Analysis
-
max time kernel
77s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 16:30
Static task
static1
General
-
Target
RNSM00295.7z
-
Size
13.0MB
-
MD5
44ba5bd71576de83e067960138b8891b
-
SHA1
835e22a76cb3a7ea168390e8c108051adac78752
-
SHA256
8ed4b5d0a5bd733696802b71bc01d317f0add177925a82930edce4b7cc9a907a
-
SHA512
161bdc166f50559720878d8c39a0fb3df5f0bd8bb323f6316fc8d99714e6f8f3d75d63a358cc528b32706399efee2088eda9afe45a2858216655e52c72c0aa8f
-
SSDEEP
393216:Sp2W2xTnEXY4WwHE40lGwiuYAzH5P5q5Dp:223xERHP0lFiuL75PQ9
Malware Config
Extracted
netwire
micro.loginto.me:3360
c0der.ddns.net:3360
bakbumz.ddns.net:3360
-
activex_autorun
true
-
activex_key
{IGXB136N-WP56-42I3-3EN8-85A00571YU01}
-
copy_executable
true
-
delete_original
false
-
host_id
2016-%Rand%
-
install_path
%AppData%\Install\Notepad.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
parola
-
registry_autorun
true
-
startup_name
Notepad
-
use_mutex
false
Extracted
C:\Users\Admin\Documents\_README_06X86G_.hta
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fmhad.txt
http://t54ndnku456ngkwsudqer.wallymac.com/3959D58DB927D87
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/3959D58DB927D87
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/3959D58DB927D87
http://xlowfznrg4wf7dli.onion/3959D58DB927D87
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+tvgdx.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/BE4BEDB76B6F7551
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/BE4BEDB76B6F7551
http://5rport45vcdef345adfkksawe.bematvocal.at/BE4BEDB76B6F7551
http://fwgrhsao3aoml7ej.onion/BE4BEDB76B6F7551
http://fwgrhsao3aoml7ej.ONION/BE4BEDB76B6F7551
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+rgb.txt
http://pren874bwsdbmbwe.returnyourfiless.ru/BE4BEDB76B6F7551
http://i4sdmjn4fsdsdqfhu12l.orbyscabz.com/BE4BEDB76B6F7551
http://rr48nfhdj5wedsm99324.tuttianent.at/BE4BEDB76B6F7551
http://yez2o5lwqkmlv5lc.onion/BE4BEDB76B6F7551
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1652-378-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1652-375-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1652-1159-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1652-1333-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FB_A238.tmp.exe -
Modifies boot configuration data using bcdedit 1 TTPs 5 IoCs
pid Process 1584 bcdedit.exe 2332 bcdedit.exe 2592 bcdedit.exe 3596 bcdedit.exe 5020 bcdedit.exe -
Renames multiple (763) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (95) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations 1 TTPs 2 IoCs
Remove evidence of malicious network connections to clean up operations traces.
pid Process 2772 reg.exe 6264 reg.exe -
Contacts a large (1684) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables taskbar notifications via registry modification
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3568 netsh.exe 3420 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FB_A238.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FB_A238.tmp.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioHD.url FB_A238.tmp.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe -
Executes dropped EXE 51 IoCs
pid Process 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 2812 HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe 376 HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe 2028 Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe 2440 Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe 2472 Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe 2492 Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe 2500 Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe 2056 Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe 2592 Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 2536 Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe 2208 Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe 2612 Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe 1216 Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe 848 Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe 1536 Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe 1168 Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe 1444 Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe 924 UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe 2476 Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe 2268 Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe 1956 Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe 2348 Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe 2572 Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe 2084 Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe 1908 Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe 1100 Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe 2088 Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe 1248 Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe 1296 Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe 2004 Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe 2192 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 1452 Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe 348 rcpdtjiivxat.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 912 FB_A238.tmp.exe 2760 eutscwc.exe 2876 tahldqhkfffs.exe 2164 noagqygdmwuc.exe 1664 daemon2.exe 1652 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 2636 Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe 3440 Notepad.exe 2912 FB_CE58.tmp.exe 4084 HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe 1732 logview32.exe 3116 Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe 3792 ecnrshqrsmui.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine FB_A238.tmp.exe -
Loads dropped DLL 23 IoCs
