Analysis
-
max time kernel
202s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00344.7z
Resource
win7-20240708-en
General
-
Target
RNSM00344.7z
-
Size
9.2MB
-
MD5
2fedb70cf5b5387599c79c2a2785e00d
-
SHA1
0e4fe1eb453d930ee3950c969ddcf10bdf841187
-
SHA256
b001eb3fc9a1569375c52ad71f75483b3f7a5d0b9b6d78a6493729cadc05d74b
-
SHA512
2ec43337122ef0026dcc3a47bc179dbf7bdb4ce2e05d2c55f8bc1bbd77c8195cbe9d41d1d7a7412dcc7e9111cd2719778a16f60302d9ac1e240649f2d577d5cc
-
SSDEEP
196608:TUI11pp1nVovwjMrLzmiF/oreRWX0ZTbQugpwANCUG+Z:RDpPVovwjMrPFdoreRWX0ZTbQ/CUlZ
Malware Config
Extracted
nanocore
1.2.2.0
hangulcoxpw.pw:4003
securefbi.ddns.net:4003
ef9cbd86-f3d1-405e-b5e1-df86325ab516
-
activate_away_mode
true
-
backup_connection_host
securefbi.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-08-05T09:04:02.038587836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4003
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ef9cbd86-f3d1-405e-b5e1-df86325ab516
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
hangulcoxpw.pw
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
vidar
http://montemon.com/
Extracted
xpertrat
3.1.9
10/18
nl-amsterdam.ra4wvpn.com:8585
hikari.sakananoko.io:8585
nozomi.sakananoko.io:8585
A6F228P5-F8G1-F1T6-B1X3-I7P6I4R8F6F5
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\[HOW_TO_DECRYPT_FILES].html
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Globeimposter family
-
Nanocore family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2280 cmd.exe 113 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Regedils.exe -
Vidar family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" Regedils.exe -
XpertRAT Core payload 1 IoCs
resource yara_rule behavioral1/memory/2368-21362-0x0000000000400000-0x0000000000444000-memory.dmp xpertrat -
Xpertrat family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 752 bcdedit.exe 3012 bcdedit.exe -
Renames multiple (292) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (8676) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/3892-10731-0x0000000000400000-0x00000000004AD000-memory.dmp family_vidar behavioral1/memory/3892-10857-0x0000000000400000-0x00000000004AD000-memory.dmp family_vidar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation ceqo.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeService.exe Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeService.exe.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeService.exe.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 22 IoCs
pid Process 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 2212 HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe 2096 Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2784 Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 2724 Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe 3244 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 3824 cexplorer.exe 3828 cexplorer.tmp 3892 update.exe 3268 ChameleonExplorer.exe 3772 Regedils.exe 2584 Regedils.exe 212 ChameleonExplorer.exe 3712 ChameleonFolder.exe 4584 ChameleonExplorer.exe 4876 ChameleonExplorer.exe 3916 ChameleonFolder.exe 2760 ChameleonFolder64.exe 912 ceqo.exe -
Loads dropped DLL 64 IoCs
pid Process 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 3824 cexplorer.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 3892 update.exe 3892 update.exe 3892 update.exe 3828 cexplorer.tmp 3828 cexplorer.tmp 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 2844 taskmgr.exe 2844 taskmgr.exe 2096 Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe 2096 Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe 3772 Regedils.exe 2844 taskmgr.exe 2844 taskmgr.exe 3828 cexplorer.tmp 1184 Process not Found 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 2844 taskmgr.exe 2844 taskmgr.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 3712 ChameleonFolder.exe 2844 taskmgr.exe 2844 taskmgr.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe 4584 ChameleonExplorer.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" Regedils.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe" Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry Key Local = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Regedit\\Regedils.vbs -FF" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chameleon Explorer = "\"C:\\Program Files (x86)\\Chameleon Explorer\\ChameleonExplorer.exe\" /startup" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chameleon Folder = "\"C:\\Program Files (x86)\\Chameleon Explorer\\ChameleonFolder.exe\" /startup" ChameleonFolder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\{98D5B5DF-4CC0-BA6F-5576-449DFB9B8246} = "C:\\Users\\Admin\\AppData\\Roaming\\Ramik\\ceqo.exe" ceqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe" Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Service.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe = "C:\\Users\\Admin\\AppData\\Roaming/Microsoft/Skype.exe" Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ChameleonFolder.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ChameleonFolder.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ChameleonExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Regedils.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\63WZ73PY\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROVWYKHE\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini IEXPLORE.EXE File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7CO3PKGI\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L2BFB2JG\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ChameleonFolder.exe File opened (read-only) \??\F: ChameleonExplorer.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 iplogger.org 7 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000016cf0-34.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File created C:\Windows\System32\Info.hta Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bmp98f08035.bmp" ceqo.