd.xrm-ms.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-processenvironment-l1-1-0.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\PresentationFramework.resources.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-white_targetsize-20.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\Microsoft.PackageManagement.resources.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Office 2007 - 2010.eftx.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ONINTL.DLL.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libdirectory_demux_plugin.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\nl-nl\ui-strings.js.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTest-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_KMS_Client-ppd.xrm-ms.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-100.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-80_altform-unplated_contrast-black.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-96.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-32.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcvdsub_plugin.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-30_altform-unplated_contrast-white.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-80.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\MSFT_PackageManagement.strings.psd1.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\SmallLogo.scale-125_contrast-black.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filterselected-focus_32.svg.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\osfsharedimm.dll HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-125_contrast-white.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\ui-strings.js.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-ppd.xrm-ms.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ppd.xrm-ms.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\WINGDNG3.TTF HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.MemoryMappedFiles.dll HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.scale-200.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-multibyte-l1-1-0.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\combinepdf-tool-view.js.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-pl.xrm-ms.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.Emit.dll HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\UIAutomationClientSideProviders.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ja-jp\ui-strings.js.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_CA\List.txt.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\MSFT_PackageManagementSource.schema.mfl.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OutlookAccount.scale-100.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsWideTile.scale-100.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_selected_18.svg HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-left.gif HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME.txt.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Forms.resources.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteWideTile.scale-150.png HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Grace-ul-oob.xrm-ms.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\uk-ua\ui-strings.js.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\Java\jre-1.8\bin\sunec.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_CN.properties.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Principal.Windows.dll.id-CCDFD7B2.[[email protected]].bot HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\V49050494020\winsvcin32.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe File opened for modification C:\Windows\V49050494020 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe File created C:\Windows\Tasks\dbxw.job HEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exe File opened for modification C:\Windows\Tasks\dbxw.job HEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exe File created C:\Windows\V49050494020\winsvcin32.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 12724 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 8572 1528 WerFault.exe 111 13076 400 WerFault.exe 115 9008 1528 WerFault.exe 111 11196 8672 WerFault.exe 158 5600 11084 WerFault.exe 257 7388 6660 WerFault.exe 123 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.acmi-2bf305e40252953154a29d0887a6703973a4523a77ed89de6b8803f5dd360f57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.MSIL.Blocker.bl-269662d5d2d7522fa2b88be8de2a3540e1443fba1a9d6c8139177a3a5a78bd2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-defa67780ca672a33df0f9b81634a2dd03877e1761ded62985800dcd24fbbec6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.aewz-ef7f38b6083f22d04a2c5787a5d7a784e891d9cc329ed046ad5ad128ca1e5042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Foreign.gen-ff4c5f6a1a5b68b956970751d56ee7905ec48ad39cc05416ee8ee958ecd0c40e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mbys-25748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmodadv.xzh-eb4c891dca0ae8172da731f80cd9576c191f964e27c075142ce6ee371690ec5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.vho-a0d4700887c4093807fb98f2dd415aae6d2b81798d322961576ebbd1335365c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsvcin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 14832 PING.EXE 3756 cmd.exe 10856 PING.EXE 1944 PING.EXE 6452 cmd.exe 10976 PING.EXE 14948 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe -
Interacts with shadow copies 3 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 12136 vssadmin.exe 7176 vssadmin.exe 4492 vssadmin.exe 7568 vssadmin.exe -
