Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
15/11/2024, 10:24
241115-mfgmrssjhv 114/11/2024, 23:24
241114-3d24paverc 114/11/2024, 21:31
241114-1djagatdmk 10Analysis
-
max time kernel
187s -
max time network
248s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/11/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00299.7z
Resource
win7-20240903-en
General
-
Target
RNSM00299.7z
-
Size
19.4MB
-
MD5
e74e2b3e44e8e753302f21ad25e1b8fc
-
SHA1
7725facdbb3b12c3e888a2f0fedebe62afd3fcb6
-
SHA256
651e6a8e42d16855e1579c95159a2102aae5a19da17bbed94c2534d5272253cb
-
SHA512
f0142a2247307ed4ef5814732ae6371f6ce31d013644d99eb8455ac7837d7037792e225d5b93cf34449e7288aa3ee476e529b5849c45fe85bbe8a2f9f8f1eb20
-
SSDEEP
393216:fBTrkg54OPuzE3EpnP5qUVp2g4B4AX3gk6PulqnxCKO1:dJuzXpnPvS9D3g3Puwr0
Malware Config
Extracted
C:\Users\Admin\Music\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Signatures
-
Cerber 2 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process Mutant created shell.{E385D267-F6A9-1D3E-E203-B9E38A459CB6} Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe 4576 taskkill.exe -
Cerber family
-
Darkcomet family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Gozi family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\DCSCMIN\\fMDCa.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\DCSCMIN\\mtxu5caXzLQy\\fMDCa.exe" Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\DCSCMIN\\fMDCa.exe" Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (8812) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (320) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (5635) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 63815 5904 mshta.exe 63821 5904 mshta.exe 63824 5904 mshta.exe 63826 5904 mshta.exe 63829 5904 mshta.exe 63831 5904 mshta.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1924 netsh.exe 3780 netsh.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 6 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe -
Executes dropped EXE 51 IoCs
pid Process 2540 HEUR-Trojan-Ransom.Win32.Blocker.gen-23cdff4548bab414f55106bc84fc8cccf7ffba77872853d59654ed2c8dc20d7e.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 2860 HEUR-Trojan-Ransom.Win32.Generic-0bd80f512dd5886986209806d0dee62457bafa92b0147c34ccb39357bef7d06c.exe 1148 HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe 1508 HEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exe 1824 HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe 1932 Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe 1528 Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 2880 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe 768 Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe 1596 Trojan-Ransom.Win32.Locky.aabg-539f15847c5861e602a94c04f30fc27997e1b7b1f8dc3b26be568fbc8bcbe706.exe 1416 Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe 1524 Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe 1340 Trojan-Ransom.Win32.Locky.cs-eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0.exe 2212 Trojan-Ransom.Win32.Locky.emd-f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703.exe 2496 Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe 2084 Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe 2524 Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe 960 Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe 1132 Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe 1356 Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe 1972 Trojan-Ransom.Win32.Locky.aave-dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9.exe 1392 Trojan-Ransom.Win32.Locky.afet-8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe 1836 Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe 1712 Trojan-Ransom.Win32.Locky.dmp-2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea.exe 2228 Trojan-Ransom.Win32.Locky.zbx-9aac311c5630c3d917f9d8eb9d93a4c7c2ca09cefa1d466dd6f681699202c883.exe 2356 Trojan-Ransom.Win32.Locky.ztv-99b0ebdeb576c983cfccf3612d6e3a41b380d0835ecc1b9e36b051d2788453ec.exe 2288 Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe 2148 Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe 2244 scan.exe 2268 Trojan-Ransom.Win32.Wanna.zbu-0a2bab1c970ea52bd82d1193caab0e7ef4a9d0e47f1afca32a5550481974ca72.exe 3780 Trojan-Ransom.Win32.Zerber.egjd-ca52de5179a6230958215313850d49cfaee8894e32c73f3cbff8bd6ab6ff52d7.exe 3764 scan.exe 3772 Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe 3788 VHO-Trojan-Ransom.Win32.Blocker.gen-5e2e4c1d7b08869da0c2eafe8c0fdc17951b449670cb69b889ab0614a4eaeaff.exe 3844 tiux.exe 3912 tiux.exe 3748 svchost.exe 4092 Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe 2764 msntdll.exe 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe 2900 Rj3fNWF3.exe 3196 Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe 1868 Rj3fNWF3.exe 1696 fMDCa.exe 3924 fMDCa.exe 5792 Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe 4900 fMDCa.exe 3328 fMDCa.exe -
Loads dropped DLL 38 IoCs
pid Process 2860 HEUR-Trojan-Ransom.Win32.Generic-0bd80f512dd5886986209806d0dee62457bafa92b0147c34ccb39357bef7d06c.exe 1528 Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe 1148 HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe 1148 HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe 1528 Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe 1148 HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe 1148 HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe 1508 HEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exe 1508 HEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exe 3764 scan.exe 3764 scan.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 1460 taskmgr.exe 2524 Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe 1932 Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe 1932 Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe 1932 Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe 2524 Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe 2900 Rj3fNWF3.exe 1696 fMDCa.exe 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 3772 Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe 5636 MsiExec.exe 5792 Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe 5792 Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe 4900 fMDCa.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x0007000000016141-84.dat agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\{76A1462A-BA4E-2B01-BE6C-D6B0EA70BBA5} = "C:\\Users\\Admin\\AppData\\Roaming\\Osunom\\tiux.exe" taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CertificatesCheck = "C:\\Users\\Admin\\AppData\\Roaming\\Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe" Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\java7 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DCSCMIN\\fMDCa.exe" Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\hоst = "C:\\Users\\Admin\\Pictures\\hоst.exe" Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\java7 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DCSCMIN\\mtxu5caXzLQy\\fMDCa.exe" Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe" Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\app = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winupdate.exe" Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\appAppData = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate.exe" Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\msntdll.exe = "C:\\Users\\Admin\\AppData\\Roaming\\msntdll.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini IEXPLORE.EXE File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\39RANI6K\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BY17T927\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MT4W94IX\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\U3EGUGI8\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AQYH36ZT\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T1DP8V76\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: Rj3fNWF3.exe File opened (read-only) \??\T: Explorer.EXE File opened (read-only) \??\V: Explorer.EXE File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: Rj3fNWF3.exe File opened (read-only) \??\L: Rj3fNWF3.exe File opened (read-only) \??\V: Rj3fNWF3.exe File opened (read-only) \??\J: Explorer.EXE File opened (read-only) \??\Z: Explorer.EXE File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: Rj3fNWF3.exe File opened (read-only) \??\Y: Rj3fNWF3.exe File opened (read-only) \??\I: Explorer.EXE File opened (read-only) \??\N: Explorer.EXE File opened (read-only) \??\Y: Explorer.EXE File opened (read-only) \??\H: Rj3fNWF3.exe File opened (read-only) \??\N: Rj3fNWF3.exe File opened (read-only) \??\R: Rj3fNWF3.exe File opened (read-only) \??\S: Explorer.EXE File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: Rj3fNWF3.exe File opened (read-only) \??\B: Explorer.EXE File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: Rj3fNWF3.exe File opened (read-only) \??\S: Rj3fNWF3.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: Rj3fNWF3.exe File opened (read-only) \??\L: Explorer.EXE File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: Rj3fNWF3.exe File opened (read-only) \??