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1572 set thread context of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 2784 set thread context of 0 2784 Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe PID 3772 set thread context of 2584 3772 Regedils.exe 74 PID 2584 set thread context of 2368 2584 Regedils.exe 81 PID 2584 set thread context of 4200 2584 Regedils.exe 88 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00272_.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-oql.xml.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\libsmb_plugin.dll.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Windows Journal\en-US\jnwmon.dll.mui Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\currency.html Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL_K_COL.HXK.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00489_.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\local_policy.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.p2.ui.overridden_5.5.0.165303.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\visualvm.conf Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02293_.WMF Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGACCBOX.XML.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libnoseek_plugin.dll.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MML2OMML.XSL.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PS2SWOOS.POC.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\THMBNAIL.PNG.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\classes.jsa.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00435_.WMF Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.intro_3.4.200.v20130326-1254.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\FreeCell.exe.mui.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14831_.GIF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15023_.GIF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Newsprint.dotx.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL106.XML.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.DirectoryServices.AccountManagement.dll Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CHECKER.POC.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\settings.js Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DigitalInk.jpg.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00563_.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\library.js Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt_3.103.1.v20140903-1938.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02233_.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\READ_ME.txt Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\currency.html Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+11.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\liberase_plugin.dll.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_zh_4.4.0.v20140623020002.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.ES.XML.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.xml.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\v8_context_snapshot.bin.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PSSKETLG.WMF Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Priority.accft Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.change_2.10.0.v20140901-1043.jar.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00685_.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_fr.properties.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\conticon.gif.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_disabled.png Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ml.pak.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00117_.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Belgrade.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0237228.WMF.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Bahia_Banderas.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files\VideoLAN\VLC\libvlc.dll.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_floating.png Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_hevc_plugin.dll.id-D0CD2F5E.[[email protected]].arrow Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_left.png Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3580 1700 WerFault.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cexplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cexplorer.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regedils.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChameleonFolder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChameleonFolder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regedils.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString update.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1196 vssadmin.exe 3880 vssadmin.exe 2240 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 4044 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AFC5DD1-9F85-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000057379b0935a2f241966f511c5b29eba2000000000200000000001066000000010000200000003a27bbb01e2c72b97ae3410cdae6eefce705e042362ff5d3d2caaee5fa3cf034000000000e800000000200002000000026fc997067c205e210e3f5a17c84a6a074598f739f6b96ca58b00a00eb78f50e20000000d24abba049a87c4192a7bba2af2391318e72a3b9160c5e72eec36e873bf2579b40000000790dd9ae048b3ab3714965cd4bcd9020f195fc31bcdfd2e92f90aed7ee70b3ea12ac7f5a3e9f704cc06bc244997ccbd0625c3bf54bccd749835f02a502745ec1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400124259233db01 iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.zip\OpenWithProgids ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.zip\shell\ = "open" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\System.RangeException ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Directory\shell\open\command\ = "\"C:\\Program Files (x86)\\Chameleon Explorer\\ChameleonExplorer.exe\" %1" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Drive\shell\open\command\ = "\"C:\\Program Files (x86)\\Chameleon Explorer\\ChameleonExplorer.exe\" %1" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Directory\shell\open ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.zip\shell ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CLSID\{A20662AD-1909-4774-8FC2-5F8BDC3A21AB} ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ChameleonExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.locked ceqo.