Analysis
-
max time kernel
83s -
max time network
83s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08-11-2024 17:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Trojan
Resource
win10ltsc2021-20241023-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Trojan
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Downloads MZ/PE file
-
Executes dropped EXE 21 IoCs
pid Process 2496 CryptoLocker.exe 1416 {34184A33-0407-212E-3320-09040709E2C2}.exe 1744 {34184A33-0407-212E-3320-09040709E2C2}.exe 3536 CryptoLocker.exe 4656 CryptoLocker.exe 4556 CryptoLocker.exe 3228 CryptoLocker.exe 3044 CryptoLocker.exe 3440 CryptoLocker.exe 4480 CryptoLocker.exe 3936 CryptoLocker.exe 1776 CryptoLocker.exe 444 CryptoLocker.exe 1128 CryptoLocker.exe 1652 CryptoLocker.exe 4872 CryptoLocker.exe 1312 CryptoLocker.exe 1256 CryptoLocker.exe 3228 CryptoLocker.exe 1944 CryptoLocker.exe 2568 CryptoLocker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 64 raw.githubusercontent.com 65 raw.githubusercontent.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241108174351.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\5915b1c9-a5f7-41e9-b4b8-d1f616e87f4e.tmp setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 4572 msedge.exe 4572 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe 2568 msedge.exe 2568 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4816 4572 msedge.exe 81 PID 4572 wrote to memory of 4816 4572 msedge.exe 81 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1860 4572 msedge.exe 82 PID 4572 wrote to memory of 1884 4572 msedge.exe 83 PID 4572 wrote to memory of 1884 4572 msedge.exe 83 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 PID 4572 wrote to memory of 2340 4572 msedge.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Trojan1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffb47c646f8,0x7ffb47c64708,0x7ffb47c647182⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7b70e5460,0x7ff7b70e5470,0x7ff7b70e54803⤵PID:4728
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6856 /prefetch:82⤵PID:4968
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002404⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,17651137535246696635,4214908027276083366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:444
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1128
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5fffb9ed7c2c7454da60348607ac641
SHA18d1e01517d1f0532f0871025a38d78f4520b8ebc
SHA256c8dddfb100f2783ecbb92cec7f878b30d6015c2844296142e710fb9e10cc7c73
SHA5129182a7b31363398393df0e9db6c9e16a14209630cb256e16ccbe41a908b80aa362fc1a736bdfa94d3b74c3db636dc51b717fc31d33a9fa26c3889dec6c0076a7
-
Filesize
152B
MD532d05d01d96358f7d334df6dab8b12ed
SHA17b371e4797603b195a34721bb21f0e7f1e2929da
SHA256287349738fb9020d95f6468fa4a98684685d0195ee5e63e717e4b09aa99b402e
SHA512e7f73b1af7c7512899728708b890acd25d4c68e971f84d2d5bc24305f972778d8bced6a3c7e3d9f977cf2fc82e0d9e3746a6ccb0f9668a709ac8a4db290c551c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5147cd27c1c867f0460a78d788cd0cf3d
