Analysis
-
max time kernel
56s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:16
Static task
static1
General
-
Target
RNSM00370.7z
-
Size
10.2MB
-
MD5
51604e584ac02ba7cbc1e0b988f52ff3
-
SHA1
441570eb9cec860cfc71bff92458981757476aa8
-
SHA256
25092371bd630f24a8de44508fa5f2d45145eff4c3b069bdc91eabc34063153e
-
SHA512
a1cd0e949fcae04ca9ef215cd957181634b609272ebe3e99e6299e6572ca7fb2644aedbf9cb812c153fb27bd7302739a86ec8f723d244db5184040cfdbb97a44
-
SSDEEP
196608:ti28AfEg2eqkWvCGjcBBGIs2/f/WlXu479C+NsP5f7J+iGuaLNXgPPSxU+:uA8teqvDYBhnC7c+NsP5A0PYU+
Malware Config
Extracted
emotet
Epoch1
187.162.62.135:80
181.231.72.200:80
45.55.83.204:8080
104.236.217.164:8080
128.199.78.227:8080
46.101.123.139:8080
185.94.252.27:443
181.171.118.19:80
46.21.105.59:8080
105.224.171.102:80
86.6.188.121:80
190.246.146.101:80
200.80.198.34:80
200.58.171.51:80
109.104.79.48:8080
89.134.144.41:8080
159.65.241.220:8080
186.23.146.42:80
203.25.159.3:8080
190.1.37.125:443
181.16.127.226:443
190.55.39.215:80
62.192.227.125:80
138.68.106.4:7080
91.205.215.57:7080
170.247.122.37:8080
201.219.183.243:443
190.193.131.141:443
23.92.22.225:7080
200.107.105.16:465
183.82.97.25:80
154.120.228.126:143
181.198.67.178:20
5.153.252.228:8080
187.188.166.192:80
81.183.213.36:80
201.251.229.37:80
104.236.151.95:7080
186.71.75.2:80
181.15.177.100:443
217.199.175.216:8080
187.242.204.142:80
190.13.211.174:21
190.97.10.198:80
190.186.221.50:80
45.32.158.232:7080
181.48.174.242:80
217.92.171.167:53
186.138.56.183:443
219.74.237.49:443
186.86.177.193:80
46.29.183.211:8080
91.83.93.124:7080
86.1.139.205:80
190.147.12.71:443
62.210.142.58:8080
70.32.84.74:8080
181.29.101.13:80
189.196.140.187:80
62.75.143.100:7080
85.132.96.242:80
46.32.228.206:8080
216.98.148.136:4143
178.79.163.131:8080
159.203.204.126:8080
201.212.24.6:443
66.209.69.165:443
217.113.27.158:443
200.28.131.215:443
103.201.150.209:80
69.163.33.82:8080
80.0.106.83:80
200.57.102.71:8443
181.36.42.205:443
72.47.248.48:8080
187.178.9.19:20
190.19.42.131:80
200.72.149.90:443
181.28.144.64:80
181.15.180.140:80
199.250.133.87:80
200.32.61.210:8080
190.246.166.217:80
81.143.213.156:7080
111.67.12.221:8080
196.6.112.70:443
181.228.60.191:80
37.59.1.74:8080
46.249.204.99:8080
190.230.60.129:80
79.143.182.254:8080
190.113.233.4:7080
213.120.104.180:50000
218.161.88.253:8080
185.86.148.222:8080
134.196.209.126:443
176.31.200.136:8080
191.97.116.232:443
86.42.166.147:80
186.23.18.211:443
190.117.206.153:443
43.229.62.186:8080
205.186.154.130:80
149.62.173.247:8080
71.244.60.231:8080
201.213.122.86:80
109.73.52.242:8080
181.15.243.22:80
181.134.105.191:80
185.129.93.140:80
162.217.250.243:7080
80.85.87.122:8080
181.39.134.122:80
45.73.124.235:8080
179.40.105.76:80
81.213.215.216:50000
5.79.119.1:8080
190.143.151.86:465
23.254.203.51:8080
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
218.54.30.235
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\#DECRYPT_MY_FILES#.html
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Extracted
darkcomet
Travian
google.serveftp.com:1515
DC_MUTEX-542ZEJN
-
gencode
jrjmU8cZXsP2
-
install
false
-
offline_keylogger
true
-
password
H91B4UD
-
persistence
false
Extracted
C:\Users\357002-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F78B3F7D6B6DB3E2
http://decryptor.top/F78B3F7D6B6DB3E2
Signatures
-
Berbew family
-
Darkcomet family
-
Emotet family
-
GandCrab payload 8 IoCs
resource yara_rule behavioral1/memory/3480-147-0x0000000000610000-0x0000000000627000-memory.dmp family_gandcrab behavioral1/memory/3480-146-0x0000000000400000-0x000000000045F000-memory.dmp family_gandcrab behavioral1/memory/1216-479-0x0000000000400000-0x000000000044C000-memory.dmp family_gandcrab behavioral1/memory/1216-482-0x00000000005D0000-0x00000000005E7000-memory.dmp family_gandcrab behavioral1/memory/2248-555-0x0000000002100000-0x0000000002117000-memory.dmp family_gandcrab behavioral1/memory/2248-554-0x0000000000400000-0x0000000000453000-memory.dmp family_gandcrab behavioral1/memory/5468-588-0x0000000000630000-0x0000000000647000-memory.dmp family_gandcrab behavioral1/memory/5468-587-0x0000000000400000-0x00000000004B7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Sality family
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Urelas family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (1416) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Disables use of System Restore points 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe File created C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File created C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/memory/5488-689-0x0000000074320000-0x0000000074329000-memory.dmp acprotect behavioral1/files/0x000d000000023d31-2280.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe -
Executes dropped EXE 35 IoCs