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Drive ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f443a5c000000000000000000000000000000000000000000 ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ChameleonExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BA887275 ceqo.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Applications ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler\shell\open ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Applications\ChameleonExplorer.exe\DefaultIcon ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.zip\shell\open\command\ = "\"C:\\Program Files (x86)\\Chameleon Explorer\\ChameleonExplorer.exe\" %1" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.zip\DefaultIcon\ = "%WinDir%\\System32\\zipfldr.dll" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CLSID\{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}\LocalServer32\ = "C:\\Program Files (x86)\\Chameleon Explorer\\ChameleonExplorer.exe" ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell ChameleonExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BA887275\Shell ceqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\System.RangeException\CurVer\uid = "c4988fd4a233d3ee6f9fec5ce0237ca1" ChameleonExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BA887275\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shell32.dll,47" ceqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BA887275\Shell\Open ceqo.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Applications\ChameleonExplorer.exe ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Drive\shell\open ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CLSID\{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}\LocalServer32 ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler\shell ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags ChameleonExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.locked\ = "BA887275" ceqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\System.RangeException\CurVer\13 = "45600" ChameleonExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BA887275\DefaultIcon ceqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Drive\shell\ = "open" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler\shell\open\DropTarget\CLSID = "{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell ChameleonExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\System.RangeException ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\System.RangeException\CLSID ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.zip ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.zip\shell\open\command ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CLSID\{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}\ = "Chameleon Explorer Autoplay COM Server" ChameleonExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BA887275\Shell\Open\Command ceqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\System.RangeException\CurVer ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Directory\shell ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Directory\shell\ = "open" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Directory\shell\open\command ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.zip ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.zip\ = "ChameleonExplorer.zip" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CLSID\{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}\ProgID ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Applications\ChameleonExplorer.exe\DefaultIcon\ = "%WinDir%\\System32\\zipfldr.dll" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler\CLSID ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler\ = "Chameleon Explorer Autoplay COM Server" ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ChameleonExplorer.AutoplayEventHandler\CLSID\ = "{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}" ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ChameleonExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 ChameleonExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\CLSID\{A20662AD-1909-4774-8FC2-5F8BDC3A21AB}\ProgID\ = "ChameleonExplorer.AutoplayEventHandler" ChameleonExplorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ChameleonExplorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3160 NOTEPAD.EXE -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 8 IoCs
