Analysis
-
max time kernel
160s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00341.7z
Resource
win7-20240903-en
General
-
Target
RNSM00341.7z
-
Size
4.7MB
-
MD5
89d6fd75828e74fc7447e9a0c5c88fd8
-
SHA1
2a50e26fa610d0782d88cd932dea6a75d680fc16
-
SHA256
d65ee752bb8afda85bf33265285ea298d1ed91ac0b863a34c1dda243dfb52762
-
SHA512
3668a93ba0186d8f9b9afa894652417a81117f1cc53b88ad1b1f353293d4e63770cf5b5df1e16756366c995d648291ecb428e2203c6ffd25154b8cd4c0639bfd
-
SSDEEP
98304:35Vodvxpy8/z2MeKGsWrj6ovnuW++kaWYKjOkzVjeBP8CEWlt:pVodvH/z2AGsWf6suraXfkZj6Pa2
Malware Config
Extracted
C:\$Recycle.Bin\SPYBQEEUUQ-DECRYPT.txt
http://gandcrabmfe6mnef.onion/fd44af66fa291bc9
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exewin32updates.exewin32driverhost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ win32updates.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ win32driverhost.exe -
Renames multiple (126) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (299) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 346 2008 powershell.exe 348 2008 powershell.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
win32driverhost.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exewin32updates.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion win32driverhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion win32updates.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion win32updates.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion win32driverhost.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
Processes:
Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\SPYBQEEUUQ-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\fa291c24fa291bc472.lock Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe -
Executes dropped EXE 17 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeTrojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exeTrojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeugpod.exeugpod.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe0ae2362c.exe0ae2362c.exewin32updates.exewin32driverhost.exepid process 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 2636 HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe 1852 Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe 2500 Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe 1928 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe 1840 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 1904 ugpod.exe 1764 ugpod.exe 1592 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 272 0ae2362c.exe 2380 0ae2362c.exe 880 win32updates.exe 2896 win32driverhost.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
win32driverhost.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exewin32updates.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine win32driverhost.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine win32updates.exe -
Loads dropped DLL 10 IoCs
Processes:
cmd.exetaskmgr.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exewin32updates.exepid process 2768 cmd.exe 2768 cmd.exe 2640 taskmgr.exe 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 2640 taskmgr.exe 1592 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 1592 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe 880 win32updates.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 43 IoCs
Processes:
Dwm.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exeTrojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exewin32updates.execonhost.exeExplorer.EXEconhost.execmd.exeDllHost.exeDllHost.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exeDllHost.execmd.exeDllHost.exepowershell.execonhost.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exewmic.exeDllHost.exeDllHost.exeTrojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exeexams.exeDllHost.exetaskmgr.exeDllHost.exetaskhost.execonhost.exevssadmin.exewin32driverhost.exeDllHost.exerundll32.exeDllHost.execmd.exeugpod.execonhost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75CBFCC5-80CC-343F-BE52-1462CDC6729D} = "C:\\Users\\Admin\\AppData\\Roaming\\Ymmy\\ugpod.exe" Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" win32updates.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" wmic.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\write = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\exams.exe -boot" exams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PremiumOs4 = "C:\\ProgramData\\Microsoft\\Windows\\PremiumOs4.exe" Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" vssadmin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" win32driverhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" ugpod.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7351170fbca2af9a6b59f3a77351170f = "C:\\Users\\Admin\\AppData\\Roaming\\7351170fbca2af9a6b59f3a77351170f\\0ae2362c.exe" DllHost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exedescription ioc process File opened (read-only) \??\A: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/3032-975-0x0000000000ED0000-0x0000000001580000-memory.dmp autoit_exe behavioral1/memory/3032-1334-0x0000000003AF0000-0x00000000041A0000-memory.dmp autoit_exe behavioral1/memory/3032-1350-0x0000000000ED0000-0x0000000001580000-memory.dmp autoit_exe behavioral1/memory/880-1541-0x00000000009E0000-0x0000000001090000-memory.dmp autoit_exe behavioral1/memory/2896-1602-0x0000000000B10000-0x00000000011C0000-memory.dmp autoit_exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\pidor.bmp" Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\wallpaper = "C:\\Users\\Admin\\wallpaper.png" powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