Modifies registry class 25 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}\InprocServer32\ = "..\\Program Files\\Common Files\\System\\OverlayIcon.dll" Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40} Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}\InprocServer32 Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{1D979371-AE61-4957-BC58-9E3A9D7B73A5} explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D6E9E7B-57C4-4080-AAAE-5DC03C45B9D7}\InProcServer32 Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}\InprocServer32 Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D6E9E7B-57C4-4080-AAAE-5DC03C45B9D7} Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}\InprocServer32 Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}\InprocServer32\ = "..\\Program Files\\Common Files\\System\\OverlayIcon.dll" Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{B667312A-154A-4E3C-8365-9A9BC5BD4C8F} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D6E9E7B-57C4-4080-AAAE-5DC03C45B9D7}\InProcServer32\ = "..\\Program Files\\Common Files\\System\\safemonn64.dll" Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40} Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0280f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 5c000000010000000400000000080000190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba9531400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b0b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0282000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 4 IoCs
pid Process 10856 PING.EXE 1944 PING.EXE 10976 PING.EXE 14832 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 532 7zFM.exe 4116 taskmgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1240 HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeRestorePrivilege 532 7zFM.exe Token: 35 532 7zFM.exe Token: SeSecurityPrivilege 532 7zFM.exe Token: SeSecurityPrivilege 532 7zFM.exe Token: SeDebugPrivilege 3936 taskmgr.exe Token: SeSystemProfilePrivilege 3936 taskmgr.exe Token: SeCreateGlobalPrivilege 3936 taskmgr.exe Token: SeDebugPrivilege 4116 taskmgr.exe Token: SeSystemProfilePrivilege 4116 taskmgr.exe Token: SeCreateGlobalPrivilege 4116 taskmgr.exe Token: 33 3936 taskmgr.exe Token: SeIncBasePriorityPrivilege 3936 taskmgr.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeDebugPrivilege 920 HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe Token: SeBackupPrivilege 6936 vssvc.exe Token: SeRestorePrivilege 6936 vssvc.exe Token: SeAuditPrivilege 6936 vssvc.exe Token: SeDebugPrivilege 6704 Trojan-Ransom.Win32.Blocker.mbys-25748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b.exe Token: SeDebugPrivilege 1600 HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe Token: SeShutdownPrivilege 11640 explorer.exe Token: SeCreatePagefilePrivilege 11640 explorer.exe Token: SeShutdownPrivilege 11640 explorer.exe Token: SeCreatePagefilePrivilege 11640 explorer.exe Token: SeShutdownPrivilege 11640 explorer.exe Token: SeCreatePagefilePrivilege 11640 explorer.exe Token: SeShutdownPrivilege 11640 explorer.exe Token: SeCreatePagefilePrivilege 11640 explorer.exe Token: SeShutdownPrivilege 11640 explorer.exe Token: SeCreatePagefilePrivilege 11640 explorer.exe Token: SeShutdownPrivilege 11640 explorer.exe Token: SeCreatePagefilePrivilege 11640 explorer.exe Token: SeShutdownPrivilege 7840 explorer.exe Token: SeCreatePagefilePrivilege 7840 explorer.exe Token: SeShutdownPrivilege 7840 explorer.exe Token: SeCreatePagefilePrivilege 7840 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 532 7zFM.exe 532 7zFM.exe 532 7zFM.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 3936 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 9880 Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4116 3936 taskmgr.exe 99 PID 3936 wrote to memory of 4116 3936 taskmgr.exe 99 PID 4976 wrote to memory of 2976 4976 powershell.exe 105 PID 4976 wrote to memory of 2976 4976 powershell.exe 105 PID 2976 wrote to memory of 1844 2976 cmd.exe 107 PID 2976 wrote to memory of 1844 2976 cmd.exe 107 PID 2976 wrote to memory of 1844 2976 cmd.exe 107 PID 2976 wrote to memory of 2592 2976 cmd.exe 108 PID 2976 wrote to memory of 2592 2976 cmd.exe 108 PID 2976 wrote to memory of 2592 2976 cmd.exe 108 PID 2976 wrote to memory of 1600 2976 cmd.exe 109 PID 2976 wrote to memory of 1600 2976 cmd.exe 109 PID 2976 wrote to memory of 1600 2976 cmd.exe 109 PID 2976 wrote to memory of 832 2976 cmd.exe 110 PID 2976 wrote to memory of 832 2976 cmd.exe 110 PID 2976 wrote to memory of 832 2976 cmd.exe 110 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 2976 wrote to memory of 1528 2976 cmd.exe 111 PID 2976 wrote to memory of 1528 2976 cmd.exe 111 PID 2976 wrote to memory of 1528 2976 cmd.exe 111 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 1844 wrote to memory of 2496 1844 HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe 112 PID 2976 wrote to memory of 1240 2976 cmd.exe 113 PID 2976 wrote to memory of 1240 2976 cmd.exe 113 PID 2976 wrote to memory of 1240 2976 cmd.exe 113 PID 832 wrote to memory of 1696 832 HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe 114 PID 832 wrote to memory of 1696 832 HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe 114 PID 832 wrote to memory of 1696 832 HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe 114 PID 2976 wrote to memory of 400 2976 cmd.exe 211 PID 2976 wrote to memory of 400 2976 cmd.exe 211 PID 2976 wrote to memory of 400 2976 cmd.exe 211 PID 1240 wrote to memory of 1228 1240 HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe 116 PID 1240 wrote to memory of 1228 1240 HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe 116 PID 2976 wrote to memory of 7780 2976 cmd.exe 118 PID 2976 wrote to memory of 7780 2976 cmd.exe 118 PID 2976 wrote to memory of 7780 2976 cmd.exe 118 PID 1228 wrote to memory of 6412 1228 cmd.exe 119 PID 1228 wrote to memory of 6412 1228 cmd.exe 119 PID 2976 wrote to memory of 920 2976 cmd.exe 120 PID 2976 wrote to memory of 920 2976 cmd.exe 120 PID 2976 wrote to memory of 920 2976 cmd.exe 120 PID 2976 wrote to memory of 2640 2976 cmd.exe 122 PID 