pid Process 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 2212 HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe 2096 Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 2784 Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe 2724 Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2844 taskmgr.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 2844 taskmgr.exe 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 2844 taskmgr.exe 3244 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 3140 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4200 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2404 7zFM.exe Token: 35 2404 7zFM.exe Token: SeSecurityPrivilege 2404 7zFM.exe Token: SeDebugPrivilege 2844 taskmgr.exe Token: SeBackupPrivilege 3384 vssvc.exe Token: SeRestorePrivilege 3384 vssvc.exe Token: SeAuditPrivilege 3384 vssvc.exe Token: SeDebugPrivilege 3244 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe Token: SeDebugPrivilege 4044 taskkill.exe Token: SeIncreaseQuotaPrivilege 4112 WMIC.exe Token: SeSecurityPrivilege 4112 WMIC.exe Token: SeTakeOwnershipPrivilege 4112 WMIC.exe Token: SeLoadDriverPrivilege 4112 WMIC.exe Token: SeSystemProfilePrivilege 4112 WMIC.exe Token: SeSystemtimePrivilege 4112 WMIC.exe Token: SeProfSingleProcessPrivilege 4112 WMIC.exe Token: SeIncBasePriorityPrivilege 4112 WMIC.exe Token: SeCreatePagefilePrivilege 4112 WMIC.exe Token: SeBackupPrivilege 4112 WMIC.exe Token: SeRestorePrivilege 4112 WMIC.exe Token: SeShutdownPrivilege 4112 WMIC.exe Token: SeDebugPrivilege 4112 WMIC.exe Token: SeSystemEnvironmentPrivilege 4112 WMIC.exe Token: SeRemoteShutdownPrivilege 4112 WMIC.exe Token: SeUndockPrivilege 4112 WMIC.exe Token: SeManageVolumePrivilege 4112 WMIC.exe Token: 33 4112 WMIC.exe Token: 34 4112 WMIC.exe Token: 35 4112 WMIC.exe Token: SeIncreaseQuotaPrivilege 4112 WMIC.exe Token: SeSecurityPrivilege 4112 WMIC.exe Token: SeTakeOwnershipPrivilege 4112 WMIC.exe Token: SeLoadDriverPrivilege 4112 WMIC.exe Token: SeSystemProfilePrivilege 4112 WMIC.exe Token: SeSystemtimePrivilege 4112 WMIC.exe Token: SeProfSingleProcessPrivilege 4112 WMIC.exe Token: SeIncBasePriorityPrivilege 4112 WMIC.exe Token: SeCreatePagefilePrivilege 4112 WMIC.exe Token: SeBackupPrivilege 4112 WMIC.exe Token: SeRestorePrivilege 4112 WMIC.exe Token: SeShutdownPrivilege 4112 WMIC.exe Token: SeDebugPrivilege 4112 WMIC.exe Token: SeSystemEnvironmentPrivilege 4112 WMIC.exe Token: SeRemoteShutdownPrivilege 4112 WMIC.exe Token: SeUndockPrivilege 4112 WMIC.exe Token: SeManageVolumePrivilege 4112 WMIC.exe Token: 33 4112 WMIC.exe Token: 34 4112 WMIC.exe Token: 35 4112 WMIC.exe Token: SeDebugPrivilege 4200 iexplore.exe Token: SeTakeOwnershipPrivilege 912 ceqo.exe Token: SeDebugPrivilege 912 ceqo.exe Token: SeIncreaseQuotaPrivilege 2592 WMIC.exe Token: SeSecurityPrivilege 2592 WMIC.exe Token: SeTakeOwnershipPrivilege 2592 WMIC.exe Token: SeLoadDriverPrivilege 2592 WMIC.exe Token: SeSystemProfilePrivilege 2592 WMIC.exe Token: SeSystemtimePrivilege 2592 WMIC.exe Token: SeProfSingleProcessPrivilege 2592 WMIC.exe Token: SeIncBasePriorityPrivilege 2592 WMIC.exe Token: SeCreatePagefilePrivilege 2592 WMIC.exe Token: SeBackupPrivilege 2592 WMIC.exe Token: SeRestorePrivilege 2592 WMIC.exe Token: SeShutdownPrivilege 2592 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2404 7zFM.exe 2404 7zFM.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 2844 taskmgr.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 2844 taskmgr.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 2844 taskmgr.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 2844 taskmgr.exe 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 2844 taskmgr.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2096 Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe 2212 HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe 2212 HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe 3772 Regedils.exe 2584 Regedils.exe 4200 iexplore.exe 3916 ChameleonFolder.exe 3916 ChameleonFolder.exe 2760 ChameleonFolder64.exe 4944 iexplore.exe 4944 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2584 Regedils.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 1572 2560 cmd.exe 37 PID 2560 wrote to memory of 1572 2560 cmd.exe 37 PID 2560 wrote to memory of 1572 2560 cmd.exe 37 PID 2560 wrote to memory of 1572 2560 cmd.exe 37 PID 2560 wrote to memory of 2212 2560 cmd.exe 38 PID 2560 wrote to memory of 2212 2560 cmd.exe 38 PID 2560 wrote to memory of 2212 2560 cmd.exe 38 PID 2560 wrote to memory of 2212 2560 cmd.exe 38 PID 2560 wrote to memory of 2096 2560 cmd.exe 39 PID 2560 wrote to memory of 2096 2560 cmd.exe 39 PID 2560 wrote to memory of 2096 2560 cmd.exe 39 PID 2560 wrote to memory of 2096 2560 cmd.exe 39 PID 2560 wrote to memory of 832 2560 cmd.exe 40 PID 2560 wrote to memory of 832 2560 cmd.exe 40 PID 2560 wrote to memory of 832 2560 cmd.exe 40 PID 2560 wrote to memory of 832 2560 cmd.exe 40 PID 2560 wrote to memory of 2360 2560 cmd.exe 41 PID 2560 wrote to memory of 2360 2560 cmd.exe 41 PID 2560 wrote to memory of 2360 2560 cmd.exe 41 PID 2560 wrote to memory of 2360 2560 cmd.exe 41 PID 2560 wrote to memory of 1596 2560 cmd.exe 42 PID 2560 wrote to memory of 1596 2560 cmd.exe 42 PID 2560 wrote to memory of 1596 2560 cmd.exe 42 PID 2560 wrote to memory of 1596 2560 cmd.exe 42 PID 2560 wrote to memory of 2784 2560 cmd.exe 43 PID 2560 wrote to memory of 2784 2560 cmd.exe 43 PID 2560 wrote to memory of 2784 2560 cmd.exe 43 PID 2560 wrote to memory of 2784 2560 cmd.exe 43 PID 2560 wrote to memory of 2724 2560 cmd.exe 44 PID 2560 wrote to memory of 2724 2560 cmd.exe 44 PID 2560 wrote to memory of 2724 2560 cmd.exe 44 PID 2560 wrote to memory of 2724 2560 cmd.exe 44 PID 2360 wrote to memory of 1784 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 45 PID 2360 wrote to memory of 1784 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 45 PID 2360 wrote to memory of 1784 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 45 PID 2360 wrote to memory of 1784 2360 Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe 45 PID 1784 wrote to memory of 2068 1784 cmd.exe 47 PID 1784 wrote to memory of 2068 1784 cmd.exe 47 PID 1784 wrote to memory of 2068 1784 cmd.exe 47 PID 1784 wrote to memory of 1196 1784 cmd.exe 48 PID 1784 wrote to memory of 1196 1784 cmd.exe 48 PID 1784 wrote to memory of 1196 1784 cmd.exe 48 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1572 wrote to memory of 3244 1572 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe 49 PID 1596 wrote to memory of 3836 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 52 PID 1596 wrote to memory of 3836 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 52 PID 1596 wrote to memory of 3836 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 52 PID 1596 wrote to memory of 3836 1596 Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe 52 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 832 wrote to memory of 3824 832 Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe 53 PID 3824 wrote to memory of 3828 3824 cexplorer.exe 54 PID 3824 wrote to memory of 3828 3824 cexplorer.exe 54 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Regedils.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00344.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2404