pid Process 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe 2572 Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe 1452 Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe 2476 Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 1020 WerFault.exe 1652 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 1020 WerFault.exe 1020 WerFault.exe 2572 Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe 3440 Notepad.exe 3440 Notepad.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 1020 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\DisableAntiSpyware = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Daemon = "\"C:\\Users\\Admin\\AppData\\Roaming\\daemon2.exe\"" daemon2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\werity-32452345 = "C:\\Users\\Admin\\AppData\\Roaming\\eutscwc.exe" eutscwc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\AudioHD = "C:\\Users\\Admin\\AppData\\Roaming\\AudioHDriver\\FB_A238.tmp.exe" FB_A238.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbowqhnifusi = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\noagqygdmwuc.exe\"" noagqygdmwuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\owqhnifusirq = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\rcpdtjiivxat.exe\"" rcpdtjiivxat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\werity-32452345 = "C:\\Users\\Admin\\AppData\\Roaming\\eutscwc.exe" eutscwc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbowqhn = "C:\\Windows\\SYSTEM32\\CMD.EXE /C START C:\\Windows\\tahldqhkfffs.exe" tahldqhkfffs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\epson = "C:\\Users\\Admin\\Desktop\\00295\\Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe" Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe -
Drops desktop.ini file(s) 28 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\i: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\k: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\m: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\p: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\y: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\a: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\b: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\e: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\n: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\o: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\u: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\v: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\q: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\x: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\z: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\l: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\r: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\s: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe File opened (read-only) \??\t: Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 904 iplogger.com 907 iplogger.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 582 api.ipify.org 1167 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1852-484-0x0000000001230000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/1852-1311-0x0000000001230000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/1852-2416-0x0000000001230000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/1732-3618-0x0000000001250000-0x000000000134E000-memory.dmp autoit_exe behavioral1/memory/6004-41992-0x0000000001250000-0x000000000134E000-memory.dmp autoit_exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7FC.bmp" Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1908 Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe 3304 svchost.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2864 set thread context of 1652 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 78 PID 2192 set thread context of 2080 2192 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 81 PID 1452 set thread context of 2636 1452 Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe 97 PID 1988 set thread context of 4084 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe 105 PID 3440 set thread context of 3676 3440 Notepad.exe 112 PID 2592 set thread context of 3116 2592 Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe 118 -
resource yara_rule behavioral1/memory/1852-127-0x0000000001230000-0x000000000132E000-memory.dmp upx behavioral1/files/0x00050000000195fb-126.dat upx behavioral1/memory/1852-484-0x0000000001230000-0x000000000132E000-memory.dmp upx behavioral1/memory/1216-1141-0x0000000000400000-0x00000000005DF000-memory.dmp upx behavioral1/memory/1248-1356-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1852-1311-0x0000000001230000-0x000000000132E000-memory.dmp upx behavioral1/memory/1216-1323-0x0000000000400000-0x00000000005DF000-memory.dmp upx behavioral1/memory/1852-2191-0x0000000003A90000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1852-2416-0x0000000001230000-0x000000000132E000-memory.dmp upx behavioral1/memory/1732-3618-0x0000000001250000-0x000000000134E000-memory.dmp upx behavioral1/memory/6004-39660-0x0000000001250000-0x000000000134E000-memory.dmp upx behavioral1/memory/6004-41992-0x0000000001250000-0x000000000134E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDS.DLL Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt noagqygdmwuc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\LOOKUP.DAT Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\DVD Maker\it-IT\Recovery+tvgdx.png noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\System\ado\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png noagqygdmwuc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryNewsletter.dotx Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_ButtonGraphic.png noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_ReCoVeRy_+fmhad.html tahldqhkfffs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg tahldqhkfffs.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Recovery+tvgdx.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\Recovery+tvgdx.html noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveReport.dotx Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\Recovery+tvgdx.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\en-US\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt tahldqhkfffs.