2976 wrote to memory of 2640 2976 cmd.exe 122 PID 2976 wrote to memory of 2640 2976 cmd.exe 122 PID 2976 wrote to memory of 6660 2976 cmd.exe 123 PID 2976 wrote to memory of 6660 2976 cmd.exe 123 PID 2976 wrote to memory of 6660 2976 cmd.exe 123 PID 2976 wrote to memory of 3960 2976 cmd.exe 124 PID 2976 wrote to memory of 3960 2976 cmd.exe 124 PID 2976 wrote to memory of 3960 2976 cmd.exe 124 PID 1228 wrote to memory of 7176 1228 cmd.exe 125 PID 1228 wrote to memory of 7176 1228 cmd.exe 125 PID 2976 wrote to memory of 5236 2976 cmd.exe 126 PID 2976 wrote to memory of 5236 2976 cmd.exe 126 PID 2976 wrote to memory of 5236 2976 cmd.exe 126 PID 920 wrote to memory of 6928 920 HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe 128 PID 920 wrote to memory of 6928 920 HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe 128 PID 920 wrote to memory of 6928 920 HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe 128 PID 2976 wrote to memory of 3640 2976 cmd.exe 129 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 9184 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00375.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:532
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Foreign.gen-ff4c5f6a1a5b68b956970751d56ee7905ec48ad39cc05416ee8ee958ecd0c40e.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-ff4c5f6a1a5b68b956970751d56ee7905ec48ad39cc05416ee8ee958ecd0c40e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe"HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:11956 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵PID:9188
-
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exeHEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Blocker.gen-defa67780ca672a33df0f9b81634a2dd03877e1761ded62985800dcd24fbbec6.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-defa67780ca672a33df0f9b81634a2dd03877e1761ded62985800dcd24fbbec6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 89884⤵
- Program crash
PID:8572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 89884⤵
- Program crash
PID:9008
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exeHEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\mode.commode con cp select=12515⤵PID:6412
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:7176
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:9392
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:6552
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:4492
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:8332
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:6768
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\V49050494020\winsvcin32.exeC:\Windows\V49050494020\winsvcin32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 4524⤵
- Program crash
PID:13076
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exeHEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7780
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exeHEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\Desktop\00375\HEB2EA~1.EXE4⤵PID:6928
-
-
C:\Windows\SysWOW64\cmd.exe/a /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3756 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10856
-
-
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Shade.vho-a0d4700887c4093807fb98f2dd415aae6d2b81798d322961576ebbd1335365c2.exeHEUR-Trojan-Ransom.Win32.Shade.vho-a0d4700887c4093807fb98f2dd415aae6d2b81798d322961576ebbd1335365c2.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6660 -s 13404⤵
- Program crash
PID:7388
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.MSIL.Blocker.bl-269662d5d2d7522fa2b88be8de2a3540e1443fba1a9d6c8139177a3a5a78bd2d.exeTrojan-Ransom.MSIL.Blocker.bl-269662d5d2d7522fa2b88be8de2a3540e1443fba1a9d6c8139177a3a5a78bd2d.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Users\Admin\AppData\Roaming\Google Auto Updater.exe"C:\Users\Admin\AppData\Roaming\Google Auto Updater.exe"4⤵PID:10916
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exeTrojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5236 -
C:\windows\explorer.exe"C:\windows\explorer.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:11640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00375\unit.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:8840 -
C:\Windows\SysWOW64\PING.EXEping -n 0.5 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1944
-
-
C:\Windows\SysWOW64\net.exenet user administrator /active:yes5⤵
- System Location Discovery: System Language Discovery
PID:13024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user administrator /active:yes6⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Bitman.aewz-ef7f38b6083f22d04a2c5787a5d7a784e891d9cc329ed046ad5ad128ca1e5042.exeTrojan-Ransom.Win32.Bitman.aewz-ef7f38b6083f22d04a2c5787a5d7a784e891d9cc329ed046ad5ad128ca1e5042.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exeTrojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:8560 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Build.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8376
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Blocker.mbys-25748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b.exeTrojan-Ransom.Win32.Blocker.mbys-25748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6704
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exeTrojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:9880 -
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exeC:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:9440 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:10800
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:8932
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:7568
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:5896
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:12328
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:12136
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:5908