SHA1c6c3dc5482cfddccbe21212110127469e77ea8cb
SHA2563d625f75f57a837a064330bd126d36c11b51038582993f8d256a1dcabccdc3f7
SHA512f97ac60f6d5fbbfe434169c5da09335ca954a8ba088e972a38558686bd9ff5bbc8ab3b4da9a70f7b79af622a8bbe5feb4ba6aa0f42bf6e18224751259cf64ad5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57cab7708ecfc99493fa87b28923a9e29
SHA183f6c54d69cca9af853b99c6ecec8d1e66d00906
SHA2568d42621ddea05231ddc10593abafb27cb534f073717e5f3ae330efe3a497cf7f
SHA5123a7bdd9abbd9220267da10e5c28bcd3f61047e14d3cb8d5ab4c99699be20553ae115f3432469c6c2d1bf1c9555b263203509a997127a9aca8f4d954ca60ee285
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
579B
MD5890bff04897721a0501f7d443c7a30c1
SHA1f4c515025be685ea84f7f62ff72265f4c17a1d94
SHA25604b567d92390888cee06c78d7d72d943049290e97c0bd6d89706394f75ccef04
SHA5128daa636bb206b35b0cdb6515182e0b52390a8efcb39d3bb5bf7ef1756c10a5d8c238f2ee0caa7872e4ba5e71d0c67b3075ffaaf56c66c04f3b449df061e83e18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58845e.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD5cd1a45cfb81b29b05371b9a82e177aad
SHA154805f08ea817d216a975901b4940773be9a7216
SHA25631cc8015afc3f149fe066a9bdd63886ffcb7707e0a9a44f4d360c36f88ef62d6
SHA512793a6219c371a99722e4fa67dbca16a3c84b06e266ede8f8a8e603b04d1797f8a70f781b3bbecd87277cae9b0d581db89d8da3fb9cede7264c1108238abd8913
-
Filesize
5KB
MD5cd93f2ff7ee4dbd87eb488a324f5d669
SHA1c1303fad668bdbcf81615d09e7cfda86ab6bd098
SHA2566e3a8a3b67e5d2bb2d483f5fe6e27188929c25fbc5caf5148e8f0a2ce927ec7d
SHA51248f324757e8974b59da95fefefdcd4c954af65ed9cca80f24da031210934c1c1329fef49bbc487fed7916e5c12137f466b8cbf620edd3134ae5bfc5b13901d41
-
Filesize
6KB
MD509f8064a20241e3dbdbc3f9e5146a6e5
SHA1894762127fa66ddb06a1fdb004fdd67dcb659398
SHA2568721fc80e9f7afbd8b8b6a3859504c253002324e41ea71a84ac949ecc46a6e9d
SHA512f284270acebcdb43f9dc4c9f06363f0e1d3090ef66636bcbed67dfa5974e3fc8b70861565a1b62e57e349f7c3cbd0f7df023b94241305da14d00bbcb82cff496
-
Filesize
6KB
MD52b10f2bc202a2ec10732325e146ad296
SHA11ca979bf91b7131323ac218473ff83e8d8bae5d3
SHA256bd5a7afbad93895642e9ac3326b582623ee56ab93afe17cc4b9e753bf45dfa63
SHA51210a9b7a6d8e94d27972960055b8b2e92a4a4e703aefe02ec76456bdfdf700a2ae1e1cfe05c58c546ac31856b75c032aa7fbd93574651bea4bb31d42a4e151b82
-
Filesize
24KB
MD56e466bd18b7f6077ca9f1d3c125ac5c2
SHA132a4a64e853f294d98170b86bbace9669b58dfb8
SHA25674fc4f126c0a55211be97a17dc55a73113008a6f27d0fc78b2b47234c0389ddc
SHA5129bd77ee253ce4d2971a4b07ed892526ed20ff18a501c6ba2a180c92be62e4a56d4bbf20ba3fc4fbf9cf6ce68b3817cb67013ad5f30211c5af44c1e98608cb9e3
-
Filesize
24KB
MD5ac2b76299740efc6ea9da792f8863779
SHA106ad901d98134e52218f6714075d5d76418aa7f5
SHA256cc35a810ed39033fa4f586141116e74e066e9c0c3a8c8a862e8949e3309f9199
SHA512eec3c24ce665f00cd28a2b60eb496a685ca0042c484c1becee89c33c6b0c93d901686dc0142d3c490d349d8b967ecbbd2f45d26c64052fb41aad349100bd8f77
-
Filesize
1KB
MD56b92e56baa2ebd75ce2d25ecfea2ab4e
SHA14e8a12d4db6d39e36564c22d04c771630cbe100b
SHA2560bb86f3cf67dde65ccf66fc089c310a3ea9f5d1cb6dead9e92778ede6394514d