\G: Explorer.EXE File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: Rj3fNWF3.exe File opened (read-only) \??\K: Explorer.EXE File opened (read-only) \??\O: Explorer.EXE File opened (read-only) \??\P: Explorer.EXE File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: Explorer.EXE File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: Rj3fNWF3.exe File opened (read-only) \??\K: Rj3fNWF3.exe File opened (read-only) \??\P: Rj3fNWF3.exe File opened (read-only) \??\R: Explorer.EXE File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: Rj3fNWF3.exe File opened (read-only) \??\A: Explorer.EXE File opened (read-only) \??\H: Explorer.EXE File opened (read-only) \??\M: Explorer.EXE File opened (read-only) \??\Q: Explorer.EXE File opened (read-only) \??\W: Explorer.EXE File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: Rj3fNWF3.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1932-464-0x0000000000810000-0x0000000000923000-memory.dmp autoit_exe behavioral1/memory/2764-1240-0x00000000013E0000-0x00000000014F3000-memory.dmp autoit_exe behavioral1/memory/1932-1242-0x0000000000810000-0x0000000000923000-memory.dmp autoit_exe behavioral1/memory/2764-5464-0x00000000013E0000-0x00000000014F3000-memory.dmp autoit_exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File created C:\Windows\System32\Info.hta Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe -
Sets desktop wallpaper using registry 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DDx.bmp" Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3830.bmp" Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1096 taskhost.exe 1096 taskhost.exe 1096 taskhost.exe 1096 taskhost.exe 1172 Dwm.exe 1172 Dwm.exe 1172 Dwm.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 3912 tiux.exe 3912 tiux.exe 3912 tiux.exe 3912 tiux.exe 2120 conhost.exe 2120 conhost.exe 2120 conhost.exe 2120 conhost.exe 2088 DllHost.exe 2088 DllHost.exe 2088 DllHost.exe 2088 DllHost.exe 3432 conhost.exe 3432 conhost.exe 3432 conhost.exe 3432 conhost.exe 3412 vssadmin.exe 3412 vssadmin.exe 3412 vssadmin.exe 3412 vssadmin.exe 3600 conhost.exe 3164 conhost.exe 3600 conhost.exe 3164 conhost.exe 3600 conhost.exe 3164 conhost.exe 3600 conhost.exe 3164 conhost.exe 3268 conhost.exe 3268 conhost.exe 3268 conhost.exe 3268 conhost.exe 3124 conhost.exe 3124 conhost.exe 3124 conhost.exe 3124 conhost.exe 3912 tiux.exe 3156 DllHost.exe 3156 DllHost.exe 3156 DllHost.exe 3156 DllHost.exe 5016 conhost.exe 5016 conhost.exe 5016 conhost.exe 5016 conhost.exe 3928 conhost.exe 3928 conhost.exe 3928 conhost.exe 3928 conhost.exe 4920 DllHost.exe 4920 DllHost.exe 4920 DllHost.exe 4920 DllHost.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2244 set thread context of 3764 2244 scan.exe 73 PID 3844 set thread context of 3912 3844 tiux.exe 81 PID 1528 set thread context of 3196 1528 Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe 83 PID 2880 set thread context of 3080 2880 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe 109 PID 1696 set thread context of 3924 1696 fMDCa.exe 124 PID 1132 set thread context of 5792 1132 Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe 151 PID 4900 set thread context of 3328 4900 fMDCa.exe 183 -
resource yara_rule behavioral1/files/0x0006000000016df8-92.dat upx behavioral1/memory/1932-93-0x0000000000810000-0x0000000000923000-memory.dmp upx behavioral1/memory/1932-464-0x0000000000810000-0x0000000000923000-memory.dmp upx behavioral1/memory/2764-1240-0x00000000013E0000-0x00000000014F3000-memory.dmp upx behavioral1/memory/1932-1242-0x0000000000810000-0x0000000000923000-memory.dmp upx behavioral1/memory/2764-5464-0x00000000013E0000-0x00000000014F3000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00130_.GIF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0089945.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime.css.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00397_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\RMNSQUE.INF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB4.BDR.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Andorra.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\RICHED20.DLL.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7es.dll.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ACCSBAR.POC.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_OliveGreen.gif.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Teal.css.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Mauritius Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Design.Resources.dll Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libsubsdec_plugin.dll.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03012U.BMP Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\RES98.POC.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\Java\jre7\bin\splashscreen.dll.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02371_.WMF Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIconsMask.bmp.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14831_.GIF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00914_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00152_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\WMPDMCCore.dll.mui Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmlaunch.exe.mui Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\weather.html Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\SETUP.XML.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-1 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libaribsub_plugin.dll.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_ar.dll Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_few-showers.png Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Common Files\System\ado\msado28.tlb Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME35.CSS.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EAST_01.MID.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-compat.xml Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Rangoon Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench.nl_zh_4.4.0.v20140623020002.jar.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.eclipse_1.1.200.v20140414-0825.jar.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099149.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02829J.JPG.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00199_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02218_.GIF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\DRUMROLL.WAV.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02228_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\EXPEDITN.INF Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msadrh15.dll Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\US_export_policy.jar.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_asf_plugin.dll.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\flyout.html Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Manila.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00117_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Entity.Design.dll Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN082.XML Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyDrop32x32.gif.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\AccessMUI.XML.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0179963.JPG Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT_COL.HXC.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageSmall.jpg.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD06102_.WMF.id-A82C0E76.[[email protected]].arena Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File created C:\Windows\Installer\f780129.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI2D6C.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification C:\Windows\Installer\MSI5633.tmp msiexec.exe File opened for modification C:\Windows\Installer\f78012c.ipi msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File created C:\Windows\Installer\f78012c.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI31C1.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification C:\Windows\Installer\MSI2254.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification C:\Windows\Installer\MSIB19.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe File opened for modification C:\Windows\Installer\f780129.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI2F8F.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.aave-dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.cs-eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fMDCa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fMDCa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fMDCa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.afet-8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msntdll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fMDCa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.emd-f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6156 PING.EXE -
NSIS installer 5 IoCs