pid Process 4764 HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 3480 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe 1720 Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe 1076 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 3748 Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe 2968 Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe 4220 Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 2712 ssiinstall.exe 4232 ssiinstall.tmp 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe 3964 Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe 4592 Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe 1996 Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe 624 Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe 3884 Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe 2116 Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe 1044 Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe 1720 Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe 4796 wmdtskcl.exe 4052 ataidddsfmiiy.exe 1788 yhmbsqlpep.exe 2352 sxpjxbmwlkipuld.exe 1148 SSIagent.exe 2712 Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe 1216 Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe 3620 setthelite.exe 1564 Shell.exe 4804 setthelite.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 5184 Shell.exe 5368 Shell.exe 5376 y_installer.exe -
Loads dropped DLL 8 IoCs
pid Process 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe -
Modifies system executable filetype association 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSIagent = "C:\\Users\\Admin\\AppData\\Local\\SSI\\SSIagent.exe" ssiinstall.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msprivs = "C:\\Users\\Admin\\AppData\\Roaming\\windowforsmartinstall.exe" ssiinstall.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Font = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Font.exe" Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HpHfA3TWfbywp3Ah = "\"C:\\Users\\Admin\\Desktop\\00370\\Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe\" /SkipReg" Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSI = "C:\\Users\\Admin\\AppData\\Local\\SSI\\SSI.exe /byboot" ssiinstall.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1996-222-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0007000000023ca2-220.dat autoit_exe behavioral1/files/0x0007000000023d13-280.dat autoit_exe behavioral1/files/0x0007000000023d15-297.dat autoit_exe behavioral1/files/0x0007000000023d12-298.dat autoit_exe behavioral1/files/0x0007000000023d14-301.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\sxpjxbmwlkipuld.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\sxpjxbmwlkipuld.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File created C:\Windows\SysWOW64\wmdtskcl.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File created C:\Windows\SysWOW64\Mig2.scr Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\SysWOW64\IExplorer.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File opened for modification C:\Windows\SysWOW64\userinit.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe File opened for modification C:\Windows\SysWOW64\yhmbsqlpep.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\wmdtskcl.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File created C:\Windows\SysWOW64\ataidddsfmiiy.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\ataidddsfmiiy.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\shell.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\SysWOW64\shell.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\SysWOW64\yhmbsqlpep.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe -
resource yara_rule behavioral1/files/0x0007000000023c9d-161.dat upx behavioral1/memory/4220-165-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/files/0x0008000000023cf9-199.dat upx behavioral1/memory/4120-197-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0007000000023c9f-194.dat upx behavioral1/files/0x0007000000023cfc-204.dat upx behavioral1/files/0x0007000000023ca1-209.dat upx behavioral1/memory/4592-213-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/4120-216-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b000000023cf0-353.dat upx behavioral1/memory/5788-580-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5776-579-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/4220-576-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/4592-591-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/5488-689-0x0000000074320000-0x0000000074329000-memory.dmp upx behavioral1/files/0x000d000000023d35-719.dat upx behavioral1/memory/4448-726-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/5776-730-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/files/0x0007000000023d50-890.dat upx behavioral1/memory/5788-952-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5788-962-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5856-1648-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5856-1802-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/6532-1805-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/6532-2212-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/files/0x000d000000023d31-2280.dat upx behavioral1/memory/6532-2291-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/7836-2303-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/864-2316-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/6884-2562-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ms.