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576black.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png noagqygdmwuc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSF.DLL Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt tahldqhkfffs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png tahldqhkfffs.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\XmlFile.zip Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\DVD Maker\es-ES\Recovery+tvgdx.png noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_ReCoVeRy_+fmhad.html tahldqhkfffs.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_ReCoVeRy_+fmhad.html tahldqhkfffs.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSN.ICO Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.INF Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\en-US\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files\7-Zip\readme.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\Recovery+tvgdx.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\System\es-ES\Recovery+tvgdx.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_ButtonGraphic.png noagqygdmwuc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianReport.Dotx Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_ReCoVeRy_+fmhad.txt tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png noagqygdmwuc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png tahldqhkfffs.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUDIOSEARCHMAIN.DLL Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File created C:\Program Files (x86)\Microsoft Office\Office14\RECOVER-FILES..html Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\Recovery+tvgdx.html noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\Recovery+tvgdx.png noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\System\en-US\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyMergeLetter.dotx Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Recovery+tvgdx.png noagqygdmwuc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_ReCoVeRy_+fmhad.png tahldqhkfffs.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7fr.dll Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\ecnrshqrsmui.exe Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe File opened for modification C:\Windows\ecnrshqrsmui.exe Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe File created C:\Windows\rcpdtjiivxat.exe Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe File opened for modification C:\Windows\rcpdtjiivxat.exe Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe File opened for modification C:\Windows\tahldqhkfffs.exe Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe File created C:\Windows\noagqygdmwuc.exe Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe File opened for modification C:\Windows\noagqygdmwuc.exe Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe File created C:\Windows\tahldqhkfffs.exe Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe File opened for modification \??\c:\windows\ Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1020 1444 WerFault.exe 69 3348 348 WerFault.exe 77 4796 376 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daemon2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noagqygdmwuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rcpdtjiivxat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_A238.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eutscwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tahldqhkfffs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecnrshqrsmui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logview32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1292 cmd.exe 5248 cmd.exe 4852 cmd.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-76.dat nsis_installer_1 behavioral1/files/0x0004000000004ed7-76.dat nsis_installer_2 behavioral1/files/0x00050000000194d0-121.dat nsis_installer_1 behavioral1/files/0x00050000000194d0-121.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2356 vssadmin.exe 1492 vssadmin.exe 2832 vssadmin.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.bat Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 5060 NOTEPAD.EXE 3056 NOTEPAD.EXE 4984 NOTEPAD.EXE -
Runs regedit.exe 1 IoCs
pid Process 3356 regedit.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 36 IoCs
pid Process 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe 2872 HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe 2812 HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe 376 HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe 2440 Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe 2028 Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe 2472 Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe 2476 Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe 2492 Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe 2268 Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe 2500 Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe 1956 Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe 2056 Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe 2348 Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe 2592 Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe 2572 Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 2084 Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe 2536 Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe 1908 Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe 2208 Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe 1100 Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe 2612 Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe 2088 Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe 1216 Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe 1248 Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe 848 Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe 1296 Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe 1536 Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe 2004 Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe 1168 Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe 2192 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 1444 Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe 1452 Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe 924 UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 2612 Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe 1512 taskmgr.exe 1512 taskmgr.exe 1216 Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe 1512 taskmgr.