resource yara_rule behavioral1/files/0x00070000000160da-73.dat nsis_installer_2 behavioral1/files/0x0006000000016df5-86.dat nsis_installer_1 behavioral1/files/0x0006000000016df5-86.dat nsis_installer_2 behavioral1/files/0x0006000000016f02-100.dat nsis_installer_1 behavioral1/files/0x0006000000016f02-100.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 7 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3412 vssadmin.exe 4428 vssadmin.exe 3232 vssadmin.exe 5752 vssadmin.exe 4644 vssadmin.exe 5600 vssadmin.exe 3736 vssadmin.exe -
Kills process with taskkill 5 IoCs
pid Process 4576 taskkill.exe 3552 taskkill.exe 3132 taskkill.exe 3544 taskkill.exe 3504 taskkill.exe -
Modifies Control Panel 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\TileWallpaper = "0" HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437781894" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ec96e5dc36db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\WarnOnClose = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083e33963dff44245b644d059d4bb66380000000002000000000010660000000100002000000061f154348929c06f8425411626d7fb73367c86b66070560a320bc08d204eb941000000000e80000000020000200000000ddcfde6a6ccf7157b3727b036a58af4bfa22efff5495902f54cbeb2f23391a1200000002c88c3206b4e76aeb8ba2887418d7f3cebf5a90d9ba22babca286311fefa20184000000041f861f069a77c25f8d15cf86584f427f014b09e345069d62373ba67a5a253afcb5b61da754b33516bf73c7aed3e4efb8f15b81a1571ee47773567c515d663ae iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F4A2991-A2D0-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-18 Rj3fNWF3.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-19 Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-20 Rj3fNWF3.exe -
Modifies registry class 47 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\edit\command msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\FriendlyTypeName Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\htafile\DefaultIcon Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\htafile Rj3fNWF3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx\IconHandler msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\DefaultIcon msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\DefaultIcon msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.sage\ = "sage.notice" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\shell\open\command Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\shell\open Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.sage Rj3fNWF3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\edit msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\DefaultIcon\ = "\"%1\"" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\DefaultIcon Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice\shell Rj3fNWF3.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\edit msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\ShellEx\IconHandler msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx\IconHandler msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\edit\command\ = "\"C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\OFFICE14\\MSOXMLED.EXE\" /verb edit \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx\IconHandler\ = "{AB968F1E-E20B-403A-9EB8-72EB0EB6797E}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open\command\ = "\"C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\OFFICE14\\MSOXMLED.EXE\" /verb open \"%1\"" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 4c003100000000006e594dac1020303032393900380008000400efbe6e5906ac6e594dac2a000000f15d010000000900000000000000000000000000000030003000320039003900000014000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\sage.notice Rj3fNWF3.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\edit\command msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4036 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3352 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6156 PING.EXE -
Runs regedit.exe 1 IoCs
pid Process 5068 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3104 schtasks.exe 2904 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 32 IoCs
pid Process 2540 HEUR-Trojan-Ransom.Win32.Blocker.gen-23cdff4548bab414f55106bc84fc8cccf7ffba77872853d59654ed2c8dc20d7e.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1148 HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe 1508 HEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exe 1824 HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe 1528 Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe 1932 Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 1620 Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe 960 Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe 2880 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe 1132 Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe 768 Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe 1356 Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe 1596 Trojan-Ransom.Win32.Locky.aabg-539f15847c5861e602a94c04f30fc27997e1b7b1f8dc3b26be568fbc8bcbe706.exe 1972 Trojan-Ransom.Win32.Locky.aave-dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9.exe 1416 Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe 1392 Trojan-Ransom.Win32.Locky.afet-8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe 1524 Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe 1836 Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe 1340 Trojan-Ransom.Win32.Locky.cs-eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0.exe 1712 Trojan-Ransom.Win32.Locky.dmp-2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea.exe 2212 Trojan-Ransom.Win32.Locky.emd-f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703.exe 2228 Trojan-Ransom.Win32.Locky.zbx-9aac311c5630c3d917f9d8eb9d93a4c7c2ca09cefa1d466dd6f681699202c883.exe 2496 Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe 2356 Trojan-Ransom.Win32.Locky.ztv-99b0ebdeb576c983cfccf3612d6e3a41b380d0835ecc1b9e36b051d2788453ec.exe 2084 Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe 2288 Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe 2524 Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe 2148 Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe 3772 Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe 3780 Trojan-Ransom.Win32.Zerber.egjd-ca52de5179a6230958215313850d49cfaee8894e32c73f3cbff8bd6ab6ff52d7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 1808 HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 2336 7zFM.exe 1356 Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe 1208 Explorer.EXE 1460 taskmgr.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 2288 Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2336 7zFM.exe Token: 35 2336 7zFM.exe Token: SeSecurityPrivilege 2336 7zFM.exe Token: SeDebugPrivilege 1460 taskmgr.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeBackupPrivilege 2572 vssvc.exe Token: SeRestorePrivilege 2572 vssvc.exe Token: SeAuditPrivilege 2572 vssvc.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 3544 taskkill.exe Token: SeDebugPrivilege 3504 taskkill.exe Token: SeDebugPrivilege 3132 taskkill.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeIncreaseQuotaPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeSecurityPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeTakeOwnershipPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeLoadDriverPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeSystemProfilePrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeSystemtimePrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeProfSingleProcessPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeIncBasePriorityPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeCreatePagefilePrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeBackupPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeRestorePrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeShutdownPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeDebugPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeSystemEnvironmentPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeChangeNotifyPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeRemoteShutdownPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeUndockPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeManageVolumePrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeImpersonatePrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeCreateGlobalPrivilege 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: 33 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: 34 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: 35 3080 Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeDebugPrivilege 768 Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2336 7zFM.exe 2336 7zFM.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1208 Explorer.EXE 1208 Explorer.EXE 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1460 taskmgr.exe 1208 Explorer.EXE 1460 taskmgr.