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\external_extensions.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\CompressConvertTo.odt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.deps.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\DismountFind.pot Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\History.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Extensions\external_extensions.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\License.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.NETCore.App.runtimeconfig.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\ClearDisable.sql Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ThirdPartyNotices.ja-jp.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.runtimeconfig.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\e5852af Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe File opened for modification C:\Windows\SYSTEM.INI Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe File opened for modification C:\Windows\mydoc.rtf Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\xk.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\xk.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
pid pid_target Process procid_target 624 3480 WerFault.exe 111 4240 1720 WerFault.exe 112 1376 3748 WerFault.exe 120 2424 2968 WerFault.exe 123 2288 3964 WerFault.exe 131 1376 1216 WerFault.exe 157 5328 1720 WerFault.exe 142 5620 2248 WerFault.exe 165 6128 5468 WerFault.exe 171 6552 5396 WerFault.exe 271 9208 5748 WerFault.exe 179 3780 14300 WerFault.exe 1008 10516 5736 WerFault.exe 178 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhmbsqlpep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setthelite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssiinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setthelite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssiinstall.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ataidddsfmiiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmdtskcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SSIagent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxpjxbmwlkipuld.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5184 cmd.exe 5676 PING.EXE 12664 Iempingp.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 7440 vssadmin.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FC8348588518913CD7587D91BCEEE134594A674E6337D69D" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7816BC1FE1D21A9D17AD0A28A7C906B" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32352C0B9C2483226D3F77D170532DDE7DF465D9" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB5B15C4795389F52CDBAA032EFD7CA" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCDF9BCFE14F19384783B4386963E96B0FA02FF43610239E2CB42EC08D5" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC67A15EDDBBFB8BC7CE5ED9637BC" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 9424 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5676 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2312 WINWORD.EXE 2312 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 1144 powershell.exe 1144 powershell.exe 1144 powershell.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4520 7zFM.exe 2916 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 4520 7zFM.exe Token: 35 4520 7zFM.exe Token: SeSecurityPrivilege 4520 7zFM.exe Token: SeDebugPrivilege 2652 taskmgr.exe Token: SeSystemProfilePrivilege 2652 taskmgr.exe Token: SeCreateGlobalPrivilege 2652 taskmgr.exe Token: SeDebugPrivilege 2916 taskmgr.exe Token: SeSystemProfilePrivilege 2916 taskmgr.exe Token: SeCreateGlobalPrivilege 2916 taskmgr.exe Token: 33 2652 taskmgr.exe Token: SeIncBasePriorityPrivilege 2652 taskmgr.exe Token: SeDebugPrivilege 1144 powershell.exe Token: 33 1720 Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe Token: SeIncBasePriorityPrivilege 1720 Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe Token: SeDebugPrivilege 2116 Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe Token: 33 2916 taskmgr.exe Token: SeIncBasePriorityPrivilege 2916 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4520 7zFM.exe 4520 7zFM.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