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2844
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\Desktop\00344\HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\Desktop\00344\HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe"C:\Users\Admin\Desktop\00344\HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
-
C:\Users\Admin\Desktop\00344\HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k4⤵PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 1924⤵
- Program crash
PID:3580
-
-
-
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exeTrojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.vbs"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.exe"C:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.exeC:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.exe"4⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- System policy modification
PID:2584 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.exe5⤵PID:2368
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\Regedit\Regedils.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4200
-
-
-
-
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exeTrojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\cexplorer.exe"C:\Users\Admin\AppData\Roaming\cexplorer.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\is-J8PST.tmp\cexplorer.tmp"C:\Users\Admin\AppData\Local\Temp\is-J8PST.tmp\cexplorer.tmp" /SL5="$1025E,6397385,121344,C:\Users\Admin\AppData\Roaming\cexplorer.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" /trialregister5⤵
- Executes dropped EXE
- Modifies registry class
PID:3268
-
-
C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" /replaceexplorer5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:212
-
-
C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe" /update5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" /update5⤵
- Executes dropped EXE
PID:4876
-
-
-
-
C:\Users\Admin\AppData\Roaming\update.exe"C:\Users\Admin\AppData\Roaming\update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im update.exe /f & erase C:\Users\Admin\AppData\Roaming\update.exe & exit4⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im update.exe /f5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
-
-
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exeTrojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\mode.commode con cp select=12514⤵PID:2068
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1196
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:3996
-
C:\Windows\system32\mode.commode con cp select=12514⤵PID:4960
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3880
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"3⤵
- Modifies Internet Explorer settings
PID:4976
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"3⤵
- Modifies Internet Explorer settings
PID:3468
-
-
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exeTrojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3900
-
-
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exeTrojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2784
-
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exeTrojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2724 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Roaming\Ramik\ceqo.exe"C:\Users\Admin\AppData\Roaming\Ramik\ceqo.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:912 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\[HOW_TO_DECRYPT_FILES].html4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4944 CREDAT:275457 /prefetch:25⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
-
C:\Windows\SysWOW64\cipher.exe"C:\Windows\System32\cipher.exe" /W:C4⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\cipher.exe"C:\Windows\System32\cipher.exe" /W:F4⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_daa942c4.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process call create "cmd.exe /c bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & vssadmin.exe delete shadows /all /quiet & net stop vss"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_68f27f7c.bat"4⤵
- System Location Discovery: System Language Discovery
PID:3636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_78631489.bat"3⤵
- System Location Discovery: System Language Discovery
PID:4332
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\READ_ME.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3160
-
C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" D:\1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Enumerates connected drives
- Modifies registry class
PID:4584 -
C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3916 -
C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder64.exe"C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder64.exe" 664763⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Public\Desktop\KEY1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3140 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\KEY2⤵PID:4640
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:340
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & vssadmin.exe delete shadows /all /quiet & net stop vss1⤵
- Process spawned unexpected child process
PID:908 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:752
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3012