taskhost.exeExplorer.EXEDwm.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeugpod.exevssadmin.exeDllHost.exeDllHost.execonhost.execonhost.exewin32updates.exeDllHost.exeDllHost.exewin32driverhost.execonhost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exepid process 1064 taskhost.exe 1064 taskhost.exe 1064 taskhost.exe 1064 taskhost.exe 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe 1764 ugpod.exe 1764 ugpod.exe 1764 ugpod.exe 1692 vssadmin.exe 1692 vssadmin.exe 1692 vssadmin.exe 2384 DllHost.exe 2384 DllHost.exe 2384 DllHost.exe 1424 DllHost.exe 1424 DllHost.exe 1424 DllHost.exe 2992 conhost.exe 2992 conhost.exe 2992 conhost.exe 1764 ugpod.exe 228 conhost.exe 228 conhost.exe 228 conhost.exe 880 win32updates.exe 1924 DllHost.exe 1924 DllHost.exe 1924 DllHost.exe 2748 DllHost.exe 2748 DllHost.exe 2748 DllHost.exe 2896 win32driverhost.exe 2664 conhost.exe 2664 conhost.exe 2664 conhost.exe 1256 DllHost.exe 1256 DllHost.exe 1256 DllHost.exe 2628 DllHost.exe 2628 DllHost.exe 2628 DllHost.exe 1256 DllHost.exe 1256 DllHost.exe 1256 DllHost.exe 344 DllHost.exe 344 DllHost.exe 344 DllHost.exe 1268 DllHost.exe 1268 DllHost.exe 1268 DllHost.exe 2016 DllHost.exe 2016 DllHost.exe 2016 DllHost.exe 1164 DllHost.exe 1164 DllHost.exe 1164 DllHost.exe 2712 DllHost.exe -
Suspicious use of SetThreadContext 27 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeugpod.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe0ae2362c.exeDwm.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exewin32updates.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.execmd.exeexams.exepowershell.exedescription pid process target process PID 3036 set thread context of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 1904 set thread context of 1764 1904 ugpod.exe ugpod.exe PID 1840 set thread context of 1592 1840 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe PID 272 set thread context of 2380 272 0ae2362c.exe 0ae2362c.exe PID 1176 set thread context of 2384 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 1424 1176 Dwm.exe DllHost.exe PID 1148 set thread context of 212 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe wmic.exe PID 1176 set thread context of 228 1176 Dwm.exe conhost.exe PID 3032 set thread context of 880 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe win32updates.exe PID 1176 set thread context of 1924 1176 Dwm.exe DllHost.exe PID 880 set thread context of 2896 880 win32updates.exe win32driverhost.exe PID 1176 set thread context of 2748 1176 Dwm.exe DllHost.exe PID 2580 set thread context of 2120 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe cmd.exe PID 2580 set thread context of 268 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe cmd.exe PID 268 set thread context of 2108 268 cmd.exe exams.exe PID 1176 set thread context of 2664 1176 Dwm.exe conhost.exe PID 1176 set thread context of 1256 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 2628 1176 Dwm.exe DllHost.exe PID 2108 set thread context of 876 2108 exams.exe exams.exe PID 1176 set thread context of 1256 1176 Dwm.exe DllHost.exe PID 2008 set thread context of 956 2008 powershell.exe rundll32.exe PID 1176 set thread context of 344 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 1268 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 2016 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 1164 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 2712 1176 Dwm.exe DllHost.exe PID 1176 set thread context of 2436 1176 Dwm.exe DllHost.exe -
Drops file in Program Files directory 44 IoCs
Processes:
Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exedescription ioc process File opened for modification C:\Program Files\OutCompare.js Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\PushUninstall.dot Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\RequestNew.gif Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\ResolveRevoke.mpeg3 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\SearchFind.css Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\SPYBQEEUUQ-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files\fa291c24fa291bc472.lock Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\EditMove.asx Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fa291c24fa291bc472.lock Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\RegisterConvertTo.hta Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\RestartPush.vstx Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\StepPush.scf Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\CompleteConnect.contact Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\GroupPop.TS Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\OpenBlock.tiff Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\ReceiveUnregister.DVR-MS Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\SPYBQEEUUQ-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\ApproveShow.vst Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\CheckpointGroup.htm Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\HideApprove.mht Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\PushStop.xml Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\SwitchStep.easmx Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\UnblockRepair.ppsx Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\SPYBQEEUUQ-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\fa291c24fa291bc472.lock Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\AddCompare.shtml Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\CloseExpand.wmf Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\UnblockSave.svgz Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\fa291c24fa291bc472.lock Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\SPYBQEEUUQ-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\ConvertToUnpublish.mp3 