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:5116
-
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exeTrojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:11060 -
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exeC:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe4⤵
- Executes dropped EXE
PID:12812
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exeTrojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8764 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /e:on /c md "C:\Users\Admin\AppData\Roaming\Microsoft\Windows" & copy "C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" & reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Local Security Authority Subsystem Service" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe\" -start"4⤵PID:5852
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Local Security Authority Subsystem Service" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe\" -start"5⤵PID:8668
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start4⤵PID:4600
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵PID:5864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no5⤵PID:13040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:9544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup5⤵PID:7660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup -keepversions:05⤵PID:12788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:400
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete backup5⤵PID:9724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete5⤵PID:11184
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵PID:9088
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet5⤵PID:6248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f5⤵
- Clears Network RDP Connection History and Configurations
PID:2120 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f6⤵
- Clears Network RDP Connection History and Configurations
PID:10792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f5⤵
- Clears Network RDP Connection History and Configurations
PID:7952 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f6⤵
- Clears Network RDP Connection History and Configurations
PID:11484
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"5⤵PID:8384
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"6⤵PID:6988
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C attrib "%userprofile%\documents\Default.rdp" -s -h5⤵PID:3752
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\documents\Default.rdp" -s -h6⤵
- Views/modifies file attributes
PID:9184
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C del "%userprofile%\documents\Default.rdp"5⤵PID:8336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wevtutil.exe clear-log Application5⤵PID:8656
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log Application6⤵
- Clears Windows event logs
PID:12192
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wevtutil.exe clear-log Security5⤵PID:13268
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log Security6⤵
- Clears Windows event logs
PID:7452
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wevtutil.exe clear-log System5⤵PID:6460
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log System6⤵
- Clears Windows event logs
PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C sc config eventlog start=disabled5⤵PID:8240
-
C:\Windows\SysWOW64\sc.exesc config eventlog start=disabled6⤵
- Launches sc.exe
PID:12724
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 05⤵PID:10196
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 15⤵PID:9692
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 25⤵PID:11084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11084 -s 5286⤵
- Program crash
PID:5600
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT5⤵PID:14996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c for /l %x in (1,1,999) do ( ping -n 3 127.1 & del "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" & if not exist "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" exit )5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:14948 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:14832
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c for /l %x in (1,1,999) do ( ping -n 3 127.1 & del "C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe" & if not exist "C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.CryFile.aabg-dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe" exit )4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6452 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10976
-
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crypmod.acmi-2bf305e40252953154a29d0887a6703973a4523a77ed89de6b8803f5dd360f57.exeTrojan-Ransom.Win32.Crypmod.acmi-2bf305e40252953154a29d0887a6703973a4523a77ed89de6b8803f5dd360f57.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8672 -s 2364⤵
- Program crash
PID:11196
-
-
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crypmodadv.xzh-eb4c891dca0ae8172da731f80cd9576c191f964e27c075142ce6ee371690ec5f.exeTrojan-Ransom.Win32.Crypmodadv.xzh-eb4c891dca0ae8172da731f80cd9576c191f964e27c075142ce6ee371690ec5f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12444 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe {"variant":0,"path":"C:\\Users\\Admin\\Desktop\\00375\\Trojan-Ransom.Win32.Crypmodadv.xzh-eb4c891dca0ae8172da731f80cd9576c191f964e27c075142ce6ee371690ec5f.exe","processid":12444}4⤵PID:9848
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1528 -ip 15281⤵PID:7716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 400 -ip 4001⤵PID:5364
-
C:\ProgramData\vnovgpq\dbxw.exeC:\ProgramData\vnovgpq\dbxw.exe start21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9144
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 8672 -ip 86721⤵PID:7844
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x4701⤵PID:5548