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1452 Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe 1908 Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe 1908 Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeRestorePrivilege 2560 7zFM.exe Token: 35 2560 7zFM.exe Token: SeSecurityPrivilege 2560 7zFM.exe Token: SeDebugPrivilege 1512 taskmgr.exe Token: SeDebugPrivilege 2500 Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe Token: SeDebugPrivilege 2056 Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe Token: SeLoadDriverPrivilege 2088 Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe Token: SeDebugPrivilege 2476 Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe Token: SeDebugPrivilege 2084 Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe Token: SeShutdownPrivilege 2080 Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe Token: SeLoadDriverPrivilege 2088 Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe Token: SeBackupPrivilege 1232 vssvc.exe Token: SeRestorePrivilege 1232 vssvc.exe Token: SeAuditPrivilege 1232 vssvc.exe Token: SeDebugPrivilege 2760 eutscwc.exe Token: SeLoadDriverPrivilege 2088 Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe Token: SeLoadDriverPrivilege 2088 Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe Token: SeDebugPrivilege 912 FB_A238.tmp.exe Token: SeDebugPrivilege 2164 noagqygdmwuc.exe Token: SeDebugPrivilege 2876 tahldqhkfffs.exe Token: SeDebugPrivilege 348 rcpdtjiivxat.exe Token: SeDebugPrivilege 2440 Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe Token: SeDebugPrivilege 2028 Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe Token: SeIncreaseQuotaPrivilege 1752 WMIC.exe Token: SeSecurityPrivilege 1752 WMIC.exe Token: SeTakeOwnershipPrivilege 1752 WMIC.exe Token: SeLoadDriverPrivilege 1752 WMIC.exe Token: SeSystemProfilePrivilege 1752 WMIC.exe Token: SeSystemtimePrivilege 1752 WMIC.exe Token: SeProfSingleProcessPrivilege 1752 WMIC.exe Token: SeIncBasePriorityPrivilege 1752 WMIC.exe Token: SeCreatePagefilePrivilege 1752 WMIC.exe Token: SeBackupPrivilege 1752 WMIC.exe Token: SeRestorePrivilege 1752 WMIC.exe Token: SeShutdownPrivilege 1752 WMIC.exe Token: SeDebugPrivilege 1752 WMIC.exe Token: SeSystemEnvironmentPrivilege 1752 WMIC.exe Token: SeRemoteShutdownPrivilege 1752 WMIC.exe Token: SeUndockPrivilege 1752 WMIC.exe Token: SeManageVolumePrivilege 1752 WMIC.exe Token: 33 1752 WMIC.exe Token: 34 1752 WMIC.exe Token: 35 1752 WMIC.exe Token: SeDebugPrivilege 3116 Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2560 7zFM.exe 2560 7zFM.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe 1512 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2492 Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe 2268 Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe 1852 Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe 3912 iexplore.exe 3912 iexplore.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2004 Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2864 2168 cmd.exe 36 PID 2168 wrote to memory of 2864 2168 cmd.exe 36 PID 2168 wrote to memory of 2864 2168 cmd.exe 36 PID 2168 wrote to memory of 2864 2168 cmd.exe 36 PID 2168 wrote to memory of 2872 2168 cmd.exe 37 PID 2168 wrote to memory of 2872 2168 cmd.exe 37 PID 2168 wrote to memory of 2872 2168 cmd.exe 37 PID 2168 wrote to memory of 2872 2168 cmd.exe 37 PID 2168 wrote to memory of 1988 2168 cmd.exe 38 PID 2168 wrote to memory of 1988 2168 cmd.exe 38 PID 2168 wrote to memory of 1988 2168 cmd.exe 38 PID 2168 wrote to memory of 1988 2168 cmd.exe 38 PID 2168 wrote to memory of 2812 2168 cmd.exe 39 PID 2168 wrote to memory of 2812 2168 cmd.exe 39 PID 2168 wrote to memory of 2812 2168 cmd.exe 39 PID 2168 wrote to memory of 2812 2168 cmd.exe 39 PID 2168 wrote to memory of 376 2168 cmd.exe 40 PID 2168 wrote to memory of 376 2168 cmd.exe 40 PID 2168 wrote to memory of 376 2168 cmd.exe 40 PID 2168 wrote to memory of 376 2168 cmd.exe 40 PID 2168 wrote to memory of 2440 2168 cmd.exe 41 PID 2168 wrote to memory of 2440 2168 cmd.exe 41 PID 2168 wrote to memory of 2440 2168 cmd.exe 41 PID 2168 wrote to memory of 2440 2168 cmd.exe 41 PID 2168 wrote to memory of 2028 2168 cmd.exe 42 PID 2168 wrote to memory of 2028 2168 cmd.exe 42 PID 2168 wrote to memory of 2028 2168 cmd.exe 42 PID 2168 wrote to memory of 2028 2168 cmd.exe 42 PID 2168 wrote to memory of 2472 2168 cmd.exe 43 PID 2168 wrote to memory of 2472 2168 cmd.exe 43 PID 2168 wrote to memory of 2472 2168 cmd.exe 43 PID 2168 wrote to memory of 2472 2168 cmd.exe 43 PID 2168 wrote to memory of 2476 2168 cmd.exe 44 PID 2168 wrote to memory of 2476 2168 cmd.exe 44 PID 2168 wrote to memory of 2476 2168 cmd.exe 44 PID 2168 wrote to memory of 2476 2168 cmd.exe 44 PID 2168 wrote to memory of 2492 2168 cmd.exe 45 PID 2168 wrote to memory of 2492 2168 cmd.exe 45 PID 2168 wrote to memory of 2492 2168 cmd.exe 45 PID 2168 wrote to memory of 2492 2168 cmd.exe 45 PID 2168 wrote to memory of 2268 2168 cmd.exe 46 PID 2168 wrote to memory of 2268 2168 cmd.exe 46 PID 2168 wrote to memory of 2268 2168 cmd.exe 46 PID 2168 wrote to memory of 2268 2168 cmd.exe 46 PID 2168 wrote to memory of 2500 2168 cmd.exe 47 PID 2168 wrote to memory of 2500 2168 cmd.exe 47 PID 2168 wrote to memory of 2500 2168 cmd.exe 47 PID 2168 wrote to memory of 2500 2168 cmd.exe 47 PID 2168 wrote to memory of 1956 2168 cmd.exe 48 PID 2168 wrote to memory of 1956 2168 cmd.exe 48 PID 2168 wrote to memory of 1956 2168 cmd.exe 48 PID 2168 wrote to memory of 1956 2168 cmd.exe 48 PID 2168 wrote to memory of 2056 2168 cmd.exe 49 PID 2168 wrote to memory of 2056 2168 cmd.exe 49 PID 2168 wrote to memory of 2056 2168 cmd.exe 49 PID 2168 wrote to memory of 2056 2168 cmd.exe 49 PID 2168 wrote to memory of 2348 2168 cmd.exe 50 PID 2168 wrote to memory of 2348 2168 cmd.exe 50 PID 2168 wrote to memory of 2348 2168 cmd.exe 50 PID 2168 wrote to memory of 2348 2168 cmd.exe 50 PID 2168 wrote to memory of 2592 2168 cmd.exe 51 PID 2168 wrote to memory of 2592 2168 cmd.exe 51 PID 2168 wrote to memory of 2592 2168 cmd.exe 51 PID 2168 wrote to memory of 2592 2168 cmd.exe 51 -