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\RevokeApprove.htm Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\ApproveSkip.jpg Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\LimitSubmit.ogg Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\SelectUndo.mpe Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\UnlockHide.xml Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files\SPYBQEEUUQ-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\CompressRequest.css Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\ResetInvoke.js Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\SetEnter.snd Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\TraceInstall.wmv Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\fa291c24fa291bc472.lock Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\DebugClose.html Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe File opened for modification C:\Program Files\RenameGrant.snd Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 696 876 WerFault.exe exams.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.execmd.exewmic.execmd.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe0ae2362c.exewin32updates.exewin32driverhost.execmd.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exeTrojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe0ae2362c.exeexams.exeexams.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ae2362c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32updates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32driverhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ae2362c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exams.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exams.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1692 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE -
Processes:
Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 040000000100000010000000a923759bba49366e31c2dbf2e766ba870f000000010000001400000007eeabaf80a9ef4ae1b2cb9b4b5fc70d0428e6a953000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00b000000010000002e00000053007400610072006600690065006c006400200054006500630068006e006f006c006f0067006900650073000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000a848b4242fc6ea24a0d78e3cb93c5c78d79833e41d00000001000000100000005959ddbc9c7632ba0a05f06316846fe6030000000100000014000000317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca619000000010000001000000044ba5fd9039fc9b56fd8aadccd597ca62000000001000000eb020000308202e730820250020101300d06092a864886f70d01010505003081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d301e170d3939303632363030313935345a170d3139303632363030313935345a3081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ce3a71cae5abc8599255d7abd8740ef9eed9f655475965470e0555dceb98363c5c535dd330cf38ecbd4189ed254209246b0a5eb37cdd522d4ce6d4d67d5a59a965d449132d244d1c506fb5c185543bfe71e4d35c42f980e0911a0a5b393667f33f557c1b3fb45f647334e3b412bf8764f8da12ff3727c1b343bbef7b6e2e69f70203010001300d06092a864886f70d0101050500038181003b7f506f6f509499496238381f4bf8a5c83ea78281f62bc7e8c5cee83a1082cb18008e4dbda8587fa17900b5bbe98daf41d90f34ee218119a0324928f4c48e56d55233fd50d57e996c03e4c94cfccb6cab66b34a218ce5b50c323e10b2cc6ca1dc9a984c025bf3ceb99ea5720e4ab73f3ce61668f8beed744cbc5bd5621f43dd Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 0f00000001000000140000000f6aad4c3fe04619cdc8b2bd655aa1a26042e6500b000000010000005400000053007400610072006600690065006c006400200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b06010505070303140000000100000014000000bf5fb7d1cedd1f86f45b55acdcd710c20ea988e71d000000010000001000000090c4f4233b006b7bfaa6adcd8f577d77030000000100000014000000ad7e1c28b064ef8f6003402014c3d0e3370eb58a2000000001000000130400003082040f308202f7a003020102020100300d06092a864886f70d01010505003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137333931365a170d3334303632393137333931365a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100b732c8fee971a60485ad0c1164dfce4defc80318873fa1abfb3ca69ff0c3a1dad4d86e2b5390fb24a43e84f09ee85fece52744f528a63f7bdee02af0c8af532f9eca0501931e8f661c39a74dfa5ab673042566eb777fe759c64a99251454eb26c7f37f19d530708fafb0462affadeb29edd79faa0487a3d4f989a5345fdb43918236d9663cb1b8b982fd9c3a3e10c83bef0665667a9b19183dff71513c302e5fbe3d7773b25d066cc323569a2b8526921ca702b3e43f0daf087982b8363dea9cd335b3bc69caf5cc9de8fd648d1780336e5e4a5d99c91e87b49d1ac0d56e1335235edf9b5f3defd6f776c2ea3ebb780d1c42676b04d8f8d6da6f8bf244a001ab020103a381c53081c2301d0603551d0e04160414bf5fb7d1cedd1f86f45b55acdcd710c20ea988e73081920603551d2304818a3081878014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7a16ca46a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100059d3f889dd1c91a55a1ac69f3f359da9b01871a4f57a9a179092adbf72fb21eccc75e6ad88387a197ef49353e7706415862bf8e58b80a673fecb3dd21661fc954fa72cc3d4c40d881af779e837abba2c7f534178ed91140f4fc2c2a4d157fa7625d2e25d3000b201a1d68f917b8f4bd8bed2859dd4d168b1783c8b265c72d7aa5aabc53866ddd57a4caf820410b68f0f4fb74be565d7a79f5f91d85e32d95bef5719043cc8d1f9a000a8729e95522580023eae31243295b4708dd8c416a6506a8e521aa41b4952195b97dd134ab13d6adbcdce23d39cdbd3e7570a1185903c922b48f9cd55e2ad7a5b6d40a6df8b74011469a1f790e62bf0f97ece02f1f1794 