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7840 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00375\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT2⤵PID:15240
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\2ae9f69cf9b34811bb8c110edb57beb9 /t 8460 /p 67681⤵PID:11712
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9560
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\c74e3da86921414d9df551345cb32084 /t 5216 /p 83321⤵PID:7824
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\74ebdca47f5346d38929125d6cd0fef9 /t 2088 /p 51161⤵PID:6184
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\0c640aa412a84e21b1f0afe7a51e24b8 /t 2240 /p 59081⤵PID:7540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 11084 -ip 110841⤵PID:11652
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 6660 -ip 66601⤵PID:2696
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:13364
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:13528
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:15912
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11780
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:16836
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:17208
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:17804
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:17832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
5Clear Network Connection History and Configurations
1Clear Windows Event Logs
1File Deletion
3Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Query Registry
6Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.id-CCDFD7B2.[[email protected]].bot
Filesize378B
MD5b672ae256bd14f677fcf5fc043263569
SHA18472419a218d3a90a426d13d1b9f8d57f941e838
SHA256ca52f8496b3f077d4fa0dcd1659009e4cc6855eb4ee9c77af724da9b8c6e694b
SHA512be340276a36cd678cbed40ddb202ec7a6ebc04b6c65612aa6d05e35cc88f28e077ce21da9082799e8e89aee7466e43b83fef41a14aa760f248f10014de2bed62
-
C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.id-CCDFD7B2.[[email protected]].bot.exe
Filesize889KB
MD549ef4eebc5b7457bafbd742356ec4600
SHA13759798b18bf6ca6930a869d5c4202c672365f84
SHA25659b610d3d51f12d41044d69a4b00697eb23a2ab12daa0b674fec1fb45b97d0fd
SHA51262db43a3e45ffbaa0e0b01362f73a17c1fcc98f14f81d662aec151d2da5b4142e45356372abae2a772995bb507bc2becad3e47b8b16de80034c9e2d90b3c8e57
-
Filesize
2KB
MD503227431712543826cc39e64468732a5
SHA19bfce4209d51016a95725a8ac151b22d253625e3
SHA256be18f4da5b3dd7ac31f980d64949a606ea8d564bf6f45ae32aaa45aa30974247
SHA51268608897a00c90f5b0124cba0fae1815fe09cc523e4092c57fc773b2b2a40628f945525d72989b756d1f5f7728d93804df2298bf0c02d3d0999718559845c85b
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-CCDFD7B2.[[email protected]].bot
Filesize2.7MB
MD5a834fe459ee077424933ccb49ff7568d
SHA175f3d738703472319a91f1ef853919db7ebfe32c
SHA256b486e2699576dd423f55b4f7909003c93b8cc025571c250f017456bf3505616f
SHA512646cd0457aacc989e9e3a4aaf4c9c9ca7807549278413e5eb6e1b2941cfb76dfe9568141b661c097884275db92b104a462e8d68431442d4e132ecfc1d09edc80
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe.log
Filesize20B
MD5b3ac9d09e3a47d5fd00c37e075a70ecb
SHA1ad14e6d0e07b00bd10d77a06d68841b20675680b
SHA2567a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432
SHA51209b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316
-
Filesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
Filesize
24B
MD5419a089e66b9e18ada06c459b000cb4d
SHA1ed2108a58ba73ac18c3d2bf0d8c1890c2632b05a
SHA256c48e42e9ab4e25b92c43a7b0416d463b9ff7c69541e4623a39513bc98085f424
SHA512bbd57bea7159748e1b13b3e459e2c8691a46bdc9323afdb9dbf9d8f09511750d46a1d98c717c7adca07d79edc859e925476dd03231507f37f45775c0a79a593c
-
Filesize
1024KB
MD5ec12e1051ea6b3e05bbbb9e52eb465aa
SHA180ded3704f78b702b424d37d7c8e2a922d572c8c
SHA2560c019c175d8c6186daf7851d82280d46cd08efc4c81159a306a127baf7a2b4e2
SHA512fa0aca6873450af98fb45d6e4da2cc3d86180f2e0aa57d64b26763f922205a122daf42bfcbdce5c750622dc094abc433f73041e320363499c8bb113d3bdc1856
-
Filesize
1024KB
MD5777dd969da3dd17026244668b774e058
SHA1e0a066d28dfc6bcca1c13a50bfc4b35a37541b7a
SHA256221f1bd7bad281fe93374736df606e52ce7393ae4fe0bdd4682935b90f184e59
SHA5121f1a19b1a969a62cd8c83622e89077492457dd00f28505f0fe49a600688b18bf0407cae61e0da9f0d23fd0f6d874125fe83a5666ca7975976d612743fda08158
-
Filesize
7KB
MD577b65a77cac00fe47b16dd4819c4a4c7
SHA15d174cc05cfc487ee35db8aaa770930a26529bc0
SHA25631aa3f7fa15dc18c49e4e36554fbaed761808284a0fa4a792a48e46d267e0383
SHA512abcc320916161427a5b5683edd9242ad065680eee55f35b770e24c58f3ddb5b77bc1f58bc4c5fb851bec15b441a8de904a10dbb7eeaf6dcdf9460470d3d33d78
-
Filesize
24B
MD52dd3f3c33e7100ec0d4dbbca9774b044
SHA1b254d47f2b9769f13b033cae2b0571d68d42e5eb
SHA2565a00cc998e0d0285b729964afd20618cbaecfa7791fecdb843b535491a83ae21
SHA512c719d8c54a3a749a41b8fc430405db7fcde829c150f27c89015793ca06018ad9d6833f20ab7e0cfda99e16322b52a19c080e8c618f996fc8923488819e6e14bb
-
Filesize
1024KB
MD5fbf438df723b937ddcd51725ec29603c
SHA13f4b90ec46a385020ef676131ba0846da3bffa65
SHA256faeecb324b7c8fb0c506a17952395702e21583b60ed7faa9bb950c11465f696f
SHA51253c4b7c901f6a24ef7def37f7710255630078b5bb3c2bafdb01e57aff947d8920383b65161a7557646643ea2f3ad83b5b8111d25d0077fed4b4ce0dfa2b32708
-
Filesize
24B
MD5635e15cb045ff4cf0e6a31c827225767
SHA1f1eaaa628678441481309261fabc9d155c0dd6cb
SHA25667219e5ad98a31e8fa8593323cd2024c1ca54d65985d895e8830ae356c7bdf1d
SHA51281172ae72153b24391c19556982a316e16e638f5322b11569d76b28e154250d0d2f31e83e9e832180e34add0d63b24d36dd8a0cee80e8b46d96639bff811fa58
-
Filesize
1024KB
MD5335984248499cdd351fb4358e9198aa7
SHA1587d3d936e4cb41ccc51296a65b4cfd2f96401e4
SHA256e90a7f1d89f524ba998027435ccd2f243dc82aab18b69c5c3996150d2cdec3c0
SHA5120353c97114ec97a357f4ad67272064567abae6cb727328eb3ee625d168942f76a2672c85a6ab0d6ba01050c76e0daef51b3fcbeaf3a1ef78d0e356e0c2a0d3e2
-
Filesize
24B
MD52d84ad5cfdf57bd4e3656bcfd9a864ea
SHA1b7b82e72891e16d837a54f94960f9b3c83dc5552