SHA5123ea7a4d294ffc631bfe47be3d7b5c363350b59b995a305bc0c55a87873e51adb1d4c68315bf6af6f4076762c423ce6821cbfbce06f6456589cb5ff51991d9b1c
-
Filesize
1KB
MD596987728d7f489e319332a746756c817
SHA14dabba9a5a43307fbe38fb324add12215bd17239
SHA256fcb547bc6bab4c50018270bb311308d0b8818bd99c65159b0984458c663c9c44
SHA512d42699b0bcc74de9a105b47a06b7aff0fdd40b638ffc176e059da71ce8175924ea73c413c3a16218c110b5098cf6508b9ed045b2dfd5eb64947feb24093c07f5
-
Filesize
874B
MD594887375f6d219caaacaa55fd6233b59
SHA1e1aceee907bb9dc18f5ad716424c87effc8b7877
SHA256192f5400840ca4bf854a00aae21b592894cf813d9012ee8baa535bd015116318
SHA5127c972a679af18fc3210113467d6091588613aa5c7dbc6f3cfd7e5a6aafd00023060f924fea510c4b4f40dad10b18b424a35777724be7359f0df5d61a9a5ba7fe
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50abbf975399e040dddfbc9301b9768fb
SHA19fc4ae9114b79772c11db2dcacd2e88276bd0b10
SHA2564068700047968fb6a84a4c6d0189c5f4ff6bf40afa25b8f9d112fb0ba1eefa53
SHA51247af48a3ed6116058498cf697854ccebe595e48f38ef20b7c2d6074bfb8c28be7afdad93625449449070b392607faa883ab04a02206a00ef7d832de320ee574d
-
Filesize
11KB
MD59c9fca6af9f11be4e9b45f20b42f9e0a
SHA1e78a71d24d7a62271494675d57b9ecdeda3f76ba
SHA25693fb8bbeca3a7cb7242f5a023051de8a7e091c0872dd4ff8ddb48829d0e732b5
SHA512af3094382c2f51dbc11b803cc21fd6635263162cb8f8576cfff83b53188a8782b944e6761b0009e60cb9e1ba6d91e137b979a46447091d6697aca5335b62b7a0
-
Filesize
8KB
MD51a544e5614bf41829969d69d8f974349
SHA1e7f7390a2ca4b28402afd7eb0250945f6dcd9570
SHA2564ab09dca3acbe8ecea2dae97bd9fab32db7bae07514f757d896803c31152910c
SHA51230246829c0f43978eb83652eaa956d2f45c9c85751b409d82065fafd2b5c4118a7d0f51798f0b07fa0bda7e2ad6a81ca90bc8380349d3c95771f48db09429666
-
Filesize
10KB
MD5bee845db97cf0739f049db36d2741a1c
SHA1305e67fc1081ae8a76fcf87ab7875b5c8d53b5f7
SHA25617947e1a235731334488d3a6a269637d9544414e3399000a742ec6e3f8f216b5
SHA51208ace5f58a6a5f2070984ee7a7a7daf7a378e7a9b412cb832c007c17e0716db3b43f2cf2b9dbf20fa80717abb70985682f3d393390b047c540ad37e40f11d1d4
-
Filesize
10KB
MD573a3302290a1224146e19b01269bd27f
SHA16ade9f9557b68960e3ea1b76f8667a0e4e34ea25
SHA25645fab01bb0f0c19fc2b15ff9e167fc1695da6505b9ab734068b1ac21b836f42c
SHA512040e53cce3d7ef9a5b36f70ccd6eda2d642c7fbfe1294869cd7582813eae7925915727a969b731b16854eb1e4803b452ef083dbfe8898bdf3aca41b62d468d39
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5ec1bcbf985843e4c6020f34b3b231aa1
SHA1ca86ca31e765314e64d09560222e1844c2810833
SHA2568401c54250997564a8afb44ef439209bc89b8d934a6e81a0ba3f6a6061bcb32c
SHA512286682dcce1a1e01483cae7c41b62f7f1b1b42c5faf3009336491f8c4546cf69c201413cc3b89994b148800489bf647234fb543fcecce317a84db04c89c4d8b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD51760ee38848ebaf9a512a6cddb2fa5b9
SHA12926287e2a5fef3ad0c2a6607f4173f8770b2f1b
SHA256d4cdf4a99fd27e841d45f643e32120e2655eeb162e996fcc1b765d459a2613e4
SHA51290ecd610a25216e03e5c501e281bd5797ee88c1667cb2b3e4e4c1d189543dce297ad8b46a0b3d53470e1df231110bec9c8f1fe17b248e1c3591643956125af6e
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444