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 8 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeTrojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exepid process 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe 2636 HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe 1928 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe 1840 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 2500 Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeugpod.exepid process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe 2640 taskmgr.exe 2640 taskmgr.exe 1904 ugpod.exe 1904 ugpod.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
taskmgr.exeExplorer.EXEpid process 2640 taskmgr.exe 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 42 IoCs
Processes:
0ae2362c.exeExplorer.exeDwm.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exewin32updates.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.execmd.exepowershell.exepid process 2380 0ae2362c.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 2928 Explorer.exe 1176 Dwm.exe 1176 Dwm.exe 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe 1176 Dwm.exe 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe 1176 Dwm.exe 880 win32updates.exe 1176 Dwm.exe 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe 268 cmd.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 2008 powershell.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exetaskmgr.exepowershell.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe0ae2362c.exeExplorer.execonhost.execmd.exetaskhost.exeDwm.exeExplorer.EXEDllHost.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.execonhost.exeugpod.exeTrojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.execonhost.exevssadmin.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exeTrojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exevssvc.exeDllHost.exeDllHost.execonhost.exewin32updates.exeDllHost.exewmic.exedescription pid process Token: SeRestorePrivilege 2088 7zFM.exe Token: 35 2088 7zFM.exe Token: SeSecurityPrivilege 2088 7zFM.exe Token: SeDebugPrivilege 2640 taskmgr.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 1592 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe Token: SeDebugPrivilege 2380 0ae2362c.exe Token: SeDebugPrivilege 2928 Explorer.exe Token: SeDebugPrivilege 2640 taskmgr.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 868 conhost.exe Token: SeDebugPrivilege 2768 cmd.exe Token: SeDebugPrivilege 1064 taskhost.exe Token: SeDebugPrivilege 1176 Dwm.exe Token: SeDebugPrivilege 1200 Explorer.EXE Token: SeDebugPrivilege 636 DllHost.exe Token: SeDebugPrivilege 2636 HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe Token: SeDebugPrivilege 1740 conhost.exe Token: SeDebugPrivilege 1764 ugpod.exe Token: SeDebugPrivilege 1852 Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe Token: SeDebugPrivilege 2992 conhost.exe Token: SeDebugPrivilege 1692 vssadmin.exe Token: SeDebugPrivilege 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe Token: SeDebugPrivilege 3032 Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe Token: SeDebugPrivilege 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe Token: SeDebugPrivilege 1928 Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe Token: SeDebugPrivilege 2500 Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe Token: SeBackupPrivilege 2192 vssvc.exe Token: SeRestorePrivilege 2192 vssvc.exe Token: SeAuditPrivilege 2192 vssvc.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeDebugPrivilege 2384 DllHost.exe Token: SeDebugPrivilege 1424 DllHost.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeDebugPrivilege 228 conhost.exe Token: SeDebugPrivilege 2580 HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe Token: SeDebugPrivilege 880 win32updates.exe Token: SeDebugPrivilege 1924 DllHost.exe Token: SeDebugPrivilege 212 wmic.exe Token: SeIncreaseQuotaPrivilege 212 wmic.exe Token: SeSecurityPrivilege 212 wmic.exe Token: SeTakeOwnershipPrivilege 212 wmic.exe Token: SeLoadDriverPrivilege 212 wmic.exe Token: SeSystemProfilePrivilege 212 wmic.exe Token: SeSystemtimePrivilege 212 wmic.exe Token: SeProfSingleProcessPrivilege 212 wmic.exe Token: SeIncBasePriorityPrivilege 212 wmic.exe Token: SeCreatePagefilePrivilege 212 wmic.exe Token: SeBackupPrivilege 212 wmic.exe Token: SeRestorePrivilege 212 wmic.exe Token: SeShutdownPrivilege 212 wmic.exe Token: SeDebugPrivilege 212 wmic.exe Token: SeSystemEnvironmentPrivilege 212 wmic.exe Token: SeRemoteShutdownPrivilege 212 wmic.exe Token: SeUndockPrivilege 212 wmic.exe Token: SeManageVolumePrivilege 212 wmic.exe Token: 33 212 wmic.exe Token: 34 212 wmic.exe Token: 35 212 wmic.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeIncreaseQuotaPrivilege 212 wmic.exe Token: SeSecurityPrivilege 212 wmic.exe Token: SeTakeOwnershipPrivilege 212 wmic.exe Token: SeLoadDriverPrivilege 212 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exeExplorer.EXEpid process 2088 7zFM.exe 2088 7zFM.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 1200 Explorer.EXE 1200 Explorer.EXE 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exeExplorer.EXEpid process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 2640 taskmgr.exe 1200 Explorer.EXE 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 1200 Explorer.