SHA256d241584a3fd4a91976fafd5ec427e88f6e60998954dec39e388af88316af3552
SHA5120d9bc1ee51a4fb91b24e37f85afbf88376c88345483d686c6cff84066544287c98534aa701d7d4d52e53f10a3bea73ee8bc38d18425fde6d66352f8b76c0cbb5
-
Filesize
24B
MD560476a101249aedff09a43e047040191
SHA1de5b6a0adc7de7180e19286cf0f13567278cdb64
SHA25635bc77a06bfdde8c8f3a474c88520262b88c7b8992ee6b2d5cf41dddc77a83fb
SHA512f1d2dcc562a36434c6c6405ec4eac7ecfa76fc5a940114da6f94495b77584a132d5d82ad3556df749490be096cfd238fa8b484b7c734cbc4d074e963e5d451f4
-
Filesize
24B
MD5ae6fbded57f9f7d048b95468ddee47ca
SHA1c4473ea845be2fb5d28a61efd72f19d74d5fc82e
SHA256d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9
SHA512f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3
-
Filesize
1024KB
MD52a84d4f24c54ad34d0c9efdd52022f84
SHA1c737cd070c91faae135c7d9d359dfd2ce4083424
SHA25686d5d7b1f83c5ac9c21da39f907cbf88631f513197821048176088a707623687
SHA5122d2f45274a82dd88c97e29cba0d84ddc69157064333fb5f500e39d28ff21a17a2131f19ac30f63d7187e3903cde0bf6c7dca342f1c71982d074cb1dc38301a88
-
Filesize
1024KB
MD55b570e9cb9a51d33db8a681210ded73a
SHA1a117eb7347ee76e609b8d4c3383c498d5f86cf5e
SHA256d53b2cd27fb83d0a913dc9b78c3c9af503d67f21b9e6b8b668e922c48a904e14
SHA512519510b9df1dccf27a382984f39edf660951a3653274514e0a33eeeef2b074c25a6a65cb9bee04dd0a07b79d0adcc3e03aad48db00d2f10bd3a59ed56484f45a
-
Filesize
24B
MD5d192f7c343602d02e3e020807707006e
SHA182259c6cb5b1f31cc2079a083bc93c726bfc4fbf
SHA256bb4d233c90bdbee6ef83e40bff1149ea884efa790b3bef496164df6f90297c48
SHA512aec90cf52646b5b0ef00ceb2a8d739befe456d08551c031e8dec6e1f549a6535c1870adb62eec0a292787ae6a7876388dd1b2c884cba8cc6e2d7993790102f43
-
Filesize
24B
MD5f732bf1006b6529cffba2b9f50c4b07f
SHA1d3e8d4af812bbc4f4013c53c4ffab992d1d714e3
SHA25677739084a27cb320f208ac1927d3d9c3cac42748dbdf6229684ef18352d95067
SHA512064d56217aeb2980a3bfaa1e252404613624d600c3a08b5cf0adcb259596a1c60ee903fdc2650972785e5ae9b7b51890ded01ec4da7b4de94ebda08aeaf662df
-
Filesize
24B
MD5fc94fe7bd3975e75cefad79f5908f7b3
SHA178e7da8d08e8898e956521d3b1babbf6524e1dca
SHA256ee1ed3b49720b22d5fda63d3c46d62a96ca8838c76ab2d2f580b1e7745521aa5
SHA5124ceaf9021b30734f4ce8b4d4a057539472e68c0add199cf9c3d1c1c95320da3884caf46943fc9f7281607ab7fa6476027860ebed8bbaa9c44b3f4056b5e074d3
-
Filesize
7KB
MD5625aeb0cc04ccdc849ee752bc6029fb4
SHA1cc4fe622784f1538f1c2581421c0007310d9ed0a
SHA256bdee55d37993d6e5bbe80c092bd3741155e1fc28f7b779d69b9fb88a6ad90241
SHA512786c4c82bfcd26292651d2d85155fe0f9bee85d9461f7d9cbdab27409b199b3ed3410d29b7aac41a74727b4b044ab49e870ffa23f3e705af3c28443984e75fda
-
Filesize
7KB
MD52fc152502892211a3f66e39e96e2217b
SHA1c32dafbd78e1661808ab3f03b010d00cc041d3a2
SHA2568a2b6ddf80bbeb19a420e48c9f9b95ab791be59c67a4a27d929f43738d3bc240
SHA512e8a0d98411e6c2d0ff1b2603008194597924349e2704cd8b846a5ff5799404bd7574ea9b3a1f927ed55ad42e4fa18a73c581eb4dcdf9412a25936a8bd864615c
-
Filesize
14KB
MD5e678da4e0ed73b4d45686e586fe04eb6
SHA1841993ae263464db0f51e4ff04235620c935a243
SHA2567d98d8e1d37a49c7a153a53e0d390f1a7abc830c39256520648ae5425a715388
SHA512513656507624a049319026dc9c14ce62217a787dac8532299bc622fc3110d114f72063b6f4c4fc1217af718d9d64a59c98613a18d81b9f4841c99c0656b313b5
-
Filesize
24B
MD5379523b9f5d5b954e719b664846dbf8f
SHA1930823ec80b85edd22baf555cad21cdf48f066aa
SHA2563c9002caedf0c007134a7e632c72588945a4892b6d7ad3977224a6a5a7457bf4
SHA512eca44de86bbc3309fa6eab400154d123dcd97dc1db79554ce58ce2426854197e2365f5eee42bac6e6e9455561b206f592e159ef82faf229212864894e6021e98
-
Filesize
24B
MD55f243bf7cc0a348b6d31460a91173e71
SHA15696b34625f027ec01765fc2be49efcfd882bf8e
SHA2561b1aed169f2acfae4cf230701bda91229cb582ff2ce29a413c5b8fe3b890d289
SHA5129e08dfbbf20668b86df696a0d5969e04e6ee4a67e997ff392099bc7ff184b1b8965502215744be7fe423668b69099242bba54df3f0bfe4e70acdc7cad8195b02
-
Filesize
24B
MD5db7c049e5e4e336d76d5a744c28c54c8
SHA1a4db9c8586b9e4fa24416eb0d00f06a9ebd16b02
SHA256e8830e7ac4088cf3dd464caec33a0035d966a7de5ae4efc3580d59a41916ff7b
SHA512b614037fb1c7d19d704bf15f355672114d25080223e7ee4424ad2cb7b89782219e7877b373bbc7fa44f3ad8df8a27eef4e8ccc765d44ec02a61e3b7fae88ae69
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\LLDJA3WI\microsoft.windows[1].xml
Filesize97B
MD573df3670a3a3f1489771ec3278819ed3
SHA115745fc2411f78ebfcd6c5bc2ac91e1d3f15747d
SHA256870bcd8c5717a06eafb69a0e5f8704037aca21e2c56ed12890ea41041ba3141f
SHA512dc94ce04d83f6ec2493fc48c81d2e7b60a0ce9da628fff30041414ee5356d6e924658b22fbdbfd61bcae379386b7f597aaafc3180b67b5e574c584e95732c6a5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbres
Filesize2KB
MD56d004bd43c5298557e3c265263880c47
SHA194af492a44d42ca7290c57a4ca370287fca17c43
SHA256ad8deaaf246ffe41bd900e80c11cdd2dd0fd12e2fc3744385365a1105a7413eb
SHA5126bcf05c7909531067f40bf44bfdb6e7132f66093bea2fcc22a4ceea8e1152db702755a79235293ca58b7021b791025c7e4a857675f6de8d58f88d5d33f18f432
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133752187338107237.txt
Filesize2KB
MD5ecaea544af9da1114077b951d8cb520d
SHA15820b2d71e7b2543cf1804eb91716c4e9f732fde
SHA2569117b26ab2c8fdbb8223fe1f2d1770c50a6cf0d9849a5849d6aebcbe90435be6
SHA512dc7bedbc581818011aa2d313429f234b12e5e9cf320b02b8d7ceeaf9cdc1c921ffc51af7f4080b02740f2d2146fbb006ccbf37cdcba3e3a10009142daffdb919
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize1KB
MD557fabde62c4e877249c09f43f901ba97
SHA160af379340f71b3f3467840bad4b597ef4aa6009
SHA256ebc0df37d704d2e80aa91af898edc0b7ca9055f8bbfd9966e5edd51760ef144d
SHA512ca19a32f66969b92f9de5da79a8424f76b71495b0e0f01f2f6d9bccd7874c1caf89f1bdf7e6dbefbae7acbd03c769c517220ec5ebb470ced38eefa63ae337a83
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize1KB
MD55575296714b58edbd5f53f22261345a9
SHA1e8a3d378f76a99e267dd0ab92e5359bd2e223c35
SHA2568c4bdbb7bf83e8e592094fdb6eb6a1c5a6d086818babfa61c76099f40d0daada
SHA5124e0295427b5f2d7a35ec2d3370592196ff8a9506cdcd7e592e7d0f2cebd70662f6a6bb6d5054623e52acca7e4c3cd59f835af432c381aa0e7f7c6e63cb1f8a36
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize5KB