pid Process 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 624 Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe 1720 Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe 1148 SSIagent.exe 2712 Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe 2312 WINWORD.EXE 2312 WINWORD.EXE 2312 WINWORD.EXE 1828 OpenWith.exe 2312 WINWORD.EXE 1148 SSIagent.exe 1564 Shell.exe 5184 Shell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2916 2652 taskmgr.exe 100 PID 2652 wrote to memory of 2916 2652 taskmgr.exe 100 PID 1144 wrote to memory of 2824 1144 powershell.exe 105 PID 1144 wrote to memory of 2824 1144 powershell.exe 105 PID 2824 wrote to memory of 4764 2824 cmd.exe 108 PID 2824 wrote to memory of 4764 2824 cmd.exe 108 PID 2824 wrote to memory of 4764 2824 cmd.exe 108 PID 2824 wrote to memory of 3580 2824 cmd.exe 109 PID 2824 wrote to memory of 3580 2824 cmd.exe 109 PID 2824 wrote to memory of 3580 2824 cmd.exe 109 PID 2824 wrote to memory of 512 2824 cmd.exe 110 PID 2824 wrote to memory of 512 2824 cmd.exe 110 PID 2824 wrote to memory of 512 2824 cmd.exe 110 PID 2824 wrote to memory of 3480 2824 cmd.exe 111 PID 2824 wrote to memory of 3480 2824 cmd.exe 111 PID 2824 wrote to memory of 3480 2824 cmd.exe 111 PID 2824 wrote to memory of 1720 2824 cmd.exe 142 PID 2824 wrote to memory of 1720 2824 cmd.exe 142 PID 2824 wrote to memory of 1720 2824 cmd.exe 142 PID 3580 wrote to memory of 1076 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 117 PID 3580 wrote to memory of 1076 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 117 PID 3580 wrote to memory of 1076 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 117 PID 2824 wrote to memory of 3748 2824 cmd.exe 120 PID 2824 wrote to memory of 3748 2824 cmd.exe 120 PID 2824 wrote to memory of 3748 2824 cmd.exe 120 PID 2824 wrote to memory of 2968 2824 cmd.exe 123 PID 2824 wrote to memory of 2968 2824 cmd.exe 123 PID 2824 wrote to memory of 2968 2824 cmd.exe 123 PID 2824 wrote to memory of 4220 2824 cmd.exe 124 PID 2824 wrote to memory of 4220 2824 cmd.exe 124 PID 2824 wrote to memory of 4220 2824 cmd.exe 124 PID 2824 wrote to memory of 3596 2824 cmd.exe 125 PID 2824 wrote to memory of 3596 2824 cmd.exe 125 PID 2824 wrote to memory of 3596 2824 cmd.exe 125 PID 3596 wrote to memory of 2712 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 152 PID 3596 wrote to memory of 2712 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 152 PID 3596 wrote to memory of 2712 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 152 PID 2712 wrote to memory of 4232 2712 ssiinstall.exe 128 PID 2712 wrote to memory of 4232 2712 ssiinstall.exe 128 PID 2712 wrote to memory of 4232 2712 ssiinstall.exe 128 PID 2824 wrote to memory of 4120 2824 cmd.exe 130 PID 2824 wrote to memory of 4120 2824 cmd.exe 130 PID 2824 wrote to memory of 4120 2824 cmd.exe 130 PID 2824 wrote to memory of 3964 2824 cmd.exe 131 PID 2824 wrote to memory of 3964 2824 cmd.exe 131 PID 2824 wrote to memory of 3964 2824 cmd.exe 131 PID 4120 wrote to memory of 3604 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe 132 PID 4120 wrote to memory of 3604 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe 132 PID 4120 wrote to memory of 3604 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe 132 PID 2824 wrote to memory of 4592 2824 cmd.exe 136 PID 2824 wrote to memory of 4592 2824 cmd.exe 136 PID 2824 wrote to memory of 4592 2824 cmd.exe 136 PID 2824 wrote to memory of 1996 2824 cmd.exe 240 PID 2824 wrote to memory of 1996 2824 cmd.exe 240 PID 2824 wrote to memory of 1996 2824 cmd.exe 240 PID 2824 wrote to memory of 3884 2824 cmd.exe 138 PID 2824 wrote to memory of 3884 2824 cmd.exe 138 PID 2824 wrote to memory of 3884 2824 cmd.exe 138 PID 2824 wrote to memory of 624 2824 cmd.exe 139 PID 2824 wrote to memory of 624 2824 cmd.exe 139 PID 2824 wrote to memory of 624 2824 cmd.exe 139 PID 2824 wrote to memory of 2116 2824 cmd.exe 140 PID 2824 wrote to memory of 2116 2824 cmd.exe 140 PID 2824 wrote to memory of 2116 2824 cmd.exe 140 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00370.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4520
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe"C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe"4⤵PID:5272
-
-
-
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe--6738d7b74⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:512 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5376 -
C:\Windows\SysWOW64\drivers\spools.exe"C:\Windows\SysWow64\drivers\spools.exe" "C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exeC:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe /quiet /msicl YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=6666⤵PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=3/ct=4/rt=0 --dh 2352 --st 17308450525⤵PID:388
-
-
-
-
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 4804⤵
- Program crash
PID:624
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exeTrojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 2844⤵
- Program crash
PID:4240
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exeTrojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 3164⤵
- Program crash
PID:1376
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exeTrojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5164⤵