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe0ae2362c.execonhost.exepid process 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe 2500 Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe 2500 Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe 1148 Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe 2500 Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe 1840 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 1840 Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe 272 0ae2362c.exe 272 0ae2362c.exe 228 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeugpod.exeTrojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exedescription pid process target process PID 2768 wrote to memory of 2580 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe PID 2768 wrote to memory of 2580 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe PID 2768 wrote to memory of 2580 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe PID 2768 wrote to memory of 2580 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe PID 2768 wrote to memory of 2636 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe PID 2768 wrote to memory of 2636 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe PID 2768 wrote to memory of 2636 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe PID 2768 wrote to memory of 2636 2768 cmd.exe HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe PID 2768 wrote to memory of 3036 2768 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 2768 wrote to memory of 3036 2768 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 2768 wrote to memory of 3036 2768 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 2768 wrote to memory of 3036 2768 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 3032 2768 cmd.exe Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe PID 2768 wrote to memory of 1852 2768 cmd.exe Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe PID 2768 wrote to memory of 1852 2768 cmd.exe Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe PID 2768 wrote to memory of 1852 2768 cmd.exe Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe PID 2768 wrote to memory of 1928 2768 cmd.exe Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe PID 2768 wrote to memory of 1928 2768 cmd.exe Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe PID 2768 wrote to memory of 1928 2768 cmd.exe Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe PID 2768 wrote to memory of 1928 2768 cmd.exe Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe PID 2768 wrote to memory of 1148 2768 cmd.exe Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe PID 2768 wrote to memory of 1148 2768 cmd.exe Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe PID 2768 wrote to memory of 1148 2768 cmd.exe Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe PID 2768 wrote to memory of 1148 2768 cmd.exe Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe PID 2768 wrote to memory of 1840 2768 cmd.exe Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe PID 2768 wrote to memory of 1840 2768 cmd.exe Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe PID 2768 wrote to memory of 1840 2768 cmd.exe Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe PID 2768 wrote to memory of 1840 2768 cmd.exe Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe PID 2768 wrote to memory of 2500 2768 cmd.exe Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe PID 2768 wrote to memory of 2500 2768 cmd.exe Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe PID 2768 wrote to memory of 2500 2768 cmd.exe Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe PID 2768 wrote to memory of 2500 2768 cmd.exe Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 3036 wrote to memory of 2832 3036 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe PID 2832 wrote to memory of 1904 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe ugpod.exe PID 2832 wrote to memory of 1904 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe ugpod.exe PID 2832 wrote to memory of 1904 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe ugpod.exe PID 2832 wrote to memory of 1904 2832 HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1852 wrote to memory of 2008 1852 Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe powershell.exe PID 1852 wrote to memory of 2008 1852 Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe powershell.exe PID 1852 wrote to memory of 2008 1852 Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe powershell.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe PID 1904 wrote to memory of 1764 1904 ugpod.exe ugpod.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Interacts with shadow copies
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1200 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00341.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2088
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\exams.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\exams.exe"4⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:268 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\exams.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\exams.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2108 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\exams.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\exams.exe"6⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 2447⤵