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2240
-
-
C:\Windows\system32\net.exenet stop vss2⤵PID:3844
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop vss3⤵PID:4868
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
3Indicator Removal
3File Deletion
3Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-D0CD2F5E.[[email protected]].arrow
Filesize23.5MB
MD594e5f65dc96119d0226772b9040838aa
SHA1415dd1d3e79f0f423813fb967bdbeaf209158e3e
SHA25689a7bca9c6e49e6684792c734b72f8205dc3752fc7192e778a890ac5daee7d4b
SHA512ec7035de9b9352715c3bbdcc992fb46ec0548a03b839c99a5f21da8c3273672b8fb7d2a2abef0feaae5b2fe6df02038a5356d10c80a0830219dd00b225e0eea7
-
Filesize
786KB
MD5dd5ce4d765edd75eba6f311e6e0ea10a
SHA19ea7f6516e5ad0755b74463d427055f63ed1a664
SHA25664b7f8f70a7b037d10da72eaa769078b7e4d1ac8964c5eae5515d373e816ed6d
SHA512d2782310df7cc533cc9ffaf5c1903d5bc6a500c3bbe48148c1339fb5de19c835e4a8c765da1b80b3744ea231353f76f22ba4e04c78a3d950d7ee291d6eab2216
-
Filesize
1.2MB
MD5de5f74ef4e17b2dc8ad69a3e9b8d22c7
SHA142df8fedc56761041bce47b84bd4e68ee75448d2
SHA256b89a6a57b48be10103825440d2157f2c4a56e4c6b79ad13f729429cd5393bf32
SHA512515e9b498d8cd9bb03f8d9758e891d073627dfd6fb0b931650a47d6e53722aa6e1cc3caff8c0e64f4721ad2abef7a81ef4e7b49952d3c8fc325deb5bba6b3314
-
Filesize
750KB
MD5fb76f4f533203e40ce30612a47171f94
SHA1304ba296c77a93ddb033d52578fcc147397db981
SHA2563de05f18ffe9fda589a45ea539a464e58a30f70d59d71444b018064cf831c4a6
SHA512a416a6d6efbbd69209e1867f12b9d1d11b21160f6dfe07c510b43112c22c317f805c67dd9402744a6c7e1541f6b3a061c49942fe28fa70f74aea670ba9c71995
-
Filesize
1.2MB
MD596f92c8368c1e922692f399db96da1eb
SHA11a91d68f04256ef3bc1022beb616ba65271bd914
SHA256161408b86eed7c4d9a5882aa00df3f8765ed28fa4fd9aab2c9b3dceadbd527f9
SHA512b3d3fb2d78fe2df864f0e07a8bc1610ee9d65251957e0495a34c1631895293590e0fca965ec9deb160f48a4e09a2feabd3bff6fb9a0c22888a941e308de39d14
-
C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AppConfigurationInternal.zip.id-D0CD2F5E.[[email protected]].arrow
Filesize2KB
MD5ccde3fb44c0456ef1f89f7a25a883e8d
SHA1d9a8b415313ba96136f5903a40b38e86ed28fb0d
SHA25689d2ac8c9eb5f2a71889d230a4f391bf2aa3f6184e2e07fed16957fb1444bdc6
SHA5122b51778ced5b112b2e6c1bcbd23938708e2ef267c1b83b92659c7902dda9d305a6250a1231cc53e58450d1d649c837e1e17318a409586850c983872d186a79a2
-
C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AssemblyInfoInternal.zip.id-D0CD2F5E.[[email protected]].arrow
Filesize2KB
MD5b136473bf965b604ad2c7e7d75a1fd90
SHA1cbedce3bbc91d18672c43a558e1a1aa839da4567
SHA256516ca4bdfdc4ab3e5898d2b60ca434388c0a5bf2cce420f3675a1ae2deab8388
SHA512caa919935bf1d9f3b8388d390a482f1c3253a62110751bd9ebe5faa3e1e871aa1f384df560a68bcb415737240a4729091934d8600d490150721cb20284ef2c3d
-
C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Class.zip.id-D0CD2F5E.[[email protected]].arrow
Filesize1KB
MD5f8a8e838cafbe8bbb945a9e4e2fdb5bc
SHA1164438263fb2c3b3333a69411264c3530eec7fbe
SHA25673f56b0dcdc0a0ca1b76347c00de28b2397ce6c4035076dcb782600bcf0806d4
SHA5127b236311ce9a6520cdc6829422eff20e110a45ac018fa273e073b00d1d5ceb4efcf5f161b222aa258fc22f28dbaae5c463ae4ff6a2120efe22ebc42af3cd8d9c
-
C:\Program Files (x86)\desktop.ini.id-D0CD2F5E.[[email protected]].arrow
Filesize1KB
MD55ed34f179ef9ba8dd43fcb402d7d8e6e
SHA18663ca729f56384f66cf216832f96f03cfcb6757
SHA256ddb9ee33c5ec865744b6015449491bcd95bc2282d2b664454495bfff1b124041
SHA5125bf8138bc851807d53820cf6518a03708900f8071d0aefced7f8901bb8a50c942ec1887804c1097ad59b15094494fb92576979095bbe4d37f72cdfe9b60a66a8
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5594df131b48fe47455457239dbfcc57b
SHA1f57c267c5cb70f84f55c4d954e880e475317bea0
SHA25609096510aab00016ee7f9b5ec3b2cde29fad933bb2b53e71b68b20d926b116b3
SHA512ba7991cddb96495d64ee8a4234ccce53e7fe29b61bbee5a6df71abe6ed59cd7f5e311f7768cb0efabff25962997aa9e87dfcebceb8733ba530662bfb986a558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1a95f3288ee21e7a0739c99fb2404a
SHA1cb7e38bb78d1f588bfe2f2ab0d8d5bacec6b3329
SHA2560bfb53f784ae61c41069bc757c4c411b2eeb78c881c835e69574e4e413162a79
SHA512443c0e78837b1c9e2fb396034ccea0302b9e6277b31393103fe0137690820fd8b51d6ee8f49563dae1ea14c35d6bc4358d5c59fa19c1038c5974a06a29c03217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1ddd23443b8d9fb47dc9342bf616d3
SHA1a8811de0c1fbfeaacf87134b1c359edf4238f315
SHA256f36d5e64fd8667d9c1073f7c09a8574b471086c082e5a93bf95aa226e7cce323
SHA5121239bebe0133e419ef019da7c6ee707186bcf32d541048b6def24dd9883c93559d7f895ad3e3d3551dc1c5856d24362602feda1138133c5a16caaf538c8f7684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae331b6f8d6489fad7c45906d6e60d4f
SHA179d7339d90abcbb997f28e4774e6db1b6e8fdd3f
SHA256f961a7091e4c57e878ff3b19a6290990e06b4c3b69b073cd04855648c5bc7fa8
SHA5121c992028b188afef985f876a1dbd2c39b9d9acb3e8731c5d1f14308e8bae2ee61eaaf3a1ae6d1be805b58340fc5eb369511b49f0c513347ef099ec6a94e487c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54584189e0f37203993b387de4f93308f
SHA17e3ed3f159564f658132682d582ab138d756bb83
SHA25659fe04b6d91f7155edda3c21670165c848616c1ba68e3ed6e0e28aecf6d24ba0
SHA5122bb0b4df182d2a6cf698ab3c9a8f744b67871bd29c47f380dbd0618fda204e4dc4e6b4986e866b0d8c43b3070685f6aff6e0a008f8dc3f016bb99d9779761e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee827e880112d292d706534de875b0b
SHA16c80295bfda5846b8dd5c4e0d8770f83c01dfd36
SHA2566327527a7022b27a297367a7c78eb3aee113e55d319fab4f0434ba2e9769d40f
SHA512d3357c882638474e246020cb82973cc1bcbe158d33278759e4b8508a9db25ac358a132ca8e2b2ffeca9fa7359b53268cf17a9996c761dcf2fb67b8d40891cc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce11f3e861c067171e17fa29f1382050
SHA17a439821f789e6682cb1e30a0ca344527b292298
SHA256b8d0b092146a4d1abb8dbecc22645ad19432385f34220f072197cc961caa59b5
SHA512d50b7e932a996d49b2c0a6f41444c49e0072ffd9741ad24b439e059cff0d2243d6c9cb027f0c9d3232f577325ae295b2f601de91fab520ea095070d8c2fd45fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04df29e5834185706c2a93e4ca629bc