- Program crash
PID:2424
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exeTrojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:4220
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exeTrojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\adm\ssiinstall.exeC:\Users\Admin\AppData\Local\Temp\\adm\ssiinstall.exe /VERYSILENT /SUPPRESSMSGBOXES4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\is-O1M7O.tmp\ssiinstall.tmp"C:\Users\Admin\AppData\Local\Temp\is-O1M7O.tmp\ssiinstall.tmp" /SL5="$90110,238879,138240,C:\Users\Admin\AppData\Local\Temp\adm\ssiinstall.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Users\Admin\AppData\Local\SSI\SSIagent.exe"C:\Users\Admin\AppData\Local\SSI\SSIagent.exe" /install6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f4⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
PID:3604
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exeTrojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 2404⤵
- Program crash
PID:2288
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4592
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exeTrojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\yhmbsqlpep.exeyhmbsqlpep.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\wmdtskcl.exeC:\Windows\system32\wmdtskcl.exe5⤵PID:1420
-
-
-
C:\Windows\SysWOW64\sxpjxbmwlkipuld.exesxpjxbmwlkipuld.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\wmdtskcl.exewmdtskcl.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\ataidddsfmiiy.exeataidddsfmiiy.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4052
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""4⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exeTrojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:624 -
C:\Windows\xk.exeC:\Windows\xk.exe4⤵PID:4876
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵PID:6952
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:6248
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:6660
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:7656
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:6660
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:2860
-
-
C:\Windows\xk.exeC:\Windows\xk.exe4⤵PID:13808
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵PID:8900
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:14168
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:9124
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:13684
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:8960
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:9036
-
-
C:\Windows\xk.exeC:\Windows\xk.exe4⤵PID:8408
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵PID:2768
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:7992
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:268
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:6796
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:544
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:7412
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exeTrojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ucfbwyty.cmdline"4⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES61B3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc13997417357D4C17824CAEAC822397A.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\frs14kbb.cmdline"4⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES68C7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9CEC3983BD184A4CA31B285E3BF762.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:3672
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵PID:1040
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵PID:6884
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exeTrojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\shell.exe"C:\Windows\system32\shell.exe" "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /Quiet /All4⤵PID:9688
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exeTrojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 4764⤵
- Program crash
PID:5328 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5568
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exeTrojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exeTrojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 4764⤵
- Program crash
PID:1376 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5184
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exeTrojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookAW
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 5004⤵
- Program crash
PID:5620 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5644
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5840
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.jhu-f2e4c6892704f1684806a033976a7a7c4e7a8dfc817054563795b325e4029c40.exeTrojan-Ransom.Win32.GandCrypt.jhu-f2e4c6892704f1684806a033976a7a7c4e7a8dfc817054563795b325e4029c40.exe3⤵PID:5468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 4884⤵