- Program crash
PID:696
-
-
-
-
-
-
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exeHEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\Ymmy\ugpod.exe"C:\Users\Admin\AppData\Roaming\Ymmy\ugpod.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\Ymmy\ugpod.exe"C:\Users\Admin\AppData\Roaming\Ymmy\ugpod.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_9ae6a79b.bat"5⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exeTrojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Users\Admin\AppData\Roaming\WindowsUpdates\win32updates.exeC:\Users\Admin\AppData\Roaming\WindowsUpdates\win32updates.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Users\Admin\AppData\Roaming\win32driverhost.exeC:\Users\Admin\AppData\Roaming\win32driverhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exeTrojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" –NoProfile -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\4A1A.tmp\4A1B.tmp\4A1C.ps14⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 1 True5⤵
- Adds Run key to start application
PID:956
-
-
-
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exeTrojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exeTrojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeTrojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exeC:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Users\Admin\AppData\Roaming\7351170fbca2af9a6b59f3a77351170f\0ae2362c.exeC:\Users\Admin\AppData\Roaming\7351170fbca2af9a6b59f3a77351170f\0ae2362c.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:272 -
C:\Users\Admin\AppData\Roaming\7351170fbca2af9a6b59f3a77351170f\0ae2362c.exeC:\Users\Admin\AppData\Roaming\7351170fbca2af9a6b59f3a77351170f\0ae2362c.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\Explorer.exeC:\Windows\Explorer.exe7⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
-
-
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exeTrojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:636
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-11179074872299015987624013-884344237307023812925822271-2078359812-84222960"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:868
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-863964503-55797419931773024532050371194300208814757589051148936782-1517326982"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-634316178-1484118348-946646680-1840647516-1138321551-1318821632-784902574160051659"1⤵PID:3064
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-343900497-337310557-21362000791333043165-2418550252014663739-18256498171889327"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "325761201-1747967195-377319163-1650461729765773795-242418822-1562993738904735827"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:228
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2748
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-822970246304328631112613377485395100912245255611912290083-1895964723648234932"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1256
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1256
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:344
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1268
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2016
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1164
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2712
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Adds Run key to start application
PID:2436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54696a5e42bac88e2732da157029eaf79
SHA1cee26849fa52039fb551db7e7d187b3f5d16a8ba
SHA256bee99a63b8ed396b1dded022df90702e3c176ed2c91cecbb8bccac46d2858fe3
SHA512b945780d2e79e61fbbf3ef3cb0a6de0a5d505ba6364843116064192711c3223abd34e4bf6f686e58e1920032bfec951dc8f737b541383212869086a5e7181d97
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55631e1f0854e4cf017a0a1aea87d7b80
SHA1a8879d9b6a02dc2eac07d865f6d873c3660092c9
SHA2564de90fddcbdf3e6e0fe7887015c5bf360fd6fb8a292400ef6008466f4b60540f
SHA512a1bb0f5f468a0e296b8b40f3bf3c9ce9f4d336a8e87171a5e204f078be2ec3a272218f2439fc6a1a689550f4092caaec802e961d58e35d444e46a8005824ba13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafe6bf53b383f37984bb14acc77fb31
SHA102915b379be93bc60bb72dff795362da3c15e58e
SHA256636efa5d8e150f6e32c1957e8ca6f651647d73aad525d5e60126badd79623c8f
SHA512584ca8dca4a5a3f430d59f381f72981716476ccb0ed5a9a1b892dfe135d56cb3e4f6287b3076d8cd0a609077936294a1fb71b3479aa7cfe679d5373f63c8fbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD502b58ebac63c68016240b7fa85af0193
SHA11f9c250f64a6aed1979644dd4645f68c25a771a3
SHA256c9bdf49d7f5c638380f053da48180f6e81ddd6584a86a878e376915cf6463006
SHA512ee56b73037cc40439246c7cd5cfb54ec15a14ff9842458c7b9c7345e75acd86c0c3f8d9a6e865f4666eaf32d3c4fdc09f630c6752116f7251a322d488e4e799a
-
Filesize
3KB
MD5acb8d1fff8e8329f154a5c6a82d5f627
SHA1c4a44210f765d22066696753c67307f9b43f8676
SHA25690d0ddac4283919099a6313c028fa6d17f877349387cf3674e45c9fbd82b0d3d
SHA5122830fc830628c3bc44264956309ab08468747b5003c718f3bc03b746db702ba4f569ed5a25063ad63b27aba1ee5ed6e367daf5dc7c750f305ab45e3e7f529066
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
364B
MD5d370205bdb0daeaa32c1ac3796fca2d9
SHA10acfc1350adfbdf9dfd2be43b0cbe49a9419db6f
SHA256a79cde669f0d8c8ae7a9ad8f876199d18dff2c54f3d1186e645b78d9aac71f48