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 3960 conhost.exe 2148 Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe 2148 Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe 2188 conhost.exe 3924 fMDCa.exe 5800 conhost.exe 7088 iexplore.exe 7088 iexplore.exe 6376 IEXPLORE.EXE 6376 IEXPLORE.EXE 3524 IEXPLORE.EXE 3524 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 6932 IEXPLORE.EXE 6932 IEXPLORE.EXE 6860 IEXPLORE.EXE 6860 IEXPLORE.EXE 6376 IEXPLORE.EXE 6376 IEXPLORE.EXE 3524 IEXPLORE.EXE 3524 IEXPLORE.EXE 3824 conhost.exe 3524 IEXPLORE.EXE 3524 IEXPLORE.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2540 2296 cmd.exe 36 PID 2296 wrote to memory of 2540 2296 cmd.exe 36 PID 2296 wrote to memory of 2540 2296 cmd.exe 36 PID 2296 wrote to memory of 2540 2296 cmd.exe 36 PID 2296 wrote to memory of 2860 2296 cmd.exe 37 PID 2296 wrote to memory of 2860 2296 cmd.exe 37 PID 2296 wrote to memory of 2860 2296 cmd.exe 37 PID 2296 wrote to memory of 1808 2296 cmd.exe 38 PID 2296 wrote to memory of 1808 2296 cmd.exe 38 PID 2296 wrote to memory of 1808 2296 cmd.exe 38 PID 2296 wrote to memory of 1808 2296 cmd.exe 38 PID 2296 wrote to memory of 1148 2296 cmd.exe 39 PID 2296 wrote to memory of 1148 2296 cmd.exe 39 PID 2296 wrote to memory of 1148 2296 cmd.exe 39 PID 2296 wrote to memory of 1148 2296 cmd.exe 39 PID 2296 wrote to memory of 1508 2296 cmd.exe 40 PID 2296 wrote to memory of 1508 2296 cmd.exe 40 PID 2296 wrote to memory of 1508 2296 cmd.exe 40 PID 2296 wrote to memory of 1508 2296 cmd.exe 40 PID 2296 wrote to memory of 1824 2296 cmd.exe 41 PID 2296 wrote to memory of 1824 2296 cmd.exe 41 PID 2296 wrote to memory of 1824 2296 cmd.exe 41 PID 2296 wrote to memory of 1824 2296 cmd.exe 41 PID 2296 wrote to memory of 1528 2296 cmd.exe 42 PID 2296 wrote to memory of 1528 2296 cmd.exe 42 PID 2296 wrote to memory of 1528 2296 cmd.exe 42 PID 2296 wrote to memory of 1528 2296 cmd.exe 42 PID 2296 wrote to memory of 1932 2296 cmd.exe 43 PID 2296 wrote to memory of 1932 2296 cmd.exe 43 PID 2296 wrote to memory of 1932 2296 cmd.exe 43 PID 2296 wrote to memory of 1932 2296 cmd.exe 43 PID 2296 wrote to memory of 900 2296 cmd.exe 44 PID 2296 wrote to memory of 900 2296 cmd.exe 44 PID 2296 wrote to memory of 900 2296 cmd.exe 44 PID 2296 wrote to memory of 900 2296 cmd.exe 44 PID 900 wrote to memory of 2908 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 46 PID 900 wrote to memory of 2908 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 46 PID 900 wrote to memory of 2908 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 46 PID 900 wrote to memory of 2908 900 Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe 46 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 1620 2296 cmd.exe 45 PID 2296 wrote to memory of 960 2296 cmd.exe 48 PID 2296 wrote to memory of 960 2296 cmd.exe 48 PID 2296 wrote to memory of 960 2296 cmd.exe 48 PID 2296 wrote to memory of 960 2296 cmd.exe 48 PID 2296 wrote to memory of 2880 2296 cmd.exe 49 PID 2296 wrote to memory of 2880 2296 cmd.exe 49 PID 2296 wrote to memory of 2880 2296 cmd.exe 49 PID 2296 wrote to memory of 2880 2296 cmd.exe 49 PID 2296 wrote to memory of 1132 2296 cmd.exe 50 PID 2296 wrote to memory of 1132 2296 cmd.exe 50 PID 2296 wrote to memory of 1132 2296 cmd.exe 50 PID 2296 wrote to memory of 1132 2296 cmd.exe 50 PID 2296 wrote to memory of 768 2296 cmd.exe 51 PID 2296 wrote to memory of 768 2296 cmd.exe 51 PID 2296 wrote to memory of 768 2296 cmd.exe 51 PID 2296 wrote to memory of 768 2296 cmd.exe 51 PID 2296 wrote to memory of 1356 2296 cmd.exe 52 PID 2296 wrote to memory of 1356 2296 cmd.exe 52 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1096 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Interacts with shadow copies
PID:3412
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1208 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00299.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2336
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1460
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Blocker.gen-23cdff4548bab414f55106bc84fc8cccf7ffba77872853d59654ed2c8dc20d7e.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-23cdff4548bab414f55106bc84fc8cccf7ffba77872853d59654ed2c8dc20d7e.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2540
-
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-0bd80f512dd5886986209806d0dee62457bafa92b0147c34ccb39357bef7d06c.exeHEUR-Trojan-Ransom.Win32.Generic-0bd80f512dd5886986209806d0dee62457bafa92b0147c34ccb39357bef7d06c.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860
-
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exeHEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exeHEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1148 -
C:\Users\Admin\Desktop\00299\scan.exe"C:\Users\Admin\Desktop\00299\scan.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Users\Admin\Desktop\00299\scan.exe"C:\Users\Admin\Desktop\00299\scan.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3764 -
C:\Users\Admin\AppData\Roaming\Osunom\tiux.exe"C:\Users\Admin\AppData\Roaming\Osunom\tiux.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3844 -
C:\Users\Admin\AppData\Roaming\Osunom\tiux.exe"C:\Users\Admin\AppData\Roaming\Osunom\tiux.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_c2b44f79.bat"6⤵
- System Location Discovery: System Language Discovery
PID:3796
-
-
-
-
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exeHEUR-Trojan-Ransom.Win32.Generic-9ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Windows\system32\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysB00D.tmp"4⤵PID:3852
-
-
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exeHEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7C9F.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:4172
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exeTrojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1528 -
C:\Users\Admin\Desktop\00299\Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exeTrojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe4⤵
- Executes dropped EXE
PID:3196
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exeTrojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1932 -
C:\Users\Admin\AppData\Roaming\msntdll.exe"C:\Users\Admin\AppData\Roaming\msntdll.exe" "del" C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C schtasks /create /sc onlogon /s KHBTHJFA /tn msntdll.exe /tr C:\Users\Admin\AppData\Roaming\msntdll.exe5⤵
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc onlogon /s KHBTHJFA /tn msntdll.exe /tr C:\Users\Admin\AppData\Roaming\msntdll.exe6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\Desktop\00299\UPCU.bat" "5⤵PID:1728
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msntdll.exe /t REG_SZ /d C:\Users\Admin\AppData\Roaming\msntdll.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del UPCU.bat"6⤵PID:1752
-
-
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exeTrojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2908
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:2808
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3736
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2752
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:6220
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:4644
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵
- Modifies Internet Explorer settings
PID:3704
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵
- Modifies Internet Explorer settings
PID:6252
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exeTrojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1620
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exeTrojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:960 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys842D.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exeTrojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2880 -
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exeC:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\DCSCMIN\fMDCa.exe"C:\Users\Admin\AppData\Local\Temp\DCSCMIN\fMDCa.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\DCSCMIN\fMDCa.exeC:\Users\Admin\AppData\Local\Temp\DCSCMIN\fMDCa.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3924
-
-
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exeTrojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1132 -
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exeC:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\DCSCMIN\mtxu5caXzLQy\fMDCa.exe"C:\Users\Admin\AppData\Local\Temp\DCSCMIN\mtxu5caXzLQy\fMDCa.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\DCSCMIN\mtxu5caXzLQy\fMDCa.exeC:\Users\Admin\AppData\Local\Temp\DCSCMIN\mtxu5caXzLQy\fMDCa.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3328
-
-
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exeTrojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exeTrojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
PID:1356
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.aabg-539f15847c5861e602a94c04f30fc27997e1b7b1f8dc3b26be568fbc8bcbe706.exeTrojan-Ransom.Win32.Locky.aabg-539f15847c5861e602a94c04f30fc27997e1b7b1f8dc3b26be568fbc8bcbe706.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1596
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.aave-dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9.exeTrojan-Ransom.Win32.Locky.aave-dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1972