SHA1fe782f25db7372f4827031d4626c703b01139efe
SHA25619c611582ed4798dbf44d0141ce1fed4e93c90567615fbf9b1b8d2e3145f2d18
SHA5121681d14064e00b06bec645ea4a0928e71c0749780444bb43b23762769900fab6c64b44ab4341160daac2bd0efaa296bdb3196145b63ff125173d8ff4911abb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56932148f7619467807c9bfceb97f4817
SHA1ad7728c99b2070b558ee4d1976a970f3551f2483
SHA256baeabb75959878d1dd9a90b991e47212c1ce1d5f8f2508da09a1de9a223ec651
SHA5124e7e6d8cd1a89953fbd0693af8ab6f2ec518a1b65ec83b245400d64cd6c47fba73d2eb3528694a166006fefa25ae8e815e138ba1b131791aca51ad6de86c460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a5f26ab9d71740858ca0e1b9d1d572cd
SHA1fa2bd933c5509e68981c11e65b899625b2cdff67
SHA2562891f2485891569ab281a1a4794f4ec3954203ad09e9fd5bbbaf766d431d2538
SHA5128d32747ff68f55bce1f557ba6857c6cd03cb2953e522bf736ebe3870e3dba4f4261c16465206f81c17c616e3407b6eee3d4b6af37e15102c151af1077f9d4148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\[HOW_TO_DECRYPT_FILES].html
Filesize8KB
MD52c063b324abdd7ea4b2fce565f98cf93
SHA1611a439e07fc664952e05c0a73af9c736d01abbb
SHA256f468fe2e887997cd7e1d5f95505c0a072d8f61b2fecc1ccb1416400b6de52489
SHA512a48d432bd645a19003e89e18ed0e1bb4d62cecb7563d1dbec217748ed9e84484e2a3979b5429c64c67aa105d9235dc353f36905aac02c6f1bed3c8b59d96d332
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
28B
MD5abd00d2164331245130b8bbe380eec67
SHA17d4fd0bda8ef265985fea2be047dc5e6a00caae2
SHA2568b91fd2ca7f21230eeee2479b9aed27b1fe53a9b32843a0c25fd27d92471ee1c
SHA512af3e874bda44486413ae5d4b4b6d93e813beb6f6dca1eed4978da373c0a5178bb1f63889bbfa0a88955c7955201863e50866af53857c2d898dfd75f20f027979
-
Filesize
1024B
MD5f5b82627a90b60ddc68ac1964cb749dc
SHA13356765c14ec141be30c735b1133bdb4d87d805d
SHA256b3952166f7014daae15832bf2fcce89144b7534fef6ea2c28d89ae93e77bb384
SHA512ed243a59ce10a4bd1bd4d5f526f4b0a9fb0f148d1fbbad841a6ffb74bb3a7820c7074c1a9cacbdfc08c912df4632a307240c9ac9a04f3e2596af031bb4f661b0
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6KB
MD5e72a1274570ccfbddeb9312c2ecb5bbc
SHA122b0624839a1b904ce8e6aa383b42e01e86f71dc
SHA25632d914bdae4a76c34d2411566ded35e7611d04a7462a760efc7411b55f3dfd70
SHA512317bf76a09b7b78b005a970f89ced24ad131cd9bbd6f6c12f71db671bacab33b77176f500140b1248e5945fdf9efafece4d8bd65998e3609b24a3acfbbb02308
-
Filesize
217KB
MD52a1df2f93ab738e809f4c0aa347df6f0
SHA15dbe8382e64d088c88b938bb654432017c802629
SHA256b2a37720b86d15f06bf70774fe0d7011c96e9c3ff4ba2b7ab47f12efc89eb2b5
SHA512b25011975c2438b0bffd537ece262369a2220937b43fc41618af6dd628c3ac3f49e4e0c68e1f04205069f183cc82730ae247d7c8d25d0445acb7859ab70ff30c
-
Filesize
960B
MD54a2bb3d77458f17a88ece00135494779
SHA138d69332ece6cea208458c7052f0c5474b9644c0
SHA2560ccd8218676b140cf7d66b9fc134212c21768ae97d732eb96ee12d96624a6147
SHA5120c79ada465b8b36d86c6a604a417e6dc6b8ae9bc03e5696290dd91111feb66c2278e71aedf9223e7c47d11160c70ed082cc92ba2de9975d31c19fc3a338cc00c
-
Filesize
794KB
MD57d138f70fb4f39ad1706951f0a68269d
SHA1389c5151c973bd92beee59ebb070b56fb0f0b255
SHA2562c7706e1e67bf8eb4696faeb1156e7f2cd1cb57280807ade1d42014caca02258
SHA512a7c6810a53cd6dc9fd724aa29d314d68dae026ca04e32e475ebaee7d527f43be090b9460f048d192fccf16e08ff13bab9cf1e406e7605351f5a74957bd71596e
-
C:\Users\Admin\Desktop\00344\HEUR-Trojan-Ransom.MSIL.Blocker.gen-2fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0.exe
Filesize793KB
MD51f2d6a784f6c0a5dc36be0019eb68657
SHA1a833bbc122fbea12243b06a2e0fe41e3e104d8fd
SHA2562fa71c16ce2bf85c569d2a8de20fafe994bb08a08865c21b49d0d6f2ed6a10e0
SHA512d8a5c93f75e91036ce0672fa1495dc409d04d12dbb4a156b4e4a9ff633c641c80bc19afd1006fed3b87af09975f1059bf2d14f6f3ba07d671d076ea796259f4c
-
C:\Users\Admin\Desktop\00344\HEUR-Trojan-Ransom.Win32.Blocker.gen-2843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4.exe
Filesize601KB
MD50c247bd6bc404c2bcd87feff5f3d0cca
SHA1b57486d7ae9870b9de3c47112e5dc013e57fbeb7
SHA2562843f5bb3a5c0895d62f40d8d291ec1f537c9a07581c592e723aa74b22e4d4d4
SHA512ba5fc1f4b6ad7e14aef1cd7ad8db8bafd986fc921a10c803266754e03b276067f22ce5aba14f6853f847ae34904912001e8e607b3c8a015b49be51ba37267017
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Blocker.ljet-e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5.exe
Filesize614KB
MD567eaa4777ed8eab212530d7dce0a8493
SHA1b10acc0805655172fbb01c079a934bf4abe6dde3
SHA256e6f1e62524e0e65cbff009b4b3f10c5799c4244e550b6a84235ac766f730b8e5
SHA5129aba702325fb31b11f949ba5f88f09eb275de3575409502a27e2bf9be81a45d41b67e71ee3575c99cc11bd5d8ea93a5d3070ecdebe99adb59aa39dd44ff53604
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Blocker.lktw-9f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4.exe
Filesize8.3MB
MD5a1008cadb237043baf8eda8e3e6854d2
SHA13abfa8c368b1777fa6271134350e47755c02d9e7
SHA2569f7876454ef063bca2c9a91871842171314af89d75dafc07730a52c19144d6d4
SHA51258a16112d412cc0fc677a5466488af4899c34ba2e73665d9abe9746e9514bcbf6bdfe7c045698ab330e666b95e91959da8eba022fe55699f9c0e2b692091cd14
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Crusis.to-9d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa.exe
Filesize92KB
MD5df3b5f98a4de732dc7c005b817f7fa70
SHA16fecfeb1c43de3b21a370075e02ca7991b71aa66
SHA2569d9a23d41135defde86a0c0e0f7887586db1324efde2cd319987a905e97879fa
SHA51276b311fbacef57792ff76f893676aefb64d4c5718fe2da9070cbf9c2c14a19edba14952ec3ed40a11ad28325c00d6fd8d8fadd3bd26129720d6fcb5a645c7b67
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Crypmod.aald-521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e.exe
Filesize380KB
MD5cefeba2bba1776d8b904415f52e14b7f
SHA1733ab20ca21d86cd9a5fe4722c11783e51f88c9f
SHA256521e8b48c7c4d54ffeaee381118505215b0dd36ada17b5452e1eaacac4e3a70e
SHA512c869434f72fecc2b183ffd7d768a891a99e46d323a7f48da4db097f0a13e3510c3279ad8209b5ac2a6249c642ffb3ab749d4b225af5f6e2ee551e235b668c18e
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Foreign.nzwr-d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed.exe
Filesize688KB
MD581fa26047d27d53c064ecb143ad8b9b5