SHA51295b1ad109e53f38201603e05240b2ace8e8e33122b30a2574e7f27687ea7033384c58b326e55b4ba361ea462e6db26eda3f4c565c56ca32ec90554f2f0c56255
-
Filesize
3KB
MD52e1880d992e6227c11fe94650604a206
SHA1467c8f4b1283b14db869eb6db157522f5c42140b
SHA25628e01c3eeac9532c0abaa39c629fa92696302d2aceb41f67c075d9864e8456f4
SHA51299cab591eda310f2e58a00a02f728a6efce1fd73a15752d1086c4d9095a4b77466b9a97e2149a05a782cb5a1b62e1190608301a18f2213b693a2acfa4b195f44
-
Filesize
64KB
MD56bda12553c794efc54e1c4ffb8e02652
SHA1014310e7d898beed4b463b91c15c7fbfb16cc190
SHA2567ead10c3c6c0c9f2b95018aa978a348933e9da16dcc3941cd7a9ce3100f37a5e
SHA512d0ca7666ae18ceaf65ac741bcfb2eb5a57250a4485ca7c34c3134c65939a3bce612c634099ca429ac4f1a4317425fbb620d51b44d54a262430bec78b95b3280d
-
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.MSIL.Blocker.gen-42d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d.exe
Filesize1.2MB
MD57ff6f8d8ccec3b911f1a349c5eb3bb4d
SHA13a16a269bd1a578344559d702a44363d9a239e85
SHA25642d92da9f3df8b070b0e792d82e245be7e30f6366c7e3ea154c739f1092d1f5d
SHA5127f12151936134116b02d1b6d7aeb7179cae61c7214c5298b69c9ab85acfb242a15c70f5660d766606aab15a0eafe2de02654e9f3382426e6136fdc3ad54a9fbc
-
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.MSIL.Encoder.gen-a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad.exe
Filesize371KB
MD57a2524dfebc686de239c5f734e6bf828
SHA1a530c71496618bb16a94e5d5a13602200481f0af
SHA256a73489b49d87f2fd363880d5b99915041a722349ca30638a6ccf3f53f7094aad
SHA51279f61ca43e1edf44bbd9c4207d70244ba2a1435fbb7add167320870eca0ef52c2db6b7f6331434a524816d2b72df9d9096458b261131efed3de861e58c49e39a
-
C:\Users\Admin\Desktop\00341\HEUR-Trojan-Ransom.Win32.Generic-bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386.exe
Filesize184KB
MD5ebf08d86df7e87eccb41dfc660766af7
SHA13788870f35e296b17b0ec300360f66d7727393d6
SHA256bdf12db8bfb22d71a02668c02f497d40ebd8d5bdd0f4001e3e9a989659786386
SHA5121dc07375476740cfb5ec352016d7863d13923d4514099ae461b02da5721220870409083a0053969cc682ca80ada4ed4b9c2db7358a55984dfb2ff318813e75de
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Blocker.lfbh-8faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831.exe
Filesize2.1MB
MD56f9ba3a8b4906e0bd89fd8885f0d0f56
SHA1345e198acfc3187b9d60c84c87b7e8d8cfce6a4a
SHA2568faa8c691599fe22403b0b06cfb86aa61630a1ba9b762cd932d22775f5d41831
SHA5122d612cf39317f85da9c87ffbf5390b594194b0a00fad430e8ab97cc4d7b13541375b2a29857435720ddbfdb98c280c1b80609a09c9f86674c58df9c2882a9556
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Foreign.obed-d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4.exe
Filesize938KB
MD552146218a9e6def1f30cd0164810a235
SHA1478e7e51fd83b4e7356c20386ca9d0208349125a
SHA256d505f8b01c409452254802b4c7c6befd9a212de833ed8d5a343adef7230b97c4
SHA512132e5538f6b396d672c8dba1f46b34127fcbeb56aaa388f6c3bdd0468283905a95cf256831a7ec7893620be13e5081a38c8e9a70554cc1acd94d367a0e673c5f
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.GandCrypt.fxv-6fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480.exe
Filesize512KB
MD50d2f1559a0072f355e993601d3982074
SHA1c5b0461fd80eb561d0b1d186dbcea6accb480b5d
SHA2566fee46e22d88db8fd4469d5feb9b0a10023593b64dcde48393d7e80327530480
SHA51227aa524c8e816f1048058106e9fbd056dcce55f518329a0da307a466a732e3127ddfa9317fe1f74bd8328cd4def40fc1796bf860a0c5735e409f3f891e89578b
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Gimemo.bngv-c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492.exe
Filesize196KB
MD52ab314031f20a46e3ef108f761145fcc
SHA1ae0f321aa37f89bae6dff7adbe5c9c9edbeba99c
SHA256c4caff51ceb0d0b61b2652e7a7aa179bb797637755d3b492f066db0ca3982492
SHA51245463189ef98aff9456507c73dae60b5121d915c7ab0f9ea9089ea8096da112caca582996a51da7fac81a48107d912104d77bf72459601b1742f2f31a9599399
-
C:\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Shade.oxd-752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241.exe
Filesize1.3MB
MD567b35232fb3890d44f02ebfa7a8878f8
SHA1669abb1edc11743e190921378e2c517f1c5f5ad2
SHA256752b85039f28591e42f08fd08d35cfd1e76e2ea9bb5ab0ca2f5056b3f3ea4241
SHA512c61aabff0f7c9bed2fdfd90d3457e2084d6db8961c0ae00bfb808e82ab3695e20c8b0e73a2a5dfdc326c7635d98bceba58c79bdb9e91bb3e89126c99d879c0c3
-
Filesize
1003KB
MD5af022d75c45b509801c6611a0314a91f
SHA18ea660c78b9349aec41ec41946d6401b0dc355ad
SHA25693512294c0c93bac3b42f4e54baa3da313e1401248ce9796cd6b252de514dc9e
SHA5120f24a2b8e4cebceef23c9b5d708a5be829c2d64236dc546de7617ed3460f07024a451ff8ca91096b20e881d66a11d10930ae4b64e48ef194ce2eb48626b7e215
-
Filesize
839KB
MD50e2380c7b5a22226df3ff20dcb437529
SHA19990fbe42f7ec57307329ac7b6c4aedee173431e
SHA25692c1ec34488082eaaf7a14779989c43656c386fc8adb957f74d209925ee6cd51
SHA5120d9d381572b285aa6d8f923ddf7b8bafbfd45e15a4bf5878146853097dc5e88b5f5ac8e24effd6a21129a8057085cc6f5dbe5b11456627226a6c47550491cc1e
-
Filesize
510KB
MD54fd964fe41570f6dd2b2c9e79f511ef1
SHA1c00cf89bdaf15c67aab3b74c7d7d05977f18e01c
SHA256af6f23466cca95010d27d8dcd7b65175b4ca05385129cb3f4247e068f31d40d5
SHA51277ad60dba72dce93001ec62acad86e4825ca6a7f366c756881fc6ba1a8f21ab73ba89c298c2755fc712f42702f41ec566e737069bb3c8b9cafc45dbf1a2a8e2e
-
Filesize
510KB
MD5801c589f8269a1204f889d35674ee738
SHA154a39bbf12b210b10778877dc44a78dc589b1f35
SHA256c579fbc903bbbb06dd32716c49dda45d5b575a8e932a4a3325d15cdf601007fb
SHA512b1acecd48a45653c34e111f681242056789e8385b784f87a1e68719423d42af1f5197bfc5bc01046aaf65a581fa37b18efdeba900c0eae9a7b6e33a5716a114f
-
Filesize
1.0MB
MD576d9c7519340e301e3ceebb04d2ff841
SHA140fc58be43be176a765a3ba3c34967b02d5ef36e
SHA2563ed9e3296d4d6c9b31388b9ea675e568d32eab3917a9472b5abebe83d21a33b1