- Program crash
PID:6128 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5080
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5588
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.pf-fec7120fce467903fe6e63ecd387c9c7a0c8c8394b3d9313c150727b3688991b.exeTrojan-Ransom.Win32.GandCrypt.pf-fec7120fce467903fe6e63ecd387c9c7a0c8c8394b3d9313c150727b3688991b.exe3⤵PID:5704
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.vf-ce5c683bf1b861e9ad8bb61b78d2d1100dbcf54544c90066e5e91595a79701d0.exeTrojan-Ransom.Win32.GandCrypt.vf-ce5c683bf1b861e9ad8bb61b78d2d1100dbcf54544c90066e5e91595a79701d0.exe3⤵PID:5736
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:5832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 344404⤵
- Program crash
PID:10516 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:9204
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:1956
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.xf-da8e7cf550e8ffb226418a12f91e38361117c4b7ea84f83d18d2f71f90fdf3ae.exeTrojan-Ransom.Win32.GandCrypt.xf-da8e7cf550e8ffb226418a12f91e38361117c4b7ea84f83d18d2f71f90fdf3ae.exe3⤵PID:5748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 4364⤵
- Program crash
PID:9208 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:8968
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:8088
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Gen.kwn-096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exeTrojan-Ransom.Win32.Gen.kwn-096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exe3⤵PID:5764
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet & wmic.exe shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:6140
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3672
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.txt4⤵PID:7040
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.vbs4⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.html4⤵PID:6904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7fff6c5e46f8,0x7fff6c5e4708,0x7fff6c5e47185⤵PID:7076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:25⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵PID:7448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:85⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:15⤵PID:8180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:15⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:85⤵PID:10596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:85⤵PID:10736
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Gen.kwn-096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5184 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5676
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GenericCryptor.cys-65deb10e590983d9e8e09bba4fcec93b36987a54f09c0813eb644eb634ed7673.exeTrojan-Ransom.Win32.GenericCryptor.cys-65deb10e590983d9e8e09bba4fcec93b36987a54f09c0813eb644eb634ed7673.exe3⤵PID:5776
-
C:\Windows\SysWOW64\drivers\spools.exe"C:\Windows\SysWow64\drivers\spools.exe" "C:\Users\Admin\AppData\Local\Temp\vizez.exe"4⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\vizez.exeC:\Users\Admin\AppData\Local\Temp\vizez.exe5⤵PID:5856
-
-
-
C:\Windows\SysWOW64\shell.exe"C:\Windows\system32\shell.exe" "C:\Users\Admin\AppData\Local\Temp\_uinsey.bat"4⤵PID:1720
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GenericCryptor.czx-dcb87bc736421f9f63203c74f9cd5548d1b5bfd47587d699915b528e38f4fffe.exeTrojan-Ransom.Win32.GenericCryptor.czx-dcb87bc736421f9f63203c74f9cd5548d1b5bfd47587d699915b528e38f4fffe.exe3⤵PID:5788
-
C:\Windows\SysWOW64\drivers\spools.exe"C:\Windows\SysWow64\drivers\spools.exe" "C:\Users\Admin\AppData\Local\Temp\vizez.exe"4⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\vizez.exeC:\Users\Admin\AppData\Local\Temp\vizez.exe5⤵PID:6532
-
-
-
C:\Windows\SysWOW64\shell.exe"C:\Windows\system32\shell.exe" "C:\Users\Admin\AppData\Local\Temp\_uinsey.bat"4⤵PID:440
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Locky.a-2b311111abb8fbc0591807f4f50132f87554cf37ee6aebfe40fad8bc28a0a391.exeTrojan-Ransom.Win32.Locky.a-2b311111abb8fbc0591807f4f50132f87554cf37ee6aebfe40fad8bc28a0a391.exe3⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵PID:5888
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7A4C.tmp"4⤵PID:5900
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exeTrojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exe3⤵PID:5816
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exeTrojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exe4⤵PID:6120
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.PolyRansom.bix-20fc16ef4cbf2b2fa836f7676636a2f21e1e3fb3dc0a7e104c74eb948f0029d5.exeTrojan-Ransom.Win32.PolyRansom.bix-20fc16ef4cbf2b2fa836f7676636a2f21e1e3fb3dc0a7e104c74eb948f0029d5.exe3⤵PID:5488
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe4⤵PID:5548
-
-
C:\Windows\SysWOW64\windihallssvc.exe"C:\Windows\System32\windihallssvc.exe" /i4⤵PID:6048
-
-