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exeTrojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1416 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7446.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:6104
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.afet-8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exeTrojan-Ransom.Win32.Locky.afet-8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1392 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm4⤵PID:4976
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:275457 /prefetch:25⤵PID:3416
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysC9E4.tmp"4⤵PID:5520
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exeTrojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7DBA.tmp"4⤵PID:5728
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exeTrojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1836 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ykcol.htm4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:7088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7088 CREDAT:275457 /prefetch:25⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:6376
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7088 CREDAT:275463 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3524
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7088 CREDAT:406532 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7088 CREDAT:5256195 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:6932
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7088 CREDAT:5387267 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:6860
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys62CB.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.cs-eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0.exeTrojan-Ransom.Win32.Locky.cs-eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1340
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.dmp-2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea.exeTrojan-Ransom.Win32.Locky.dmp-2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1712 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm4⤵PID:6888
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6888 CREDAT:275457 /prefetch:25⤵PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys74C3.tmp"4⤵PID:5500
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.emd-f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703.exeTrojan-Ransom.Win32.Locky.emd-f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2212
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.zbx-9aac311c5630c3d917f9d8eb9d93a4c7c2ca09cefa1d466dd6f681699202c883.exeTrojan-Ransom.Win32.Locky.zbx-9aac311c5630c3d917f9d8eb9d93a4c7c2ca09cefa1d466dd6f681699202c883.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2228
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exeTrojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7243.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.ztv-99b0ebdeb576c983cfccf3612d6e3a41b380d0835ecc1b9e36b051d2788453ec.exeTrojan-Ransom.Win32.Locky.ztv-99b0ebdeb576c983cfccf3612d6e3a41b380d0835ecc1b9e36b051d2788453ec.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2356
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exeTrojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7FAB.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exeTrojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: RenamesItself
PID:2288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 16204⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 19724⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 13404⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 22124⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exeTrojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2524 -
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe"C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe" g4⤵
- Executes dropped EXE
PID:4092
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "N0mFUQoa" /TR "C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" /SC ONLOGON /RL HIGHEST /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
PID:2900 -
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" g5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet5⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:4428
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet5⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:3232
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:5752
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4272
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f252888.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exeTrojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2148
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Wanna.zbu-0a2bab1c970ea52bd82d1193caab0e7ef4a9d0e47f1afca32a5550481974ca72.exeTrojan-Ransom.Win32.Wanna.zbu-0a2bab1c970ea52bd82d1193caab0e7ef4a9d0e47f1afca32a5550481974ca72.exe3⤵
- Executes dropped EXE
PID:2268
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exeTrojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe3⤵
- Cerber
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3772 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3780
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_IKQSZZH_.hta"4⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:5904
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_HTDKUH52_.txt4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3352
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "Trojan-Ransom.Win32.Zerber.dong-ca1be829d5f0b285fc7e61f3d45ba5f2b585f971792455494894ae352507eb3c.exe"5⤵
- Cerber
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4576
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6156
-
-
-
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Zerber.egjd-ca52de5179a6230958215313850d49cfaee8894e32c73f3cbff8bd6ab6ff52d7.exeTrojan-Ransom.Win32.Zerber.egjd-ca52de5179a6230958215313850d49cfaee8894e32c73f3cbff8bd6ab6ff52d7.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3780
-
-
C:\Users\Admin\Desktop\00299\VHO-Trojan-Ransom.Win32.Blocker.gen-5e2e4c1d7b08869da0c2eafe8c0fdc17951b449670cb69b889ab0614a4eaeaff.exeVHO-Trojan-Ransom.Win32.Blocker.gen-5e2e4c1d7b08869da0c2eafe8c0fdc17951b449670cb69b889ab0614a4eaeaff.exe3⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 5084⤵PID:2812
-
-
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
PID:5068
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1424
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1759776916-1299711641473809361883763359-1973734841-1653827117781528128-1508191693"1⤵PID:1564
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "199482839-318794866-825704631889786597-137675349-15894163371886357523-270469456"1⤵PID:3064
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3880
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1722428440939671239-9543647661760401784952990992-1222454497-1024487258857097324"1⤵
- Suspicious use of SetWindowsHookEx
PID:3960
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1023084386-1796244606451354839505140459542169365-14159919313539247441873266678"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3432
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-215671444-262974105-1007275978-1194481562-61829783517080218451475285756951527054"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3600
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "955284161-343749610-1567966724247256937-1183250220-1980080771-1840504993-1819567797"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3124
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "203365314922681361299302461-592029373-588033582905276187828381303-267352869"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3164
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "5750871731135031578512183397744480884398955177-451135664863797800-1849346519"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3268
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:3240
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "513786553-952183096-1712558640393799821-1585259442-2133154517-9935234-1297624397"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2120
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2088
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3156
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "20155779642012539045-469738639370003249127132860415982166404813851251202376557"1⤵
- Suspicious use of SetWindowsHookEx
PID:2188
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "3475828-1425097136967718899-666209533-1875488389-236358391883511021441217752"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3928
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1914770615448988764724739414-10084589001753776696-5676722051316821591882939424"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5016
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3052 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 91B2246385F105DCCF478E815DAD57592⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 9633FC5E777179290FDF7DF55181A52D2⤵