SHA512de8c6ec8361d9bf0f59d27f54f897beb7b4660fbf228bf912adb79a8c8649bc20968e98a6ff7457d1e3a89dcde0f6d5c320779e4d8873b01a0ffd726fce62e4b
-
Filesize
411KB
MD56447b28e202e6b55d604a8e26f8747f1
SHA12544d4e38240cb8a5f9f437f2dbe8023fb0e690f
SHA256d931c8e8f0e0fd8739951839dca09d512099fce4dad33b0c9af5981469c759e5
SHA512156fc7002ae55a5202d90c392ea3f7fb958925bb5c9e18c852c108699d0b824126681e86b215cd79d84e64338424a7a53515c3d04f1e50b034bf310d6128eeb1
-
Filesize
971KB
MD54e85f5ed7312fa988a280a8b56d7719d
SHA17cded39dfb5332126179c6d0bd91be94e300947e
SHA2561da096548046712583822560f90a2ae16abcbfe8d3cc5dcd4f84e996a958a5f0
SHA5120d1012a4be55b7762a8c854baa15ee21ddf4740fc1a5da153693a63326dd74cbd01a37b4957796aa2d6cf5b50041de612baf4efabf136b4b48f318a19c819363
-
Filesize
378KB
MD54aad7c1163ce1043d63d97c2ee689b15
SHA196166834e9eb936bb351eef0f4c357666bc794f6
SHA25605502ef981ede986410cf2c05321a2be637a8e87f21df93a0e054124b61f441c
SHA5126a0ac3f7da7f54cef4e028bbba3daf76db5982c3967d89c6e4abae615a855f10f22683f2402879404ee362618fb5996fab240192143da8ed5f2bae7e9e0761c3
-
Filesize
444KB
MD54859e773d239d5ba93f87d2b834cf893
SHA19b0aec4b2345716efe168614a73c6971a1fd533c
SHA256bd10107f4ddc2dc694d3beeca298804d174171245ed4ac5490b64ebe54907837
SHA5129f4c6e76c5b11210bd52171dbe2d28a02dd0ac5fc1e7ddd1a8d580299986c8df52698f1f12fe0b39e14e2583ac837625afed92d222abf1fe323bf9c4a34d0187
-
Filesize
740KB
MD564687ebaf6d75441fd89307a3ff1578e
SHA1a684beba2683ede89ed308a990ce7544f9d401ed
SHA256f2aa83246a03798364f46796e49163a38b6e5f31ad8288c9a9cabc05eef93fc2
SHA512999b3454ef3e33582569f11cc13d3f99cfc3cd98d97d48395ac58f50033ff81d45122634d42e0690ac013b4f68edcfef3ab99c564fab82b9ab298edcef4b7256
-
Filesize
905KB
MD50defbf73274e3f4d536029e9ecbea9b9
SHA14df26cf76f6c2380db3a313f16e54e5d538006f9
SHA256f497bfb0c0b3f155883fbe31b58a6e3d8acfa1719f2ec37c7ae0052737026810
SHA512ca1dce0fcf95076efe429c7deb06afc3d9761c591e05fc005fb6e01b247460ce85294c523f9883f5aaeba37d2f4e1688ebfd6b1e72a4cf4db2f1466fbcd09ac1
-
Filesize
15KB
MD57666426e66fce8fcbffa5f447846ad79
SHA16e9f6ca818169c4367490129190391451bb2542e
SHA256c1a9bdccb37882c7f410c0c968f1ebd0a06569e23957e253a746695cbb70061b
SHA5121b10a5f331f8c256f5e1803eaa12fbe4bc9827b0e381423aea03e25e95cbaee4369e68b6415bc0507926868ce5a6e93c897a292a684ea67378b9601dba5c8c5d
-
Filesize
16KB
MD5311fa1c75905ea8af28e868f40fd5d96
SHA19434a03711644d74ac7c1c78ab90450a71c61d5a
SHA256b488ba70a1afed40cdc830dda1ae698adfee9eee5e2ce487dabaf84133007190
SHA512aabfaabf73a2187ff8f54f49cc375dd9034c3b14abf7b1ffad734b204bbbd18fcbcb8201bc50507590d9a0cbab07451aa9af44a26fdc80aee1bff22f318c2496
-
Filesize
576KB
MD5969f51c22ae92d1f458a2c02001a833a
SHA1d892f6f2c61b284cde0a1979c1d9fc52eb56d274
SHA256e79cbeb65c6a8df43b741bbd8a2f2325f89b5cee5db9ec76e5df50ecb94e3506
SHA512bdfb6d6bd99f3277d84ac5951506429cff2e6690aec3e1554f9d794543bd1054b253a8038420ef3137458c9a945ba7cff7af1e2375b3770f23794ee22246cbea
-
Filesize
872KB
MD5f6d691a15f004e280694aa6dafde69c8
SHA16de9f1106ca6efb53bee91ee676e06a70e215d0f
SHA256ef78ccd72d32982037929883b3dbcf14e0b27d0733ec8a26c06ef0e25cf05c38
SHA5128e85e1aae018a555800c2decfc8d32fe4ce661614351fe44c5e48bd27e34fad948e6f94f31ae3fa9df24101d122f3a4f55e7e789a6142eeae1e2a9e6c02a14ec
-
Filesize
773KB
MD599b3206d5d197165d7947b5227b8a447
SHA14113a3fd82ca6d46c2fa64f3f4b36468cf82c530
SHA25614a46cffd20cc05fe4e6f900821ead101a67adc44ec4c959c541e77be7b975db
SHA5126c37c1d4fd7c2d29a4254ac3850825df4c23ebaa703616021cc9e5dc9b163d7feadeffeaa74e18fecde4fa859406edffa97266335c51e82af48d18b8f2f1099a
-
Filesize
642KB
MD5730bba5953eda751b5037d9d5ea1d4d4
SHA1317de10454dcc8edebd06bdae4366f6e43f20257
SHA2560fbd72854d005b90a34e7032eb11ba92831cb1f3d844aa2965517b7f5a98fcf2
SHA512a52db6afb281e2f54bc6c2b9dba6c2d62560690d060b22d707bc959258de27a84586b48336063903abf13048874e6160258b07b22d44c3df82bf3aa06d36255c
-
Filesize
806KB
MD5803504379e8544e53617c7e06ee7b9b5
SHA1ab86a039b9b8d17e6eb411737050536f09aa5b45
SHA256183163d21825dd067c58521181b89ce2e9adfb80577edc0898a5cb9257f66139
SHA5122ffc14fcb384cd1c8abbc7a615621478ec508e0f98ad6eff4180695cf116d81327449e78b96689dda9185c8421e6a412780cce46ba143849c0dd2654116482ab
-
Filesize
1KB
MD5da4cedecd7410851373f0dfb133e7d30
SHA16ac726f1018766520a853ef247e82667111b677f
SHA2560af7e89bddb3d27c7e8bc6844251a233d2bc86b3de1481ff72180b6cb7dfdcaf
SHA512fa3630b960ff89af26b9f649224909f1a5d483e1ab05b37b2653e162aa6e0dc8ee09fcc8bb0a67e5b7c844d1cc7176873fbe230b1902b50a5ce4c24bc00d5978
-
Filesize
8KB
MD56740a56722ca4c4032895e95cf18a163
SHA1edf4f69a4c3c5590eebdd76325db17fecbadccd0
SHA25693d3c8f5d6b522211c95bde64e3ae333a1603c51a4957a3b058aa08c056b7761
SHA512826e1b9bcd27ef1e77b77841cc3fcf0fa3607034baa93bb55865890215e7d906fd3adbb0594703a1af144c3a41f46ab5359dbf777fe9d94a78d232d86918d376
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
67KB
MD524b09dfc2fe825e9218fc2208ba1d974
SHA1a9ac7d59ea18780b3358a0da7f0493d4c898e1bd
SHA2567a5ef9b3150fe8d81390f8756dc4a53bec9707c72e311f81e9f4c738ab95e37d
SHA512e46f8dd95c3cc03cd401023b4b9f61351083c95c559550dfeaba80cc2d8d9031050e4fbe9b8fda1455aebbba2b607653cbc39d339c5471823650d11c1d513b21
-
\Users\Admin\Desktop\00341\Trojan-Ransom.Win32.Crypmodadv.xtv-050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6.exe
Filesize117KB
MD5c4af5ec7826361dc5a22db79be296638
SHA13b4a9d1b697d7c0d2aace2b7a92288cfde84d10d
SHA256050f0393c3b3f92d62e3837d2dd188d881290cfb707eb1f63254eaf36e4965d6
SHA5121859e120dcae5854c6f47e8e95484cc1657e1a5a59dd52e79e4bce10e8d8d96c96e382bfc7d715589e15ca007aae962c0ecdfecf77a120f024d234ef5150d7e5