MD5fcc7dfcc24aade6ebc1527e867325f6e
SHA17330c5b8055a32b35321332b4e6798e9a8bc3fc0
SHA256dc26d7ffc507bde0bcbfc9822739bb5063910064a7ed8e91a63e2c6dccc0ac4a
SHA51204a44f135b0fbd9a4be7f5dc11e57554931083b427b55b442792838b510141fc781b8d4b6a030627f3bc8f867e3eacb8ace7cef8e71cb96e06f592e34a7a84b6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize5KB
MD532c5caece42c6246b32d00e17684fbbf
SHA11254b78da2af2e0cdfc0489cf1e7c0d960ad3730
SHA256768e489f0c004092840de506a696b9d980206376c8bbc2e7c86230baea44c84b
SHA512e05b0d3eb375801f987e9df053e435f2fda97a2c51898e89bace0c8f1d4885a0a334614c742ad6176cf0a3973b21992b7960117621113e13e05c35344ea73fe0
-
Filesize
160KB
MD54575a2a5b016a30f3272523c246adb4a
SHA127b4b10f8d97d58936b405d50949c5e34ae106fb
SHA256787b16fbf8059055342c0669aefba7173a27a844fb9da936725f65516ce34a6b
SHA51208d1a0dc25aaa0f4e0e2a003961364267ee2c2569223fb825e22e45a2e044b23606722c6dc4bc516aa488f9c175875540fa0e337b39f93950b333e1fa47b0cff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5928c9edee0e5c4df0a681d79119aae6d
SHA12544b5bc452e2b9484b3e324e82713458f8de12a
SHA25679fd84b161b13e6ba37e3254192e96d0466b223b507df8a5fa629f7452dd9106
SHA51274283809e69ef4cfa30ef99accd088a67c2429c0cd883d2913b9ace270b45dcca91290250b8530ad62e131b667b337dfe89c8edd21ea9d540563b72700c68ca8
-
Filesize
1KB
MD5582198050ef73a6bde198761d0c8c925
SHA1475e2c7d86a1a63c50434e09d26eeab6c7073de2
SHA25679c58fc8dc6cb92f465e7915f6f724c4963cde8786eb69ddaa71da9c3b2301d3
SHA5124d5fab2e28a037c627e55365e86b7f4e90b300213779b7c40ac92195f6cfbd40c87b40c32a6b2723f1052f515143def6b80b114697da2bd199b522507935baa4
-
Filesize
1KB
MD59404df9b79dcc334f9745955d48ed7bf
SHA1130f31043aa623fcc753ecb30f1f52fe8bd45c0e
SHA256913d072a87a2104772846ba31d7eda52c4e4c61ecbe1d63b5e311f2759660831
SHA512b80393ed57d1bc286da2efd81fa67b9f47649c54486fb3d7314719c467c6b018975f887c650d75ed4a23b9d111b47e1bcc6d5ee1762b4b7bb75f668c055f92b2
-
Filesize
1KB
MD500777ab1a1062efe3090c49b1980a81b
SHA1442a65817102f5de504307f4b76501507266f26b
SHA256117adc459a102c26c295eebecf6cf4cba8d82397c7bdf8e15ceb06aa775f7af1
SHA51223b2ff867b9fb906081b9878d0ae2ca97f91a12246da2ea75ce1fd695830406e006878523ff2f1862b70d95c19ea32d87cd336f5bb48580686f2072b5eadedc4
-
Filesize
204KB
MD52d94685fe0c23029a3622f6e035a88c1
SHA1dd9fc80279ccb4204fad9453eb639ed3284182aa
SHA256a8300625818fbb9167181835e8d31df730b24a5c6fc79be05b69e536010be58e
SHA51245a2b88a80441bcd5cfa9204891adff188b053cd75cfc15a564518818f9dbeec9dd0d72bd591d08a86fa5de81372bbf02ae3f5a5873ee13079ab0b637671b8c5
-
Filesize
478KB
MD51575ea1792ec080b7825066f02a5dddc
SHA1e647358f934f78866d1f97079f66c46448efd2f0
SHA256dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf
SHA5121e492379bea54ccc2db48b1bd2ded0d77470ae960a6f78e681647526b29152a4a1ca27acca9c7181477af3c19a4e4eac0182a259fd32893b33b33f40fe14e120
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Blocker.gen-63f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e.exe
Filesize1.0MB
MD5325faa4c5c4828638678a435803f7245
SHA1fd7d12eae0145f9fc9973befa81d706c2c8faf98
SHA25663f8cd6de7a667edb95fe51990274dd30a774905401b8642e071049b1d477a7e
SHA5123ed7bbf727404853325590e41e1114c2cab4978bae1d7f6e7455cae63412fed87598c2880697506f54147bac901ee0254719ef6d44d0ea86dbfca0a7a3bf920a
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Foreign.gen-ff4c5f6a1a5b68b956970751d56ee7905ec48ad39cc05416ee8ee958ecd0c40e.exe
Filesize9.0MB
MD52eb4469c76f5230c66626a6918c7664f
SHA16aedaf0ad86c7e45f19ff7a1ad1876bd18ff8b90
SHA256ff4c5f6a1a5b68b956970751d56ee7905ec48ad39cc05416ee8ee958ecd0c40e
SHA512723c8e35a2395b13da593eee13b42970b81429849e3b8e484767a2c5adcfe00d11cd78f1713e52e3f137f1df4cb3c9ab6660dc0cb89772690dace5a1ad740fbf
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.MSIL.Gen.gen-937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19.exe
Filesize408KB
MD5c0501b92dd5b48899061747913560e08
SHA1566af1bd7a02c0d725d62c503f5816a24b987a24
SHA256937aa346ee2e2e9d234c52d278bd2d53cd7e1078aaf3bdb6654dcdf08c924e19
SHA512d627bbf8028f6252b89e05a41edb98ddce9872ddfe26392d1e9d2b5c664f0ce27d54b6b793e016b7f25f65bf8fd5fc7d023581dc801d472d79b512c1170bee74
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Agent.gen-434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0.exe
Filesize1.0MB
MD5acf6ba17e633617868bf6550972815f6
SHA1654b94cdd7aff6288e604d3a34793a5f76bb48d0
SHA256434a7f3d787dab3c5e3daa30c4205ee503f1442ef64d88f5af5dd7cfca2fdec0
SHA5129171050dd83925b2d7040e167545f003ab3051a936b0e683637c4e1937142d291ecd5dda13cd7d4b4a182126596c224aa0eb78233a83a4a89666e025eec098f2
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Blocker.gen-defa67780ca672a33df0f9b81634a2dd03877e1761ded62985800dcd24fbbec6.exe
Filesize298KB
MD5fcf045b0b34b9780b99aba5669f9d0a9
SHA15e18b6881f4c4aefe1c8ebc9ddf76ceb584084ca
SHA256defa67780ca672a33df0f9b81634a2dd03877e1761ded62985800dcd24fbbec6
SHA5129139f0a3120fd57afaa23ff1dd36582d4bb88760213a95b2277ac3d5167aa72a38a708d295aef7a115bf02d66dc7626ce3b6f68341fd6c3197a569f2edebbf19
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Crypren.vho-372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d.exe
Filesize222KB
MD5765e03856ba709f12220f31638ae237c
SHA16283d47cc404e866c7f68a0cebc71527ef31aecb
SHA256372dc363e3dcc4399b84f1c2e594e698bc1e65b9baf853dc1209ddaad52dde9d
SHA51245763abf8a8984117a5351b1d32af3df618d86fba35e8dd74be4c9f4c031c79eb72d423ccbb70287fd8a697b962cebb3164b49889b839ebdbde8eb3f6263be2e
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Gen.gen-de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa.exe
Filesize209KB
MD56cd4e81f9a7bc69b3daaa886f0b3dba9
SHA1bfe2e050599b0790a135cf2df1263ff990c26c77
SHA256de0c5066fdbae982f39d31b0058c568181a6d7e8047daf756080507f8a9af2fa
SHA512dd355996d447e1f9023d0be43ace9daded41722942447db010fe39ca4746bc645599d38e426d98cadec727f9dd5c0c17b15c46e0d127922693475779b8af466d
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Gen.vho-339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55.exe