- Loads dropped DLL
PID:5636
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4920
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1640901845-2039288162-18167047771083197294-4179455811505088678-369686716439705917"1⤵
- Suspicious use of SetWindowsHookEx
PID:5800
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:5512
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5881⤵PID:4548
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:3520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:6120
-
C:\Windows\system32\taskeng.exetaskeng.exe {11153B79-B607-4C9C-B16D-F965D2F96069} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:6256
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:5600
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1324485264-17622134948008293161440543284405744033-1972225994-913436477-2035587166"1⤵
- Suspicious use of SetWindowsHookEx
PID:3824
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:4816
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5876
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3908
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:6552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2052
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:5832
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3528
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:4932
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:7100
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:7120
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.id-A82C0E76.[[email protected]].arena
Filesize3.6MB
MD5ec930db768c3489073dee666b19b5f29
SHA12250f3cf50bfb83bd2a9ec4c1a2aa25d8c96b5ca
SHA256cf10a2631c87c6786c5ee7888e97a6e374605ed1db3902e81cc62c3088a1cf69
SHA512adeae3ef9b89576224e100661950b701d52fa428c158ef2f1810b7a7cb4fba8a62c769e4547182fa3f742a9eecef0fea2dc3d753b59c285d4ba31192563d9208
-
Filesize
7KB
MD51cd8ca4becc7696a2cdf90d542f69e06
SHA16c86c34fc8900748f76f5253866849e918fff377
SHA256b22fe520f57a2b9853ac9daca8843de15878f19dbbec8f429bd3dd89f4c57cb2
SHA51275b14d343fe4665077df4bf675ea41b1c2bbda7a7f5cb9cf7a8c7ec6db77e8f3656484782900900eb48c601cd7643837a1d15626b7c37efb558fdeee8b5616c2
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\lukitus-a27f.htm
Filesize9KB
MD5fab7f665c154349ea959139a929a52a4
SHA1cac162535c814bc9c60ab0d190910086a5c5a646
SHA256b48f7209c94c577b26b8f250f5f415809a6e6e22438671f39a4081b7302c86ac
SHA512ddb77fef6accfb04117e52540d94881e00d4d87cd670216405e6f2f600847220ddbdb057867f46fea19fe026c00c462f716d025a9ee1ef3cf87460913056e90a
-
C:\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\ja-JP\ykcol-a07b.htm
Filesize8KB
MD52432853abb09555de91e761727afbb4e
SHA1a87c309afefcfc45a5a4a512105dd443a31264ac
SHA2567d183942650d02dfb7e817fa75f6efb8655de4f961388853474bed9903acbfad
SHA5125d04745321944db92de38b229e0a96de6efce2f0895385955225850aea0c25c578de75ffedb65b3b151a43e5a601dde1b204531400995c47c94be04320e59616
-
Filesize
8KB
MD5dadcb68495327f77f734e2172001c890
SHA12d8175b13d2efcdcda46e2b236a55c3cd8c9b28d
SHA256021df7becf00afde86525c4b1a74f1d2c8b4f28956d65cbdf8a3dcc3993a3f8e
SHA5129ce61e577947062e68af0aa50e34660684270bc3b70d147ce1475f806d1b076263ce2ec16bf7af827c9fd6b14f9c1aa7c81d705ce267e51bfd5571bee3bea3a4
-
Filesize
8KB
MD5b4c3adf90764e3930d84ead96def66ae
SHA16bc4747dd742641213801ebc5e3ccca475572521
SHA256b12798c3b9f52a9e28ea422d24c2538d3de6e14beb2d592faf3693d7a69a47d6
SHA5120a7cbb15aa6d9b556cbf67f1c447c68dd8a94cac6937602ef32434b108cad1e74ebbb60552a63b91423322d3ba0a201a96cbb327e2bf49e0040546bdcc641d24
-
Filesize
8KB
MD57f34707222c4015ffc0f9a8a3fa141f0
SHA14e6186d697673997c6ac68daf2e02b684e322b86
SHA25634016cbc3325927f0dd521a9e1db58bcbf4f5636a2ea130dec44e5e8ef81a004
SHA51254c37fc9ced56da9ea7ff03d23dd31de32c7042334943da1669c307ce532bcbe91b79019844826d7581e9c36b88f7387434229e5500eb699c1f151437a10646b
-
Filesize
8KB
MD5de67d5ae31ce366c68867cc2187f0768
SHA1f2664c5a5f885d467088835cf53e3be00a2ce016
SHA256140e1477fa46558e11b59b932905415a8563a147e1f5e4498d747b8df3055c31
SHA5121bdd04fad96cc07ecf8abe4528586897443b643c02db64fec3336ad7c32efaf12d1954555c92ec17c5afc3fff443b9b76aad9c6f38a370c1b20a050a163b79eb
-
Filesize
8KB
MD5781503c531af530c29b6e0312db5a940
SHA1e604daf8d11a8312653e4a2327d6ea1adc544dbe
SHA2568a7ef124dffc7f96e240fa56335b9f6988535105870511ee4c8ea47d24707643
SHA512779149c8eaea310f9b2da57465131af8f2e01392b8441287bebf58deb47f15ebad505f3c89cbf72f66e8f69c07c2849ad186e1ed6a9c79b78c5b5d6e52ddc892
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5654af8a0d515bc61c80b898eefd248d6
SHA1d846254edaa92e851ccee30c5c945dc62d43d499
SHA25665beda934953268ca8ab5769f87a3ccff8d7afdf4e939941954f7c9f50a7f835
SHA512aa10d090a9e27ad7f95db25742ca98f2b86092568302c7d5a9cef980df72cb04129e232f64dbaa8198071b2e863ac50d2d74c52600d560ddd5f1f49c1cd3f222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138c00f5319cb85d70ddc7e2ef10b5b0
SHA169b41eb913337980019931e06d7af7d724647298
SHA256d393d06fe52428fd8734d2181fdb5853f675e3d20bdf3c1110e697cf72641c4a
SHA512e721cbc55003b999dcb910cca732cd2ef5df0c5e87a8f2fb137e129edeb7bfb104c82dfdf64181a8ac1a481209e0963031ad4f324c7c50bab71bdb96e2cdd340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f85e79d3f7f980185c7b04a35ea4d10
SHA1d51ae2a17ddcaf3fbcd309de20eb163984a88eda
SHA256d4384a2ed7fa5dfd406d73c0c17003668edc5a92baeeb8ced467c34c0fc94d89
SHA51212cbebb3cf42bab6187bd07ffd2c3e36d21a3a482c3b3608a3c00204908aefda2ceab877a927873f17814ab8282ee080199be879f0a17d8da311f5cbd5026a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432df65a2fb4541250bdb1d48519e9eb
SHA11b058d4cdbe5d85080602eb774160144ac50836d
SHA2567c6e4ab4dade6f4999212ff737e0d50c89d78ba96370b5a199f4b7faf6993269
SHA5129e9ac7f1f2c0869a15a100bffecc02659edf76c1e7a3c5cfd43522a52bc00e999d74e5e61bb9e895bef5b5f19723cd59818ac6d6f05d70b8050b0f4c0c83f31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8fb84442e9c74aad018a0fbea91ff43
SHA112435f35e4736aedcfe68e2981278ffe152bd61e
SHA2560a956b8630f6bd524e12639381530d30f5d4fbce24aa2c2dec764bdc1702031a
SHA51299cf16290089cae8ff6db1ac7e2c06b2a0817e696aa9d326d66eb978a514c71ab7c6daf1bfa914cae68726171e6e079252008a3475db59f746bd751848d1bfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf1347ed0890d42dd4aa57dee1aff11
SHA1e5dabf83fcc2d39933ac514e900e9b417a6b4b2e
SHA256df7bf23b8ca5d9543bae9404ee1e51a558ec432c94acc9b320223695fbba8c57
SHA512885b2e3bfbe9a5783f802446441b6ee8c66eda79260f279be6c5713dd92e386e21cae64b6d814c2179e891197106e9215a1819fb49fd6f0c43e78e3664820cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99ba9228e5f485ff76c7a1c7d953534
SHA11b825922e8723dd70da14d614e5c1702b4cf8414
SHA256292eb2c84477bf60cc75f703f2962328c927a8f27a795e3beef68173375fb704
SHA512a346b2f1550552d05328cdc02e161bce30ef47fa68556b208fe92db5dcf7dfe8a594b58f8ff19986fbc0dad458f4c9ba02db636ef7e77382abf6249ab1e64eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf64d0c2d63d26dcd773c17cb7010cf
SHA102b0878060a415749da0b3ff49fdec09c5065e5c
SHA2562b0eaad960a69d7e60de48e0b707e77245701b59a8bc8e700758d336bb0c703f
SHA5121b7a54cbdcb645a437f288525fc3d14554fa6addf383ac980c2a0cf3b7ec8f5b43c465adaae0ad06305f0ef3e4c8d60a3bae47876b73afd83e5d22258822be42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0705239a58ad119000d46261f13637
SHA16811529cb16abd9b90148fb7f5aad00bccf24dbb
SHA25647b94e5747435fca8272fb0c4a831c16d44aa6bc94256a50b8d286daee183191
SHA512c82c31bbba76ffd239eb33aac52d8c324b6c055daec40d0264ddb7e7d057df664461530557bc26ad18493fe56b1dd63d68d1bf1dfe07dfdf4c14182b51fffd1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9102e4d0fc436a0685aa049608105f
SHA1df0067ea73fee9de9b51371157dab1bf6ff4bb2d
SHA256597f5b85ee525473874bbd31f2ea1edf43ec8d71239c4aba5040fb9eab4b28b5
SHA512d7636c934967865feb8b934a9479872d71947ef739f117e2eb0cfb1d2f7d030c65d1ab5407a0a106d168c32fee7b92826f14879ed498a3d0e7bec25dc717f188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4912c4642b083a3402aa16204d5e37
SHA1f0a53d137c952d1eb2983f56efbd352f34a3a140
SHA256c76de63166126a054444f2e3ee6b81bc27a07d8520706f5d0f88bdd4e9f0d9f9
SHA51243242ffda5c0367c3d2768ca50a8f03c8664daaff7b5645d33ef8ab90c8e436888540c2c9ff90a2e1e0989fe370ddc814d8331bcdf3af1c529497218731f8f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59592b9230feccaf35c67d4d7c5bfc156
SHA1f6a543da0ef03383d0ad6ac5124565fd1ef9519e
SHA2569dd42c342d0112950c3c554f426e677f671065c86ac4eed91410ed39ae603e7f
SHA512a1d5c7a603eea209fec6c358eb6f1efb46a3985dadd2f5e0d3c88578d5f9f44e719f455bb9e698f5d8f1016541638adad530812418cafa15bc67b6d894555b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5eeaf17959c60f50e2d65b3d8f0c192
SHA1b264b576ef71527e9af5734e6c98407242d4b6c5
SHA2566f13e9096141793e903f7d7bd590bb5bcc59014cb98e2320586b220251415abb
SHA512b07ed297fe8676df9681a893b6b7e3dbdccd8f6d1efb83d0cb2392819ea8d5820d9ef335655abae8a274f6ce2c4c02338a44631edd2fff0b3c09ea7ab9677927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8d46137cdaf39af584987cc51c03dc
SHA1b67f1a3e7688de3d3388b8304ed92396047c38e6
SHA2569ea947b599977be55cdb18c75407bd1de56b6ab2f1803d9df36dd8ca18c5f305
SHA512f4fb1ba5317bf891e9c7698e8e226ebc75d6fe47b1ade85afe11baabd05daa916a4e34ac7dd1db23f9cf03dfc3b4d1ab5a8067d055a496a73266400c90ab3ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e859444fef32441d15532d67672b42c