System policy modification 1 TTPs 11 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" noagqygdmwuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" rcpdtjiivxat.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System eutscwc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" eutscwc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tahldqhkfffs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tahldqhkfffs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System noagqygdmwuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rcpdtjiivxat.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 6324 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00295.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2560
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exeHEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2864 -
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exeC:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeC:\Users\Admin\AppData\Roaming\Install\Notepad.exe5⤵PID:3676
-
-
-
-
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exeHEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2872 -
C:\Users\Admin\AppData\Roaming\daemon2.exeC:\Users\Admin\AppData\Roaming\daemon2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://searchesin-cols.ru/4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2964
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:406533 /prefetch:25⤵PID:812
-
-
-
-
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exeHEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1988 -
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exeHEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4084
-
-
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2812
-
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exeHEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- System policy modification
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 3763⤵
- Program crash
PID:4796
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exeTrojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exeTrojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exeTrojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2472 -
C:\Users\Admin\Desktop\00295\Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exeTrojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe3⤵PID:2228
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exeTrojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Users\Admin\AppData\Roaming\eutscwc.exeC:\Users\Admin\AppData\Roaming\eutscwc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2760 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootems off4⤵
- Modifies boot configuration data using bcdedit
PID:1584
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet4⤵
- Interacts with shadow copies
PID:1492
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} advancedoptions off4⤵
- Modifies boot configuration data using bcdedit
PID:2332
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} optionsedit off4⤵
- Modifies boot configuration data using bcdedit
PID:2592
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures4⤵
- Modifies boot configuration data using bcdedit
PID:3596
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} recoveryenabled off4⤵
- Modifies boot configuration data using bcdedit
PID:5020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\help_recover_instructions.HTM4⤵PID:4860
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4860 CREDAT:275457 /prefetch:25⤵PID:5856
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet4⤵
- Interacts with shadow copies
PID:2832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\eutscwc.exe4⤵PID:6912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TROJAN~4.EXE3⤵PID:2832
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exeTrojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exeTrojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe3⤵PID:3248
-
C:\Windows\vvajfstlewem.exeC:\Windows\vvajfstlewem.exe4⤵PID:4604
-
C:\Windows\vvajfstlewem.exeC:\Windows\vvajfstlewem.exe5⤵PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TRBCFD~1.EXE4⤵PID:4300
-
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exeTrojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exeTrojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Windows\rcpdtjiivxat.exeC:\Windows\rcpdtjiivxat.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 3764⤵
- Program crash
PID:3348
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TR146D~1.EXE3⤵PID:2432
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exeTrojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1956
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exeTrojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\tahldqhkfffs.exeC:\Windows\tahldqhkfffs.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2876 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT4⤵
- Opens file in notepad (likely ransom note)
PID:3056
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM4⤵PID:5852
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5852 CREDAT:275457 /prefetch:25⤵PID:1944
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\TAHLDQ~1.EXE4⤵PID:5660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TR0168~1.EXE3⤵PID:1448