C:\Windows\SysWOW64\windihallssvc.exe"C:\Windows\System32\windihallssvc.exe" /start4⤵PID:5776
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe" /stop4⤵PID:5124
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe" /u4⤵PID:5908
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe" /i4⤵PID:5172
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe" /start4⤵PID:6280
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.PornoAsset.cwjb-2edf4ecb1c75775c6e585b42746115f02523fedd65f92e23d74b7d8957e7292e.exeTrojan-Ransom.Win32.PornoAsset.cwjb-2edf4ecb1c75775c6e585b42746115f02523fedd65f92e23d74b7d8957e7292e.exe3⤵PID:5868
-
C:\Windows\SysWOW64\Akfdcq32.exeC:\Windows\system32\Akfdcq32.exe4⤵PID:2784
-
C:\Windows\SysWOW64\Adnilfnl.exeC:\Windows\system32\Adnilfnl.exe5⤵PID:5780
-
C:\Windows\SysWOW64\Afnefieo.exeC:\Windows\system32\Afnefieo.exe6⤵PID:2600
-
C:\Windows\SysWOW64\Aohfdnil.exeC:\Windows\system32\Aohfdnil.exe7⤵PID:5632
-
C:\Windows\SysWOW64\Aeglbeea.exeC:\Windows\system32\Aeglbeea.exe8⤵PID:5436
-
C:\Windows\SysWOW64\Bnbmqjjo.exeC:\Windows\system32\Bnbmqjjo.exe9⤵PID:1028
-
C:\Windows\SysWOW64\Bflagg32.exeC:\Windows\system32\Bflagg32.exe10⤵PID:5844
-
C:\Windows\SysWOW64\Bkhjpn32.exeC:\Windows\system32\Bkhjpn32.exe11⤵PID:5668
-
C:\Windows\SysWOW64\Beaohcmf.exeC:\Windows\system32\Beaohcmf.exe12⤵PID:5824
-
C:\Windows\SysWOW64\Cbglgg32.exeC:\Windows\system32\Cbglgg32.exe13⤵PID:5212
-
C:\Windows\SysWOW64\Chfaenfb.exeC:\Windows\system32\Chfaenfb.exe14⤵PID:4852
-
C:\Windows\SysWOW64\Cfgace32.exeC:\Windows\system32\Cfgace32.exe15⤵PID:4864
-
C:\Windows\SysWOW64\Cnbfgh32.exeC:\Windows\system32\Cnbfgh32.exe16⤵PID:3140
-
C:\Windows\SysWOW64\Cihjeq32.exeC:\Windows\system32\Cihjeq32.exe17⤵PID:224
-
C:\Windows\SysWOW64\Cfljnejl.exeC:\Windows\system32\Cfljnejl.exe18⤵PID:2972
-
C:\Windows\SysWOW64\Dpdogj32.exeC:\Windows\system32\Dpdogj32.exe19⤵PID:4376
-
C:\Windows\SysWOW64\Dojlhg32.exeC:\Windows\system32\Dojlhg32.exe20⤵PID:5264
-
C:\Windows\SysWOW64\Diopep32.exeC:\Windows\system32\Diopep32.exe21⤵PID:4436
-
C:\Windows\SysWOW64\Dfcqod32.exeC:\Windows\system32\Dfcqod32.exe22⤵PID:5280
-
C:\Windows\SysWOW64\Donecfao.exeC:\Windows\system32\Donecfao.exe23⤵PID:5864
-
C:\Windows\SysWOW64\Dehnpp32.exeC:\Windows\system32\Dehnpp32.exe24⤵PID:5840
-
C:\Windows\SysWOW64\Doqbifpl.exeC:\Windows\system32\Doqbifpl.exe25⤵PID:5268
-
C:\Windows\SysWOW64\Eldbbjof.exeC:\Windows\system32\Eldbbjof.exe26⤵PID:1612
-
C:\Windows\SysWOW64\Elgohj32.exeC:\Windows\system32\Elgohj32.exe27⤵PID:3596
-
C:\Windows\SysWOW64\Elilmi32.exeC:\Windows\system32\Elilmi32.exe28⤵PID:3104
-
C:\Windows\SysWOW64\Eohhie32.exeC:\Windows\system32\Eohhie32.exe29⤵PID:3412
-
C:\Windows\SysWOW64\Ebeapc32.exeC:\Windows\system32\Ebeapc32.exe30⤵PID:5200
-
C:\Windows\SysWOW64\Ehbihj32.exeC:\Windows\system32\Ehbihj32.exe31⤵PID:6004
-
C:\Windows\SysWOW64\Fgcjea32.exeC:\Windows\system32\Fgcjea32.exe32⤵PID:5504
-
C:\Windows\SysWOW64\Flpbnh32.exeC:\Windows\system32\Flpbnh32.exe33⤵PID:3928
-
C:\Windows\SysWOW64\Fgffka32.exeC:\Windows\system32\Fgffka32.exe34⤵PID:464
-
C:\Windows\SysWOW64\Foakpc32.exeC:\Windows\system32\Foakpc32.exe35⤵PID:1996
-
C:\Windows\SysWOW64\Fifomlap.exeC:\Windows\system32\Fifomlap.exe36⤵PID:4012
-
C:\Windows\SysWOW64\Fcodfa32.exeC:\Windows\system32\Fcodfa32.exe37⤵PID:4976
-
C:\Windows\SysWOW64\Ggoiap32.exeC:\Windows\system32\Ggoiap32.exe38⤵PID:1336
-
C:\Windows\SysWOW64\Gojnfb32.exeC:\Windows\system32\Gojnfb32.exe39⤵PID:5148
-
C:\Windows\SysWOW64\Glnnofhi.exeC:\Windows\system32\Glnnofhi.exe40⤵PID:3924
-
C:\Windows\SysWOW64\Giboijgb.exeC:\Windows\system32\Giboijgb.exe41⤵PID:5408
-
C:\Windows\SysWOW64\Ggfobofl.exeC:\Windows\system32\Ggfobofl.exe42⤵PID:2800
-
C:\Windows\SysWOW64\Ggilgn32.exeC:\Windows\system32\Ggilgn32.exe43⤵PID:5328
-
C:\Windows\SysWOW64\Hjieii32.exeC:\Windows\system32\Hjieii32.exe44⤵PID:1556
-
C:\Windows\SysWOW64\Hjnndime.exeC:\Windows\system32\Hjnndime.exe45⤵PID:5792
-
C:\Windows\SysWOW64\Hfgloiqf.exeC:\Windows\system32\Hfgloiqf.exe46⤵PID:5944
-
C:\Windows\SysWOW64\Imcqacfq.exeC:\Windows\system32\Imcqacfq.exe47⤵PID:5372
-
C:\Windows\SysWOW64\Imfmgcdn.exeC:\Windows\system32\Imfmgcdn.exe48⤵PID:4388
-
C:\Windows\SysWOW64\Ifqoehhl.exeC:\Windows\system32\Ifqoehhl.exe49⤵PID:3004
-
C:\Windows\SysWOW64\Ioicnn32.exeC:\Windows\system32\Ioicnn32.exe50⤵PID:5948
-
C:\Windows\SysWOW64\Jonlimkg.exeC:\Windows\system32\Jonlimkg.exe51⤵PID:5124
-
C:\Windows\SysWOW64\Jginej32.exeC:\Windows\system32\Jginej32.exe52⤵PID:6200
-
C:\Windows\SysWOW64\Kcbkpj32.exeC:\Windows\system32\Kcbkpj32.exe53⤵PID:6352
-
C:\Windows\SysWOW64\Kgqdfi32.exeC:\Windows\system32\Kgqdfi32.exe54⤵PID:6456
-
C:\Windows\SysWOW64\Kaihonhl.exeC:\Windows\system32\Kaihonhl.exe55⤵PID:6592
-
C:\Windows\SysWOW64\Kpnepk32.exeC:\Windows\system32\Kpnepk32.exe56⤵PID:6700
-
C:\Windows\SysWOW64\Kanbjn32.exeC:\Windows\system32\Kanbjn32.exe57⤵PID:6748
-
C:\Windows\SysWOW64\Ljffccjh.exeC:\Windows\system32\Ljffccjh.exe58⤵PID:6808
-
C:\Windows\SysWOW64\Lhopgg32.exeC:\Windows\system32\Lhopgg32.exe59⤵PID:7000
-