SHA150bba7b155aafe05c834d974f2428e8bb53de836
SHA256c960bdc2f7d889fa0348fe47ee169abd6efd97ff999c523f4caef0afc8e8de2c
SHA5128ab6f5d3279242164fa32608534eab8c0b859ba8153ecd121289cb9b84eb063d043144e511cf48d6e10762d3f38be29dc3c7f881eab0547b3fa226fc9ce8ae02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e3841ac5f6dda694d1423515ebf610
SHA1ef2018c0571dfbb7c2678dc4b1d4a780782ff02a
SHA256da108507ea3d521a958bfd9aac0fac65af4105dde4093d448c76e3e5001b259e
SHA51248b068aaabacd3b2330cbb4ce8c90918b6545c8fe80d89fde94bc62bdadc894f805fec3ad656259b79681c0d50b505483000b8366f29112e7c88e837f3923e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5c5aa2b968b5b0e9629afcb3751c86
SHA19d83836083e4a804ab4d5fbfb806e91b94c35164
SHA2567095cb6d63b4dca0d273d954f7e560c358fb18eef807eef17aabe8c8bfd2cb18
SHA5126cbdf23348c6d714081a07ca15ab095edcae40fbc72dadbb5ffd7f5fa6e1a36781f144ebae484dacae7d0a2647713c18a7b6164c5984513decbe89d963fe0fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586c5d818bb1d2c16d205d5b6f2a82a0
SHA1854886d4b2252457a77ed95f61ab69485bb26283
SHA256d39d06e93e125d2b56aaeb76bc066d0cb551b69e871f9e493b520741bf9cfc3a
SHA51241f82e062f126414eb435bfedc65a5b9c959b4b3ca153450d4a18afbca2bdfe82179a3f74efef755e1bf9259077488684a92b07ec7488c2187e49753783e63bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faba4e162b3dddbd58d10d2b6980b5d4
SHA1cf448321601787926797914b13e1cbbf691f8f9b
SHA25668aeeadfc52a41893eb3ad7ce11ce9292014b11c322c28295abfef032bbbb7e1
SHA5125fcda5b003db5ce60751470831653fb821ed31374eab4983db6fe9dee0e5ca45de8cc08d0161b51481c833629feceb180b021a46fd50d831b5ea241489415a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5abec3b3a4a6fb17be65110ba3c48ee35
SHA100993a1a19cf4fb808fa2373c79e95936c256cca
SHA2563860dc62eb8edca5b2b1001f750ffb3c5b3ce2d8d7aad20f142601a60724942c
SHA5129f4ab46827bddc185272931d60a76bae7917e1c01e33b3cabc200455bef9a52bee66fb9bf4334ba4f6afd1c404cd8f9cfdd535d336ac966bb2c136408e876e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
143KB
MD5adae83f2c2d86cb6d1798ebd4ffb2e48
SHA1b6dd47415b372aa5987c3dcb7b1fbcc1fe07461f
SHA25698b5180b4d5f76c69dd2da4fbd2b97c58503fd815f7809b86b0e90b15bfddb53
SHA512190b25f96a2f7c8975aaef41a946b79c5969ec142919fd462ea7d5b7b91383d95304247d9ad0ad44f03dc9ae8244f95114cfe1d824982117d1d2d035d264bdda
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
625B
MD5d7c5baf5de1a4ee79909bfa053204382
SHA140900748d8f4ce55a839ea5efeb2a3b2675f3335
SHA2569932b761b9a30b062e7a596044525ecca062b548507f9c7aebda4cb7f7900d72
SHA512e872037efb96381d810ce8a528332028e8f3cbc35af08ac2a5417d46e7f4c710dede167ad704041b0213497dfbb6fefb92888e37ccbee95c846207c02b19cafa
-
Filesize
96KB
MD5bc7c219a16023671cdbaff305fd0064b
SHA14ee1df56673ffe282a072ad783e8e4c2ba369a75
SHA2569ffdf855d818abfad2865e0600b369c9e2e0e6a9900fddcc86adb2d458d2e54f
SHA512891288da63f3602be4bbb43ce1f7c43b16de7dd122a90af727ba9041b3a0cbd7b6ee016d2a3da0076386d86cb93834ab18604bf07a90495627743c24a7ce1c48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3063565911-2056067323-3330884624-1000\0f5007522459c86e95ffcc62f32308f1_de87a6d6-9d44-4942-9ec6-2be31b435411
Filesize1KB
MD5efc00aca1cc7692d19e46a5652c8a740
SHA16d4b5bcad29390a81d189306c7a3c70c75e1ade0
SHA256101075e992742c1295fda2da0e0147b817d9ced4bbc6c143352f6d9ed52c388b
SHA512590789e9f5f6378e086b3e40a96807e7b60763453614f70ac0993ecb7fec6bd1492df6a797a602572676f19a7885bb04e0d415e67f91134125b011bdeb4b10dd
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Blocker.gen-23cdff4548bab414f55106bc84fc8cccf7ffba77872853d59654ed2c8dc20d7e.exe
Filesize72KB
MD535d4eb9f89625dca4c15b424fa3a9b45
SHA1e0788de0c601db170bdf2455ec09b5d114298bb2
SHA25623cdff4548bab414f55106bc84fc8cccf7ffba77872853d59654ed2c8dc20d7e
SHA512e3b186224952392d22e94523fcf17beb7ae543bad3b8095576941d82e9b3ace12f17f52cec187bde17d48610a1d27cf803ad683e5c11fa953146546223e83fd1
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-0bd80f512dd5886986209806d0dee62457bafa92b0147c34ccb39357bef7d06c.exe
Filesize4.8MB
MD5133643c5465121ccff6cbbcf52c522e6
SHA11053d889210c6c45dd4add75611b949aebb6e819
SHA2560bd80f512dd5886986209806d0dee62457bafa92b0147c34ccb39357bef7d06c
SHA51202e8afa28fe26c86a5c025cf7cc0949efe84a54c7a41598bf340ea2435bd8bd86443d21686eeb01c6655f61e96a877cb56bc08a19e3a2c5d78c0f2df7f0983a5
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3.exe
Filesize54KB
MD5e744dccf47316421565f323b5bc52f74
SHA1e3c6dcc89ba90cd66c758d377ddac4ba059fc2a8
SHA256178a21b4243d7266fb7fb45e72d682c4f7cdc134e7118d96e68698c90108b6a3
SHA51203da1e2766c578d71a39504e237f1ad0fc430c65f3f96e074e08ff358d76e1c834cbefcdcc2f78920b4452aed2726214cff27ac302fede56d5044b605bf98dc0
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Generic-9ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b.exe
Filesize517KB
MD5049f5645cedd4dfd018ae9382b0e5019
SHA1aff3b1c4fcbc56545f4e5d1a9bf49a9c6806e06e
SHA2569ddd53f28685ad79e6b187b8f23d42b314598a3fbeda2c47a3533cec89ab6d0b
SHA5126d73d06dfc1bd36208e7f37eff93d5bf5325fedb9588ef96b856e39e6acf7771b2c1f155d7d27fbc2a04a26d0f5163e3d95b93fe4f0e4c2269dca880fefec48c
-
C:\Users\Admin\Desktop\00299\HEUR-Trojan-Ransom.Win32.Locky.vho-5a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add.exe
Filesize576KB
MD579d57f8f54bade79046ec3848bf14642
SHA17f90f82dd95f688b7479501e72f06e462876f29e
SHA2565a563e7b4523310c4cacd24956ef84f0af27a3cb6457d662da1db29d48918add
SHA512a479858fd4a839eee155987e01f674c4e99ca0f64597a919eacfb156c24c5b4227f92d3fe13dc08e0c99cb385213bb2e6ec2c889948a14c6083f024449acdc70
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.NSIS.Locky.j-6a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188.exe
Filesize335KB
MD5c262231fe30b3c1e14df620507e8dfac
SHA1c2ba1adea569c224166b94ed6e0ed0a89e0f2733
SHA2566a718cd88acf07f2cca550a4ffe5f14ddb6d6ef17d183fb1a2a1e251a1b73188
SHA5122987adfbab5e06dbb4bc6d4bbc103cd23539e4429be890e4b34e033be0808c70fde0a36234d67cb3300e99effb42b8ea3af14e9b92c853838987dcf0a680e9b2
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Blocker.kcal-c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc.exe
Filesize503KB
MD53f52bf79de7fe6bd2590bc1c4c71cb84
SHA179cec929e6a18fe6891fad8002f8ee976d39453f
SHA256c8958df49eb3851df6d3c759f85c8d8a892d24baa7d0f7483431e8debd2a1fcc
SHA512cade14d1fb40eee69287adf4f258ed2f0e8bcdd5b1ac1758836577d634e96818ffa14024ee16a0cb56a2c0d97c758e2e8c044cd043925c369e8168c791c505ee
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Crusis.to-a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e.exe
Filesize92KB
MD5f2679bdabe46e10edc6352fff3c829bc
SHA160cbe0e3a70ef3d56810bd9178ce232529c09c5f
SHA256a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e
SHA512595e5bd98d96aa4559cb4fa23a7705d30539b70017d5bc9d83f54bdffa3446b7a7b0ec342a342ae664f044c28cf1d43d0d5674143d1489516e0765570cd2af82
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Crypren.adra-79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe
Filesize3.1MB
MD591e55c043a89444b7cdfb335d4e4a5ba
SHA1d72203d462053c1636e20cf648669b040357d5db
SHA25679271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161
SHA5123f3efbb9928a8ffa683d2c528bc442545fb330fbf981ff639a581effc91569743258cbad88e9a2c8b6e66448e56af023213fc408ab66a6b53565a4e030a37777
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Cryptor.aoo-56081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1.exe
Filesize654KB
MD50719037c7f5631c5d8551232a3a874a5
SHA191df407e36acfae75e7c7659ec2cbbd25d6aa0a5
SHA25656081040edb1e713c2abd6ef38f3f5f9e7abc4c723dc19f598b67d536a2db9a1
SHA5129ccaae965e1b432e93165e726b7c797bb84094dbb2a77ae6cb7603c05eb3c119e4ddb208ac5be7cecf6daf8d38e22266567a0934edb2ae5639c29b5ee8b407a7
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnvv-df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916.exe
Filesize2.6MB
MD5ef4633ddb752fa30f97e3c8274e76de7
SHA1b45c6da06bd8044a263d8687b54405db3bd39103
SHA256df67c027355f9543d93d0986834ea437fce8afaa8f1fc31fe065db7db29f8916
SHA512ccfe2cf6d8378652cb2740962026aef72982399f4c65e6a6af9c06a76fd6bc5072a56aa1619fa6b816654e6054ce889936874fb7c02b6dc38ccecb45bf0af339
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nnwb-4041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4.exe
Filesize2.6MB
MD534739b7b338cd81a1a456997143170c0
SHA12a94d7facb1f42b0ada86ac1f441f9b7667a1faa
SHA2564041453aabda450faeaa6f9950b66832626570eea305ae69bcfd7b62db0645d4
SHA51282547b31bf0aed59afd3e96494ab6d8f5c56613f61b77b713a1b0929b71430348dc6cdf3e57a814c634f25e5879458f7a053f6d21e2c46ca39f15cfcccbe41ee
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.nokw-98d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58.exe
Filesize207KB
MD5327be1197384e3ae8166ea0dacbef34d
SHA138764223b80cc1e86ad40f51903295a53260e487
SHA25698d179f325c65cbf837af0e49fa6f6dfae6e9e047402c50877730b97cfebfc58
SHA5128533a46f2b04cb533e40327015acf3935e8678864a86ed8f673d2c5bcbb6fa757def2eb4d5e687cf0cc47e299fed3bb0d26678b586dcd83f277391d76cce9437
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Foreign.noor-cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93.exe
Filesize172KB
MD53d4292651aa4b6b6a30d9d169dc0f6bd
SHA12ccb25919b6093ecceae8425935262af95f6625f
SHA256cc70e724d09f7144245bb5dabb5a04735918ad3fbdd408dab9030283e90b4a93