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exeTrojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2348 -
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exeTrojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe3⤵PID:3664
-
C:\Windows\tcfaucdqebng.exeC:\Windows\tcfaucdqebng.exe4⤵PID:1996
-
C:\Windows\tcfaucdqebng.exeC:\Windows\tcfaucdqebng.exe5⤵PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TR33FD~1.EXE4⤵PID:3340
-
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exeTrojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2592 -
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exeTrojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3116 -
C:\Windows\ecnrshqrsmui.exeC:\Windows\ecnrshqrsmui.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Windows\ecnrshqrsmui.exeC:\Windows\ecnrshqrsmui.exe5⤵PID:296
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TRD4A8~1.EXE4⤵PID:3048
-
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exeTrojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\FB_A238.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_A238.tmp.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\FB_CE58.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_CE58.tmp.exe"3⤵
- Executes dropped EXE
PID:2912
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exeTrojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Users\Admin\AppData\Roaming\logview32.exe"C:\Users\Admin\AppData\Roaming\logview32.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Roaming\agfxdrv.exe"C:\Users\Admin\AppData\Roaming\agfxdrv.exe"4⤵PID:4688
-
-
C:\Users\Admin\AppData\Roaming\logview32.exeC:\Users\Admin\AppData\Roaming\logview32.exe /control "" "0x000203DE"4⤵PID:6004
-
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exeTrojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Windows\noagqygdmwuc.exeC:\Windows\noagqygdmwuc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2164 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵PID:832
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT4⤵
- Opens file in notepad (likely ransom note)
PID:4984
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM4⤵PID:5032
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:275457 /prefetch:25⤵PID:4600
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:4207620 /prefetch:25⤵PID:7856
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:406545 /prefetch:25⤵PID:6240
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:406554 /prefetch:25⤵PID:8136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NOAGQY~1.EXE4⤵PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TRC852~1.EXE3⤵PID:2628
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exeTrojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵PID:2672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet4⤵PID:4020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No4⤵PID:3824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵PID:4044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵PID:3760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet4⤵PID:316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No4⤵PID:3660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵PID:1784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵PID:576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet4⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No4⤵PID:3400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵PID:5608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵PID:920
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!#_READ_ME_#!.hta"4⤵PID:6036
-
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exeTrojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1908
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exeTrojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
PID:2208 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:4552
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exeTrojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1100
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exeTrojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_9AF8.tmp.bat3⤵PID:1980
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2356
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_3ED6.tmp.bat3⤵PID:2564
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f4⤵
- Clears Network RDP Connection History and Configurations
PID:2772
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f4⤵
- Clears Network RDP Connection History and Configurations
PID:6264
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"4⤵PID:6268
-
-
C:\Windows\SysWOW64\attrib.exeattrib Default.rdp -s -h4⤵
- Views/modifies file attributes
PID:6324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_3ED7.tmp.bat3⤵PID:2944
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exeTrojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exeTrojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exeTrojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1248
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exeTrojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:848 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1292
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4852
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exeTrojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1296
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exeTrojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1536
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exeTrojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:2004 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
PID:3568
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
PID:3420
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___FWEY_.hta"3⤵PID:5912
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___WRWZUCI_.txt3⤵
- Opens file in notepad (likely ransom note)
PID:5060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "T" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5248