C:\Windows\SysWOW64\Mhefhf32.exeC:\Windows\system32\Mhefhf32.exe60⤵PID:6600
-
C:\Windows\SysWOW64\Mjfoja32.exeC:\Windows\system32\Mjfoja32.exe61⤵PID:6604
-
C:\Windows\SysWOW64\Mdaqhf32.exeC:\Windows\system32\Mdaqhf32.exe62⤵PID:6292
-
C:\Windows\SysWOW64\Nmnnlk32.exeC:\Windows\system32\Nmnnlk32.exe63⤵PID:7360
-
C:\Windows\SysWOW64\Nhhldc32.exeC:\Windows\system32\Nhhldc32.exe64⤵PID:7548
-
C:\Windows\SysWOW64\Niihlkdm.exeC:\Windows\system32\Niihlkdm.exe65⤵PID:7620
-
C:\Windows\SysWOW64\Ohaokbfd.exeC:\Windows\system32\Ohaokbfd.exe66⤵PID:7940
-
C:\Windows\SysWOW64\Pgihanii.exeC:\Windows\system32\Pgihanii.exe67⤵PID:8040
-
C:\Windows\SysWOW64\Pdofpb32.exeC:\Windows\system32\Pdofpb32.exe68⤵PID:8152
-
C:\Windows\SysWOW64\Phpklp32.exeC:\Windows\system32\Phpklp32.exe69⤵PID:7240
-
C:\Windows\SysWOW64\Qpmmfbfl.exeC:\Windows\system32\Qpmmfbfl.exe70⤵PID:6916
-
C:\Windows\SysWOW64\Akenij32.exeC:\Windows\system32\Akenij32.exe71⤵PID:7568
-
C:\Windows\SysWOW64\Anhcpeon.exeC:\Windows\system32\Anhcpeon.exe72⤵PID:2292
-
C:\Windows\SysWOW64\Akopoi32.exeC:\Windows\system32\Akopoi32.exe73⤵PID:7736
-
C:\Windows\SysWOW64\Bkamdi32.exeC:\Windows\system32\Bkamdi32.exe74⤵PID:4608
-
C:\Windows\SysWOW64\Bnaffdfc.exeC:\Windows\system32\Bnaffdfc.exe75⤵PID:6696
-
C:\Windows\SysWOW64\Bkhceh32.exeC:\Windows\system32\Bkhceh32.exe76⤵PID:7248
-
C:\Windows\SysWOW64\Bgodjiio.exeC:\Windows\system32\Bgodjiio.exe77⤵PID:6452
-
C:\Windows\SysWOW64\Cebdcmhh.exeC:\Windows\system32\Cebdcmhh.exe78⤵PID:7224
-
C:\Windows\SysWOW64\Ckmmpg32.exeC:\Windows\system32\Ckmmpg32.exe79⤵PID:3112
-
C:\Windows\SysWOW64\Cqiehnml.exeC:\Windows\system32\Cqiehnml.exe80⤵PID:6636
-
C:\Windows\SysWOW64\Cgcmeh32.exeC:\Windows\system32\Cgcmeh32.exe81⤵PID:7048
-
C:\Windows\SysWOW64\Cgejkh32.exeC:\Windows\system32\Cgejkh32.exe82⤵PID:3096
-
C:\Windows\SysWOW64\Cnpbgajc.exeC:\Windows\system32\Cnpbgajc.exe83⤵PID:5532
-
C:\Windows\SysWOW64\Dndlba32.exeC:\Windows\system32\Dndlba32.exe84⤵PID:7028
-
C:\Windows\SysWOW64\Dioiki32.exeC:\Windows\system32\Dioiki32.exe85⤵PID:7104
-
C:\Windows\SysWOW64\Dalkek32.exeC:\Windows\system32\Dalkek32.exe86⤵PID:6256
-
C:\Windows\SysWOW64\Eblgon32.exeC:\Windows\system32\Eblgon32.exe87⤵PID:7012
-
C:\Windows\SysWOW64\Engaon32.exeC:\Windows\system32\Engaon32.exe88⤵PID:3176
-
C:\Windows\SysWOW64\Eeailhme.exeC:\Windows\system32\Eeailhme.exe89⤵PID:7272
-
C:\Windows\SysWOW64\Ebejem32.exeC:\Windows\system32\Ebejem32.exe90⤵PID:3956
-
C:\Windows\SysWOW64\Fhbbmc32.exeC:\Windows\system32\Fhbbmc32.exe91⤵PID:7764
-
C:\Windows\SysWOW64\Fbggkl32.exeC:\Windows\system32\Fbggkl32.exe92⤵PID:4800
-
C:\Windows\SysWOW64\Falcli32.exeC:\Windows\system32\Falcli32.exe93⤵PID:7980
-
C:\Windows\SysWOW64\Fkehdnee.exeC:\Windows\system32\Fkehdnee.exe94⤵PID:8100
-
C:\Windows\SysWOW64\Faopah32.exeC:\Windows\system32\Faopah32.exe95⤵PID:7932
-
C:\Windows\SysWOW64\Flddoa32.exeC:\Windows\system32\Flddoa32.exe96⤵PID:6408
-
C:\Windows\SysWOW64\Focakm32.exeC:\Windows\system32\Focakm32.exe97⤵PID:8064
-
C:\Windows\SysWOW64\Fkiapn32.exeC:\Windows\system32\Fkiapn32.exe98⤵PID:8060
-
C:\Windows\SysWOW64\Ghmbib32.exeC:\Windows\system32\Ghmbib32.exe99⤵PID:7176
-
C:\Windows\SysWOW64\Glkkop32.exeC:\Windows\system32\Glkkop32.exe100⤵PID:6692
-
C:\Windows\SysWOW64\Ghbkdald.exeC:\Windows\system32\Ghbkdald.exe101⤵PID:6504
-
C:\Windows\SysWOW64\Geflne32.exeC:\Windows\system32\Geflne32.exe102⤵PID:7116
-
C:\Windows\SysWOW64\Gkeakl32.exeC:\Windows\system32\Gkeakl32.exe103⤵PID:392
-
C:\Windows\SysWOW64\Haafnf32.exeC:\Windows\system32\Haafnf32.exe104⤵PID:5852
-
C:\Windows\SysWOW64\Hkjjfkcm.exeC:\Windows\system32\Hkjjfkcm.exe105⤵PID:7324
-
C:\Windows\SysWOW64\Hikkdc32.exeC:\Windows\system32\Hikkdc32.exe106⤵PID:6984
-
C:\Windows\SysWOW64\Hhpheo32.exeC:\Windows\system32\Hhpheo32.exe107⤵PID:7684
-
C:\Windows\SysWOW64\Hipdpbgf.exeC:\Windows\system32\Hipdpbgf.exe108⤵PID:7464
-
C:\Windows\SysWOW64\Iefedcmk.exeC:\Windows\system32\Iefedcmk.exe109⤵PID:7872
-
C:\Windows\SysWOW64\Ikcmmjkb.exeC:\Windows\system32\Ikcmmjkb.exe110⤵PID:4116
-
C:\Windows\SysWOW64\Lpdefc32.exeC:\Windows\system32\Lpdefc32.exe111⤵PID:6828
-
C:\Windows\SysWOW64\Limioiia.exeC:\Windows\system32\Limioiia.exe112⤵PID:3396
-
C:\Windows\SysWOW64\Llpofd32.exeC:\Windows\system32\Llpofd32.exe113⤵PID:6168
-
C:\Windows\SysWOW64\Miflehaf.exeC:\Windows\system32\Miflehaf.exe114⤵PID:7712
-
C:\Windows\SysWOW64\Mihikgod.exeC:\Windows\system32\Mihikgod.exe115⤵PID:7992
-
C:\Windows\SysWOW64\Mpbaga32.exeC:\Windows\system32\Mpbaga32.exe116⤵PID:7508
-
C:\Windows\SysWOW64\Mlialb32.exeC:\Windows\system32\Mlialb32.exe117⤵PID:6028
-
C:\Windows\SysWOW64\Mjjbjjdd.exeC:\Windows\system32\Mjjbjjdd.exe118⤵PID:4904
-
C:\Windows\SysWOW64\Nbhcdl32.exeC:\Windows\system32\Nbhcdl32.exe119⤵PID:4744
-
C:\Windows\SysWOW64\Nbjpjl32.exeC:\Windows\system32\Nbjpjl32.exe120⤵PID:7228
-
C:\Windows\SysWOW64\Ndjldo32.exeC:\Windows\system32\Ndjldo32.exe121⤵PID:6848
-
C:\Windows\SysWOW64\Nmbamdkm.exeC:\Windows\system32\Nmbamdkm.exe122⤵PID:544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-