SHA196331f8c62c36dbb313060774785028dfc3a7889
SHA256d58a98fb618ee4194332e70779b2f2f78ec569e955c3b204ae6705ddbb13dbed
SHA5121235ab2d8e39c192ed2cae66ad5b6b9497f71fde4adda62e4c3dde18b69fcc1baa2a48b6007524c05bfec5bfa5e8a60665e9c1de2c48cdcb4d9b90454e138d8d
-
C:\Users\Admin\Desktop\00344\Trojan-Ransom.Win32.Gen.hee-7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe
Filesize443KB
MD5fd5ae61959c9590036881cb809891029
SHA1f930d520913b407ab3cb5d7ecf5ee2a7dca1c071
SHA2567cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57
SHA5122feb832498370c7635d42913a4328b3ba797e67cf6f7cdadc769dd549b251b05f340899229fcf76ccc1f8fe5d1512d769f581079ac06c6459669d536ba1c1fbb
-
Filesize
669B
MD5e29f641dd951eeaca4890622b50a2442
SHA11bfe431338ece2cf182216d02f7d96be1230a0ba
SHA25607e9dbdadfc6794271d06c1eb1c3108aebb9e220cbdc1bcd573747a92ab80657
SHA512a6c7074da01f85b82fb4263ecae293f9fbf40aa820dc2c7057e4d7fc4f3306014efd86bacee8b97ca461f36e0759b906288512b93f6fafe3a5271453b192267c
-
Filesize
377B
MD5a51e9a11316a3441098a9fd9c0c33ebe
SHA1cbd579d3fe934f009aa0a1e8e5a56a9d4d2659cd
SHA2560a7b0d5564c3dd702d750bb6813555f625329e6e380d5c22020c50ed41a3177b
SHA51254b3d3a4880c197688fb3ba01b8b9c0a2f8ef93e15ccc682d92520692e710859fc0595c9d91f2e8d22df616e840c6bf9bd7069540bed15bb3f603b9a823fcf17
-
Filesize
916B
MD5e719765e139dd67e925670f23f21db17
SHA121871582e1f7d80e65ed7ee63fdd413f6ac63826
SHA256642ee2963624d083a0c75433216c14bd339d305841ab1e70d77a4e8f37d9f6c3
SHA512f25c5f30cae1d782dda95fe4f256590a1330d7e24e02049eac0295b52767418f404cd9e5583fd0827579a5f637fe27c28935d27385973061f4cc8150034a5ade
-
Filesize
213B
MD5a35f5544e35fa228591a82e76ce1241e
SHA11920ea2d6e5934bdaccdda7c34323048eb930847
SHA25699d059f08954377d5cc91d05e77d052d5d00d6cff4eebdaed791d3c45d7912a3
SHA512d193360e84cd6933f610983a5b30d71e405fef123f14910b476df6dea50d1b4064784b495e325f69b60348e994d5055440ddbf234680a2a90fc3eb6c70e46c7c
-
Filesize
597B
MD596ffe05ca91c04e29728f972823af6c8
SHA18cfcdda1ec99e6925a07bf95c7b2dc327a89e581
SHA2561e17f6b5e508bd0f975618e5b943ccaf2c80aff441072402aeb2f0d07ef9e34a
SHA5122dd630cef9604b6d424e69274eb95ab2696bb623a14c34bf57f6a9fdb17c35d012fc612b39e7277e60f0d8ad661a7e04523896ce3714344fb3914889d9f80ded
-
Filesize
1KB
MD5e93a4a863cf3686f6351193fb5137e76
SHA10aa792f52a8e83710fffed813bc77d6c6a4913b0
SHA2563d8a798f8223f6f228c8d1b0d0ee8a84a316a24a40c1cd6a9c44eabc145646c9
SHA51276f648cb1109f2e4407276953c1ad0df27614a92e342ab5bd065cdc65590b4255b0fdba37729b0158cb1f1ad4676b13a9e04e5cf2fdf7363fbee86dc2881165a
-
Filesize
857B
MD5ff1f4ff687a6708f4faeec9f544ed845
SHA14d683cd827558b625ac7a86aa029d8a79eb2cf77
SHA256ff6835d38b5606967a7a6c24e42fe3bfc88e440b85d700880be5b594877c6408
SHA512fcbfd792def7bc5a4421db6a88262780c62b04e0f18c66c48c7b654158dd2217832e28c625136c4643174f1945ab05106bdbc6d4c84b8f21ea1d4fef5b5eab13
-
Filesize
3KB
MD5371d75393258c8837a5e7e190cde6c37
SHA1cc4dff14f241319268344be3d9530a357a57f127
SHA256f19e2468f89dd2ddc296d8018e2750327042d4705d5044b26a69b3b0e61f7411
SHA512c9d6beb4902160b2cc0caf14d6e37d71724d6936423829478d0e579aae8990f99870cdea73e8b2d70001eed907eb6aebceb0999b2146d9943bff024c1783cbd6
-
Filesize
5KB
MD5370c46f6402abdce3cdb40023aa0806a
SHA1e876336f94bb335d480178af3741585b9c59558c
SHA2565f235ad7eb21e11f9b25f9d0c252df86ea93c8132e77f9911c909cfa44de6b1b
SHA512199fa57f4ec229b54dae3385bfcee61945a4b8eb32964676c60bfd8f616ee4bcf6d97d2f0d33530193f60470c25229386594584fbc6fd7a090d54e7acf4994e1
-
Filesize
28KB
MD5c81bc577d6a8209dab30e83db1164409
SHA1854460bae9702c98dbdabcbcf8ce9051bea88b80
SHA25647f597b4429e235024e19152ed8159797f938bd4f3507b625f4ef5795827591a
SHA51200804e331e7f0b7520ea9d62e482285e7f272f39f5311d459c6fb821b9ccef25ac240830d0f498c991d4764c94267b7d32dd15fe2ad9f891f8f14caa8cb08e74
-
Filesize
2KB
MD5bcbd1e6a3d9e6f3b733ff965298b67c6
SHA1cb3b45fe66072242a5aaf80f783b36ca7747f75a
SHA2566d994528e00d684fa6560b6eae3e44fb1f56a4d1d6c46f81870f9b94075b36b7
SHA5120c5f7517e4c7cfe4133e5e88f09e657f15e3c436d5191c24cf10616bc678ba88fecd040a6f8f11b6320c0ec9e48b9dbb7517855d1fdd2957fa7b5bb800f35270
-
Filesize
1KB
MD58554440d3877ab3c6a001d07c6f93ebe
SHA11bfb9ab69d24ea7f07130dd9c3a73e41a98da081
SHA256486f966ce350010e8e1fde1dc4778707a8404ccc7b19523498b2f7951a8c7783
SHA512eeba934a164d2ad27855e5f2b915a45d54b8d945c347092a1d6551eba83c088e3797a7b7e3dabcb629001aaa0e810399ef762352689a7e54815667f29462e967
-
F:\$RECYCLE.BIN\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.id-D0CD2F5E.[[email protected]].arrow
Filesize1KB
MD5ea7010fb689a6a5537f2f6a85e09863b
SHA148c9ef8daf4bf85cfdb377c8370feb5c2003b1a8
SHA25655bde566211b0fad0b25c31aff9dee96cac2d58da929871ea4ca6c2e7279a509
SHA512f4816d70e2e3265641f680c9431aafd2e5ea3fa3693f07575cbe9aaa9cc03aed52b24f67e307ab44091f437ab5cfd9533cf4c665b5d565cc27c3a93d92a8db47
-
Filesize
14.4MB
MD592a3d0847fc622b31f2d0c273a676c0e
SHA1e642d694367cc98a8863d87fec82e4cf940eb48a
SHA2569a9923c08d3fc5937b6ed189e20cf416482a079bc0c898c4ed75329e0ee3ae89
SHA51201d13fd9a0dd52bc2e3f17af7a999682201c99ecf7218bca254a4944a483fd1dec2a3e6d59def501a024ad760b849787902ecb55bd33d23fa9651c0a7689cd1c
-
Filesize
1.1MB
MD5729bc0108bcd7ec083dfa83d7a4577f2
SHA10b4efa5e1764b4ce3e3ae601c8655c7bb854a973
SHA256b1c68b1582ebb5f465512a0b834ccac095460b29136b6c7eea0475612bf16b49
SHA51249c83533ce88d346651d59d855cff18190328795401c1277f4e3d32ff34f207d2c35f026785aa6c4a85624d88bf8c927654907faf50db1d57447730d9d6ac44c
-
Filesize
6.5MB
MD5d8388140b196952bc419141fa07ac0c9
SHA171e6f4a14964c39a9b827479ffe90ec07b9145e3
SHA2566d77ff618ac5c4306dea8f34e66092e146f172570e88a3ac05166068e5a4abd6
SHA5124f8e089eba0cc90af09321cc83297cf763b9899cb65cd1ebd44697866e7458fa5ba1f3ace9e6cf7875c92fa5ac7d7fe85ff3a4af0c6f659b1849c03bba674e22
-
Filesize
658KB
MD5347ecde6b031093be884e55e98de6c08
SHA147accc91f6bda29250ee52fe61a1912ad2f66591
SHA25659a9102c4ba03020b4a73d8f31cd2ff6d68a3293bd288f00eb1a16ef4ab04518
SHA51230c78c75bce439982687489975720d7a185bca50dd69631c4a9b51d6b9ee29f9cefb03ae059cf83ab664a066d85a021f79efa547ef06830a5b74aaafa1398130