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exeTrojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1168
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exeTrojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2192 -
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exeTrojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe3⤵
- Drops startup file
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\_README_VHF4_.hta"4⤵PID:5116
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:5908
-
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exeTrojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 883⤵
- Loads dropped DLL
- Program crash
PID:1020
-
-
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exeTrojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1452 -
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exeTrojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe3⤵
- Executes dropped EXE
PID:2636
-
-
-
C:\Users\Admin\Desktop\00295\UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exeUDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:924
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1512
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3304
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-496863605348264368-918403360-534084271-1372316973-7869444181855692596236327245"1⤵PID:2628
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:3432
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x48c1⤵PID:3448
-
C:\Windows\Explorer.EXE"C:\Windows\Explorer.EXE"1⤵PID:4636
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"2⤵PID:4920
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeC:\Users\Admin\AppData\Roaming\Install\Notepad.exe3⤵PID:4536
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\HELP_RECOVER_instructions+rgb.txt2⤵PID:2008
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
PID:3356
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:1996
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:5548
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:5000
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:6140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
4Clear Network Connection History and Configurations
1File Deletion
3Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
5System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cbf38e1078a49bb6437aea9fef80cb1d
SHA1f4718ddf3390e3ac24d271ffa04de1abd4d10626
SHA2564f627037da4bacf34f1ea8557d7c974ddf8ff5de54e6d968c09ba663bc964881
SHA51211d2c935996618e6ff2aaef1e8d2da56d704d647621657dff8dc73954302169dc1b33fb561b6c06145816e3d6e6806678224758ec541b906f8338ed3b05e0626
-
Filesize
2KB
MD5786aff37d716cb1c425f895c0d099923
SHA16569f06245ad5028fe1414186a475381c00eaba2
SHA2561732774fe35e7228aff34eba5b0f424a47982b7ce33111e914009e45cc6438d1
SHA51284403f8adee80d0a699241765534ca1519f17c9bd843649b71f2314faa56c9338d8bfdd91efc8431099697ec9733cd5103dae243374449ee1ecbb4d03d4e634e
-
Filesize
9KB
MD553b22777b0d14af3c1dcfa35bc22cba8
SHA16bd22983e6b1ab000c22377db9cb52a0e101e35f
SHA256e0f6d8d4152fe48b2106c89455f679fc7b596032ca02a9d4929d19daa1d50605
SHA512e7d65f2b4e86c867222b83988a2e133af7506e7a09a58263d97da72fe53ee310d0a7fb3f5ab64668c0b60e4b4499a812e0cc657eba96df397fed2bb903b7358b
-
Filesize
67KB
MD5d4908e660d8470ec52560b29dc844efa
SHA1a7a7b3292dfb932e689f03b4735294f68e64174d
SHA25618b3da980fc7458932600602aed71b0cb59de3cf191e9973faf57d40c366c1fc
SHA5127f237d13a31ec17c50d6b6d3ff787cd9f9df06864266a5ed2b8846bed8d0ac94a662db47c931339a0f3048035988ec19aa6e86b15791ff3f3e8be2c0f955150b
-
Filesize
2KB
MD56159ba87c80e314b51e19406584ce3f2
SHA1508ca7e16fa70fd27093e61943a3954e46547560
SHA256b15f4404e3cf60c2750ed57a1a21a06313fca0c62f2d7db76f55cb5979e53206
SHA5129fdfbea7560f112781b9f2a578ead09a6cd395d1aba27678dc14bfa2bb67db4571781dc2754d536d1c63eb593bff6fbe637517d468e5d6e788c7e806aaed91ee
-
Filesize
12KB
MD5fb2109197f59d5aca1ab4407dc58af53
SHA138814ec0893454967068a6bd34666a9755229d9a
SHA25697a86e5f0cbb78f62c680e248bdb68733e2c642e714408f7c8c3b5256d279042
SHA512ca3e726c43181543906a6a24b4d8d48f00a0b9629b74d4a2d6444f2059c01385b1942a1e8dbf916f266ff95806f4034658b654231cd23c727e620553512b3279
-
Filesize
63KB
MD5fe4ffcfeeadb100e4d90c42f91ad1fe9
SHA1e2263bdcba64851ab7374da3b522dabf545e05cf
SHA256af67fb1b91311e808c950d0e4e8f71eaf7067d4d18cd2b58576186a2f0826f1f
SHA5125083b73412a1bccd3e9e77b832c303faa921903fc706939b1a1db16a44bb21385c10798ef530fe0526c4dd91cb2cfd6c2cbe0703c341c74b207a675b639c7191
-
Filesize
1KB
MD569cceccbd57224b5b6dd4be95f5a7c74
SHA1934886d84f611e3d7d09a7b9a17103e090c1676b
SHA25670037318b940778b9b2591fd37f9bcf3225dd93c46cf61ea344de08e817cf267
SHA512fd2d2fb69c039cb226b77d4e7b3421bc7bc7f40f6d9ea2a7957a2f3ebf6a14f5a36163b2d9bda0cfc7624de8bef472c22b56d5e31f76b7d32e17e2fb5d0be6cb
-
Filesize
12KB
MD5713e2014aebb69b39f02738fe7bc0f06
SHA1663d6d5b48c81c39b987be17f3aea20270997650
SHA25611a5d0d4bd32b9b928081312544c3c264e0bba33a4eb2d3b94711b9e7cf66217
SHA512d59212fabcbd9451a80cf3a9d87312344033c0e958efbfafbd35815af65f44b83d7ee854c98495fc5ead70356988211f986619550240990d0ece6faa94f3a18d
-
Filesize
2KB
MD535462a5ef7e498a944b26220ea9f2a7d
SHA161257db0a8d6ddb0ed3de76b4062d2ff435792ec
SHA2564ad25b0911bed96830e6fcf2788106f286b10ff9ae637fae359c13ef82463fe5
SHA512aaf7d4201bd62d8ebe30cd9beb0812aa5a352cd5ae64fd1bbe6eb62f4696f7927b6cf7bb062a122892ba526e12fb94f81296072f024d7fd9284dd8f6790e242d
-
Filesize
9KB
MD50e9865736e5b0d2d2e760d6bd0e7d6ea
SHA19588845cf5b7d4c6c1033bfb52a4aa5b4a50c235
SHA256af3a1b7ca52c4025a6c115cd1949c1b20d0859a268a3c004672af5a55ebdb969
SHA512656ec14639759873798d1971a43712f2e53670b4aa6c1bb9611ae3b687b42cf2289523bd273577cb75e6e0ba94c7535428970af8890a6943378f9335de0c3bf6
-
Filesize
67KB
MD58d93f6eecc8776ed9b95515f572955e6
SHA14bbd9b3a68138eda9b053a647652696c76cc8285
SHA256b564d199b1cadcaff3a3ff6f9cbdf22f40f92399aaa0707297fea57ec13eb636
SHA51299211431e0bc2e0212117ec7acb72d51b79b143601451feccfead9178dce836a3061a6bf205dfe4dd4ffb0324342d1558fbbc0fa2314b6852227cc5d6b78ce51
-
Filesize
2KB