Filesize85KB
MD591ef3f669ffd18c3354659df16261e38
SHA148c7f18b8b069515de2c635f349611b37f05c51c
SHA256339a9c6239d8eb3f0225d3165a42222d5a4c74896ae8e8e212a6e44990db8c55
SHA512d5d1f355c57465d07acc7b55908c3def24edbbf1c2416cf9ab245c9ed26e1c3763e3f6df8b11e49ca8c4120c574e2d4ad525e1162fc6036c146c24dad32068c0
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9.exe
Filesize889KB
MD55968cd34bf0f6c8335698ce8c8c27282
SHA11bfaede242a6b3d53eb04e79c6eb1a40506aba4f
SHA256986918f3afe3dddc8a37c2761b27e41f19dd85b2122172a70c2865b21f9689d9
SHA512278e98d2e588411f9273fdadb7372edc4c7adadb4a982fd970af5549bdd7e7ed82e216df7c85d6250260c9447e056be9605b8de1b8372ec80c1957ca12b018ce
-
C:\Users\Admin\Desktop\00375\HEUR-Trojan-Ransom.Win32.Shade.vho-a0d4700887c4093807fb98f2dd415aae6d2b81798d322961576ebbd1335365c2.exe
Filesize312KB
MD5dc763b751059ce9b868dd74a63f00dcc
SHA1087fe33af1f1ac0cb4dbaac1b25a25e45bde8f65
SHA256a0d4700887c4093807fb98f2dd415aae6d2b81798d322961576ebbd1335365c2
SHA5126e5c5ec73f1ba2a2810610863ddf2ebdeffcaa48fdf9ffe1a9ea9804c936efab1b0485e6f627729aa6c942dfdc185d589781cf4b75202fb4b469263542907180
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.MSIL.Blocker.bl-269662d5d2d7522fa2b88be8de2a3540e1443fba1a9d6c8139177a3a5a78bd2d.exe
Filesize632KB
MD5000e424a6ea3d3cc11a9e504534396b4
SHA113e49069cb11bdf810af79505194e3e29be8b156
SHA256269662d5d2d7522fa2b88be8de2a3540e1443fba1a9d6c8139177a3a5a78bd2d
SHA5123addb80328ee30eaf3c7552b993965e5062b888aa8e2dcd3ddcbad0cbece8760772134adaab20cffc7919a9bcfe1b677cd6715b9954755ccc9fa37a1111ad2d8
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Bitman.adnq-899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7.exe
Filesize1.7MB
MD5c21fd0696c8b2c2efd8dca884c6bd07e
SHA192660f8af906786be1b7ec7e14a83500ae2d815a
SHA256899aa66611f7a6a058a8ef90aef6e0436d9b0b49a4fb5ede2c3dfe574aa708e7
SHA5125de7a95f36faee34f8f458a48edff5ef86a587752388bcec18461a4033445ce1234b4d26f8e6bc46b0dbe994b2f3577e5b9d802d55308cc1a36999d5c2eb1f94
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Bitman.aewz-ef7f38b6083f22d04a2c5787a5d7a784e891d9cc329ed046ad5ad128ca1e5042.exe
Filesize349KB
MD5407c72631fff8e2e786e36b5ba6bac84
SHA19dcc3b6b9cb4c0d43bc5345fae65779dd75451d7
SHA256ef7f38b6083f22d04a2c5787a5d7a784e891d9cc329ed046ad5ad128ca1e5042
SHA51229295f4c0d1cdb7b2ededbac1f8811b7abae7579df29eeb02217b5cad4371f953d097143f3142c50341c4faebaf59c420e8d0f8aa04546ba1524407eb59fabcd
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Blocker.lckf-e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b.exe
Filesize337KB
MD5afb863ed2711a16c66312889d12fca7a
SHA18958ff08d6dcc858f1a6c8927c8c3280c15c32c3
SHA256e710fe80032398181efcc316de4386658013eb2cd544454158b81a022c13460b
SHA512aae186472d52f948a1b63e6fcbd4fb81549f32078df482cc980d8a271278812ece40b291e849ce75d1f06267585d75ec5b045429bf4cd0fbd8a12524ffc58115
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Blocker.mbys-25748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b.exe
Filesize959KB
MD5549173de637d4a696f72cd0fdd27e880
SHA1536fd3d0b5d6253be1117992b252fdb2d0e06687
SHA25625748e57d896e6abe9949d52c87aaf3d3800e88d2fca9763bf38db8973bc3a2b
SHA512d95f64ca7fbfc315be078985072627961c919cd09e23e2dcdd737c43b9083decf8d4b635977cfcaee047b6dbd5e3737de136b6a7216d16d5421ce0925b30b97b
-
C:\Users\Admin\Desktop\00375\Trojan-Ransom.Win32.Crusis.dsz-970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe
Filesize420KB
MD5859553e76bcfb7c19bbf1ad1290b360c
SHA16a71def09b4b0058ca6f0b077a93c22b4eb63082
SHA256970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4
SHA512100dc319e1082da1f4a2d779642c785a89b2e00272ee85390c4cdcaa589ed0091eacdda5fc06ac9a87ea025b4fe0be62323ba51bd34b7968d96d8859f0676d2b
-
Filesize
153KB
MD5764c5d6888c76e7fe9cce3e3c721e358
SHA166779739c200aa159e07b1fbff7d1798d83402b0
SHA2567042f3f8bfc01f32e2c029eb0c8572d2cc2f7a23cf5bfaec49a4101b9126fe7d
SHA512ceb86c190875b5de157921baebf3dbc1c0c7ca35bafd733fad354fd9477db5b15958baeb1347f128cb3484b7632f048a0cbd716f34378499539d592be9195861
-
Filesize
8KB
MD5ad9da2f4a21f8ca191047404714207a9
SHA1b66a0550ecc0d9c10a749f0ca2dab1228252e609
SHA256b668c47b5a4bc0a9f04933a6ffc98c6d5e37c561aba77cbc67d02a998c745edd
SHA512926f67126c42944c20d15a05c3ac40c3a756797999f84426bb865aceb7eab33f6cbe7d3130adcbad710f7a7aabcf87f9a923e478572f599c1488a0325aed168d
-
F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.id-CCDFD7B2.[[email protected]].bot
Filesize378B
MD5343425f808a377245025b1315891362d
SHA1b51d4c5cdbbcf693f6720b467b1ccadbec73a5f6
SHA256be54854f9eeb0e5deda1e1bd18be7d2bb256ae2df5dd48d9af80cc2717795957
SHA5125159370b21db24a07025ed8c8fd9cc36c9398a2e922d4b734ace34fb6e8461ff057f495d53bee09a5e8e3ced5ff6374ae80ba26c62ac4e9bbabadb0808896cab
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
112KB
MD56b1ad940e9f2625966b931ccf5ec0c7c
SHA143c7a1b89bfec4f206551014f7c5809f06705e61
SHA2561dc756e129cf18fc15f8cf285ad72370193273750c5f39b687669c41152925d7
SHA512a8211320ea41766a6a8cc73382fda007a6277a8e2df08dd59fdcb6710308d46bf25d702307c13f1e12ed3314678f5dd9a02d5c7b369789fe7a86c0cd779901ba
-
\??\c:\users\admin\desktop\00375\heur-trojan-ransom.win32.gandcrypt.gen-17b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd.exe
Filesize153KB
MD5b4133fd2790bbb612c2986e662814c26
SHA19657eb2470705910f1c96ebd1d0a81b7f0d9969a
SHA25617b284c20aa2bcbce2ad04a9dd72850e37ebc0bfa1510b20ca9e9895bf9c7cdd
SHA5121cebc355b1730f57f608ec86852ba59434769d5fee9855b27b72d26ed7f0c86711bb988d1184c893373774f33521926757c12121fdda1cf23277967ce445dcd4
-
\??\c:\users\admin\desktop\00375\trojan-ransom.win32.crusis.drr-7b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69.exe
Filesize496KB
MD5d04bd9640cf05c1d8ec150b8ec3dea9d
SHA19f1d2b477e072b993144df959e46bff88885d161
SHA2567b3e28d2f4946196b60ac5feb807984cc6ea82ef7ab535dbc291707c19e8eb69
SHA512806ccb9ab75e0b0fd41bc6d1b9de3be1e58f75a8af3db1bffbb9c1137a40e49587c6fad8eb8c1dfae89aef5b23a90e2bbadfb02ff9600557e398d67407730542