SHA512c135d5e2f91bbac8f7b8fa665b366ade349811fcbf93f7918655c7c2f5c91fcee014a1d50be6503ee4a03918ec23d0fd2bfeb824b58765ea92437cec68bd5597
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.aabg-539f15847c5861e602a94c04f30fc27997e1b7b1f8dc3b26be568fbc8bcbe706.exe
Filesize968KB
MD54256ee4a7f187fc8756715ee8d513850
SHA124feebc1a32a5d9682b6f80e3d5400d724d7ce90
SHA256539f15847c5861e602a94c04f30fc27997e1b7b1f8dc3b26be568fbc8bcbe706
SHA512611fb0043c67454ced47f8cc66fafb6550ab09b391ff1c86f923f988956ab7fdb54845ca025ae388f21ae17bd1bca8438e34ebe661313dce56667c295903a795
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.aave-dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9.exe
Filesize575KB
MD5b7a5337ae06f5259601572af5b8efa5a
SHA1cea2ca64a560aff990754b06d905f40c1109f413
SHA256dcf0d21c2ef66ab3d2ca1c7a0741556f7d20f8c1349b131df39df0a25bede5f9
SHA512ea1ac6464bec04eb3e52ce317a92f6801a4607c66bd7b5778004aada09b3b279246dc2c25b3f0fcdbe3b69d20cce6a864d6d0c60fb7a15c6f751acc4bde17208
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.aeuv-7582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7.exe
Filesize572KB
MD58b675466a4b435c474c1491101c67997
SHA1913b563c9528abae3e7cfb7f8087a74b36f04eae
SHA2567582e36985e804e1115e91694b818e5bf17a6175a637c3e36754df861072e7e7
SHA5121fd99a12855e02af7fdeeece53f088968b9cde9949499af72e73f92d45ba4ec7f251b6890c412c4510a1dc9ac527a8ac05519fd7015f782fcd7f5fb50aaa6d87
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.afet-8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe
Filesize617KB
MD5d14bc9efe80aeb7d172cbb590f80eba7
SHA19d6ea38d9a33446488e3a53ca35669f7ded2b747
SHA2568514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285
SHA512cb22f3c7d3f35cc4d149d88caf128229c396123997b52c2dfb70203cbb671f967c20bb1615ec84227d1207d50cacd32daf1360f076d42c50b113949074192b58
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.afgz-c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac.exe
Filesize576KB
MD5ec89471fcb77f4ff7cf51ed0bbafb36a
SHA1d04d986ed6b067be5084b72ac6e8085e1e028686
SHA256c713b2ba0e8a6d4dfc34b628fdaff58bbd859fb9139a20786d4a4127968690ac
SHA5121d5cc032eff9ec5becfc98a3981ce1f6601f15fca784858d874355de406bb179ecfb2926e347273faf8a25987abb8296bd09e73797f549a9c5891f373d3eb462
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.afmm-56c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60.exe
Filesize594KB
MD5e28624a8e538837e0d7fe9c643535344
SHA1a550e873c0570f9eaa25a5a241e08403c102f715
SHA25656c63fd3c9cc655e4cb815790b62f3c6830d24c47b9e03fd0927aa31aa993f60
SHA512fc64cc941939f873a2b40f41197d84cb5b1be68b201d1d2687813bb24a8a60ef6a6fc82f49b86202f56bfec36ecb650f1b0546659579790df12b8080994f7057
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.cs-eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0.exe
Filesize102KB
MD516199b0bdaaee854e052efc645a98995
SHA137740df9716e35a73d2d0e955d822ecd94ac0931
SHA256eee19c411a3e518cba1c930f20e566fb1af87a27c2a0290f87200da13bcdaff0
SHA51223d67bf25f780648dcc3e5930d633e681a1fb431965a54415b50f87de4b7f77c893f60414ca8193004686fdcd251e7547507beff3dc85e9c4ba1ab9aee606b2c
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.dmp-2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea.exe
Filesize657KB
MD58009e4433aad21916a7761d374ee2be9
SHA1e0538c4bb3d0310f827799c98707b681d1f91b45
SHA2562deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea
SHA512404f98fb57d0842aa43d5a113a395ff1d5d963ae60bce81d4dc22f3f0b382a7ba06703b0d7404a240e5edf5f1f75f8bc9b980a966bd29b9e432cd09cb1507071
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.emd-f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703.exe
Filesize619KB
MD59c7d8e9d3a93425d97d4ec0d6040edc7
SHA110d1eeff1b3d4a39d4c3f8857e694c0ca26b457a
SHA256f488204e040717d898235caea9afc64541c0cefdc1b9c25318c2b6d6fb740703
SHA51247d32820909373c4bc720466ea9c286b760de307171165d3d298f1171d6f1aced027d018d52d2e8f05c5c032c892488f35cae1db3552e6e7ede5ffe6ddbef3b5
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.zbx-9aac311c5630c3d917f9d8eb9d93a4c7c2ca09cefa1d466dd6f681699202c883.exe
Filesize184KB
MD5c549827edc6bf5851855933b7749967b
SHA1dd94b32388da3734f72321c682d14c7a902d8bd4
SHA2569aac311c5630c3d917f9d8eb9d93a4c7c2ca09cefa1d466dd6f681699202c883
SHA512bcdaecffc8bfd534ca5e5e5b0e7a3485ecf56d71ec6203ea3fdcf24659f0f3b198e635d304b58d65078977ef203afa9eb2ef51a3cd78d4099a5eb67c513874c4
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.zmj-d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8.exe
Filesize640KB
MD5b2c03024ad43a1829c7c3384866de8e6
SHA10046e4014529f2dddb581e855d1bc0e50ce56355
SHA256d1b8b8c6cce9175c844875a68b61e50107cd7b5d5c6ac2ec76dbb3b06ed727f8
SHA512c08c7dceae01ae5b39a36d294b387e7ea27f59c1c65536a6a5d3340d944fb56e0be45ac5783c85de67b06c748cf1fbaebedb53657304d13db39758696f1298bf
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.ztv-99b0ebdeb576c983cfccf3612d6e3a41b380d0835ecc1b9e36b051d2788453ec.exe
Filesize268KB
MD5fee7da20404dd8f8aed5c98e33c4ac0a
SHA139015819a827e525c5b987b9b2bc1d9341a97a80
SHA25699b0ebdeb576c983cfccf3612d6e3a41b380d0835ecc1b9e36b051d2788453ec
SHA5126aadc51b0eeb1c9b447164f894046f5beb9bc7bf6106ed97c1e4c8813d248f652273d7a95a76ceb3eecac60694845f681ae8de041e612d753c13e72038f1e51a
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Locky.zyh-8feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158.exe
Filesize591KB
MD5ad8a32f07b16298584f61ebe6a88b257
SHA1e18cbd33779ffd3b604d5af30815e97a25ffb929
SHA2568feb981439774342fbe7c7a25c21d9cbae58f4cc13feb0ebf3657a85f2142158
SHA512467a5bf11a825e599d1c11799d6060bd6de29b423aba2907f289cbd6b8dd80fa18ae4e29a4b80925ec92ee7a7dc8e32298ae0694221a25adaf0fa44ba016b180
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Purgen.nn-927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba.exe
Filesize394KB
MD5861e0824b4515b0a9afa19da3a0cd908
SHA1d5665d4bd3132cd235d821434ec04a114e83e83e
SHA256927e2a0e67eb309007d2e1b8d0e7738e6462afe48f289e36d2827c7787f7e2ba
SHA512d8e8b2b6b12010f66e9ce33fc2c1b510f8bad405872d0c0596b576129d206e11e988a1ab7c8877e20b180f839f1758f3f8e9fbd99411dbe13fc5abaff4ba8fe9
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.SageCrypt.cod-ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4.exe
Filesize308KB
MD539fdc17df85cc6ec5e219c26577741a0
SHA115f7ce4004ba502b0a3ec2524fc697d41e642289
SHA256ad1dc1a4c3c42773ea67f79367b24394c87a952e38c27d280022bb49fa2d1ee4
SHA512530bdb2cd8b472e2bacdd99748202fccf84af8f1391b1012b83b62b20cba9a34bf2520848a46eea5230518a13b8c705884d64411e4e6d437a428cf340dddb127
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Wanna.c-6a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3.exe
Filesize292KB
MD5b581da8662097751690bb23658487c5c
SHA1e8108488881e6570f29f4a4611df285691a44522
SHA2566a0ec29f934314016e28a6145b25e8f401abf7fbd77229dfaa729fad55dd31b3
SHA5120ab13df42ecb79ca649f3217fb4ef345ee1724d7a1a5fba4b23bc2c0cc4d0eb4f8f8faa90be5e15f3e84d6704c15775fcdbc0ab192c35ee56c18f1985bd8da52
-
C:\Users\Admin\Desktop\00299\Trojan-Ransom.Win32.Wanna.zbu-0a2bab1c970ea52bd82d1193caab0e7ef4a9d0e47f1afca32a5550481974ca72.exe
Filesize3.4MB
MD518ca7cacb42a19898201539af5a88ebf
SHA137778d20a5674fb41c2ff5b42a25265d31b91dac
SHA2560a2bab1c970ea52bd82d1193caab0e7ef4a9d0e47f1afca32a5550481974ca72
SHA51233873bbd4fe2a30e0d3604ad8f687c39932722d6626fd6b38fcfbdaf2e97af6727c3dbfd1febb7221be2040e2f9e847e71b8eedc7e14f9de5abb0373e10f3e7c
-
Filesize
142B
MD557823edbeb07858c8fcbddbbf9dbecac
SHA17fa6f55b7898dd2297a228f428a19bb6c7fba93b
SHA25695307ce9e2b82db1bdaa8721863aeb8acfaf0a4af5ff1ff321d915dd08cb4eca
SHA512128b4df55c2d403eb489cca8efcda9648cc865b0a682be4bab9b193cd1d5f6101a006253e63c70bb709d6422727bc0d07066cccfdcf9979e574fdf3ce16850b2
-
Filesize
184KB
MD5eb128e3e483a53556c05e3d6ed6a8303
SHA1509f9651bcf360b6610bf8637ffac029504d3050
SHA25606e68b0a12fad2ed6d7efe27160ea165324f1347a0c92838c1a74af6bc33f21f
SHA512d896614d61d0e9162132aedf78fe3c3b588da7aa24868ea7c9f699a9e527ae0c05d72ec1ff8a6b48cdceb8461d84fa6cad6cae41aac76affe8d7a7ba22c08cdc
-
Filesize
3.3MB
MD57861cdc3ecb089cd9975b18378b42232
SHA10c7e384d1606ea95d3e302e308ac8dc5fbf67c53
SHA2568e481451513980e0923c01518ddc8ab323775a2065317cb89715cfc99a25e1d1
SHA512cdc92f0438254d86c3e63d003ce3e698745b9f3aa119b3bd4bd6f014470b9f104d2745719d53c32a31825908fe0bf1ff8078ecc1668b4b2fad5348f11db42f71
-
Filesize
3.3MB
MD591b332e2f5a9bc4b8ec951bfab65c182
SHA1471bd1c487b3b5d53b8c75ed24a97a7071dfba7b
SHA25602e2c8e16190f328d20eb1908f9121acc996ce02a6a8bd2ffc2adb6cc3e9ae9b
SHA512ac19cfa5c301e0cc0d0e7df2f5e8de5c0a205f8b247aa85ce9bf7a6acaa801b728a0f946ed18f6549ad90f9b05ca474d497714eaa9d81a938366c4a6a0a7095e
-
Filesize
67KB
MD51fbfe52e9d1eae27b0c28206f685dd79
SHA17fa388f8ae3caf8bc5c7332b5f3edb1459595511
SHA25679e0de353f493f25db451348d93165c53fd445f8224d260458e1ad2f2f2a4a64
SHA5128813a25171f2d887be791ce9ce01a7056b34932b682121b37d4210a7cc42c5cb194c097ee3236ba713194dec821f0d55cc4372d16806e879d97eb3eed9d70190
-
Filesize
9KB
MD5d573fe70adc029fa2d36373321da152e
SHA1da8dbd7f4e390332393a7aea6bbf6b4fb349dab3
SHA256da6f91cb4139b56f81d35cd0769afde0dc430a33d534fa0269770d156b8a4719
SHA5129bc10e021f1d435f7cc5af93b34bc97ef3aa599307239ccbafec357ebf36ee9bff43754c26b70d8327b86242576048b7413b7d3298718259b0fa49f3ee788988
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390