MD5e17c5b0c040fbcdc0ddd68e26a49b493
SHA1d9137e8bb855dbaa061e66852b47f4d4777fe68e
SHA25602d21c45d3b9dd520fa81376b43e5b494affe53f414942cdeeba10a8f59d266e
SHA5126f4621f98e93529d12c55f3294809d826cd7dd516634776fa3c8dc776e5c100d259ddff53eec01b743c4ca67782f30125a23d1c4fb979c45e7420124d8e50513
-
Filesize
12KB
MD5f413554dc2de618f1360e0815ad7005b
SHA1030911a3eb4ad77c8fa21bb316856beeb0daf313
SHA25671db282bccff5c4ea94da602e961a2101dcbed7f41e9ddd12cd00c30b0fffbfa
SHA51230a8b9befcc99f0f96ab01ed69d4ff97046fcea571d4c19fcc4558ecd6b431d9eeaaee360350cad53d023d14067e19f9b08f3cc06cc2f33aa39e480dfdf27c00
-
Filesize
63KB
MD582f7d09c62de1bfc223190f1aa76bfed
SHA1d59ca9458d926b7dc87da3c4cb7f5501ab9ce5c9
SHA2564ebbfa5d1145b4f507d83f216d1b53ec8252396cb767446746bf77f336beaf84
SHA512e2b458a4accc89743596a0a5b4f0b77d572002e1d62d716f31972d2b25685bb9023ef1660ad8638e4ad065bb8200a1e4aaeb4e25d799c663030f8af5c98a47df
-
Filesize
1KB
MD544869b4a13d969606274134d1213879f
SHA1a959b0a606da7a2b46af7960d7e1f57843c3b3d2
SHA256bbe314010e65830b529400e480d8b223358dff560826616510bc61b6ff70b224
SHA512cc62d049972e102f6fe7530a51fdb4c92c515154544afc48fc5e502270e8c737812337e46fa01b0bd1a5a5582043af703f6d8fc0ab96381e2f8b212a7b45858a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5590456bbb057a68b22caea13bb607afc
SHA14e31da47bfe1d27a04602ac5816e5d520fd39909
SHA25628867b114ecd0fbea993f788fdd9e3b2824617cf66377e84ad49e773baf8e406
SHA51296358b0c654c5f9d53f3e81cf357a4501ca4cf594f6671290ee9f070f0faa15018c38ead5d071e93c6496a28192c18ec2e67023b0943924789e5e2220a9fed14
-
Filesize
109KB
MD5f473df6ae555f7ced2ed79d2dc241f85
SHA187fad35d058c42295155879b084d555e42b6c6f9
SHA256d2cec5c598828f0ab21f595ebeb51059b9dd03e3ae81db2eba0cee97a8486dcd
SHA5120509f380500b4ec04f95c6eef8e20d449a2ded76ee823087e620992bc72cee96ffa913e38158916ae96aa1ebab7f9e142adff8ad704abcef94e18385be0fd1c0
-
Filesize
173KB
MD52b4d946fec26f5e10cd0dbd5095eb0b0
SHA1690b0a75e911063323fdcbed9c1689c9bfdaf236
SHA25649687a627b5f7581a7a5e09acf9cd238bf72a4b3ec1562104d4aa78c6dc5e35e
SHA512e000400b9d8c9233dff4f2fd3354e4e71b52452a718cb688b67af03c28e37b7cabbe8b09dba0d46e2e029bced95b3133be8917edc35b0ba20113deebfe851aa6
-
Filesize
4KB
MD52e2b23f2a5454568ccaeddd77743687e
SHA17abe9b3b132216e0c0072e32a244291a59791d72
SHA2562d67595cc3466fb74bcb463eace3c75c570eaa5008e0038b72b8e6e46f636818
SHA512b0e3f54388194c5134b68fa3568b168c29524a81c09d4bffbabf6800bbbbd9b8d67c34ac6671cd549876e415c43b98beefcf97849d7482854f076cf22e226870
-
Filesize
16B
MD547d0158f27663bcddc533a76b57a8ece
SHA114062d8a73e45af6cc87794949edf1ab9e745b1b
SHA25676a15bb76ab83df087d0f581e1585184e072b4aa1511da21690a4387d0463acb
SHA5120d8e4f4a6b4c6cadb8108c9f46a90d0d76b8096510a024177ff1900447e987cffa9a9fe2cdd9ab1e37f99d92d3128242101f01a3e89d7f71ca6b4bef33cf726a
-
Filesize
14KB
MD53b475cbc7522c0488bc727c4fd589005
SHA18620ea16da99746971fbc437f75558daf69739db
SHA256f418a2565e3267431f096bd7add3f8f07cb39d148e0a4cfebf2c3f9d01407565
SHA51253a62d54838c46a0f097e4e69da5b061b855d740b7149acb65e3c051c0c4e8565bafb71a6ddbc66a4a185754a3b98109148a050c389500000a773500e6918bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51051c0ac40b8d8a2377c084910f10435
SHA10640d4f33dee1750573acc2ef93bfe71818dc68c
SHA256c60b0bb1e142a6f2a4f19f1e11b9d262cca1a8972a398ec839d8e26855e3933c
SHA5128954f8d6c4117d9a0f5267c70e455453551e30850f2d2e4ba1d9bb8a1e88db17c180e3ba57f2c6192142ca226790d61a7569fa76a45234ef26b1f6a11cd1469d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f9aba1f97721f049625dd0f00d36a2
SHA16b0fad18b2956535ce28376d1498640ad8a1d8c3
SHA256f21859f3222e6c76adbfbd1bb3a7c4bc32ef291b5231bff0e2ea18b092df50cf
SHA512761b8c11279ad721e17b084f414a7bc95d6dbd8ed4eac48409347c707b7670bb6006d61624129721bdeddf624b52b4533d110d6fe229253ec514d6878aa30768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54786777611fc9f237e291693552c620a
SHA176f24060ccc3ed8eba912b3186871a2978cf93a9
SHA2569be4dad29dc59c0fd86e2643063f95fb06a17a3d7708c1aa96377f4da84c387e
SHA5121ef76dbc1d8f99138c60682853da51dbe3941093337ea9cdcb7728c948b0600dc97f6d7feafa6902f6de8d0a7948176316e65ebdd460598ecc4cabd20a6d29cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541003db47355cbc76723f839d633e6bf
SHA12ee4e1713a1e61a44b41ad39b0566d8e440ba9ea
SHA2568e49923e1aef5b906bdf49bff26ae35e3d0b91c54a15de0d0eca3fe9bfe2904e
SHA5123231d120768d109c0b1739228cdb1a6276d067f461abd9f53c073b898dd7ce4f3b8ed2bb379eeb2fdcb190799c4bcb379f86d0674f5253310e7ca0b7cc575aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609d4e5ed569cd01f8974576efc7427c
SHA1183fef8ac7258377404ead197923b9b4b9a64035
SHA2565680267ccded44214777fac85bcbbc0c72e4daa0e11ff028da1b6a434dfd64b8
SHA512d3f3dc40f65d816aca26720fe61abda775e791b4d38b2ea1fc020e97e4d9b231a13a0514c624a2c561639ce8d53a259b271e802b2a8833d84d42d5ba2cc5c3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53343d25810adc5d5bf80253c4c954be6
SHA1053a22c3f9e2537ba2604a7161606c9dff0163cb
SHA25689a9d85dd1d7383d54526309385e01a3a7e4965ed813ee973e43c51cc765b713
SHA512ee520495f95adcdecf5625c9b834828e4720b3083ed4648a2daaa8112fa2cd340f320c917a431aea1a89416f50a52087e36d30e543b3ac80cc62d7ac1cceab29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51802b48a997ba8004d3529afb50d69e7
SHA1072e392e429bdabb82915c62f2b3b3180101cadc
SHA256d2b5e5486f72ccd3f4ba5c116d863224a92c85b4accece14d83d5cd27f84c665
SHA512469ed038ea7cf7da27422d315688660cd4eee22845227aad403e0958431fbcb19bf26204450fac3213e5639e119578ad307d042512ad7cbf660afad202ba43a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53595858bea8ed85d4f89cedf447f4a2f
SHA1819c68545124fa0cd4768cc57a7ebc824c74d38d
SHA2566f539261c8c63947dcede0810bef0d35b9b57bede9fa04402c990d056e5a132b
SHA5120ab5d52f25a32bc4a2ca1a56ee6f53155634cd4a8d8a3db52caa3ff45b6940cdb5f045b4f0b0f81b73f66256817e3394fa854470b17dcbd9bf703d67f3c589f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559da4f36b1fd5d95601d36451591a0da
SHA18d2b126d7862978570dfd307fe9905270fb635db
SHA256fccfce1c646f843b4087d75a4269aa97438748012be4b1697a0346cf48d8525d
SHA5129f02ee41407be7a0f1a6cc87639de6909a4c89e2f7efaaf1667cdff05562d58917d5a8fbd55ff70c93d21428ca6077a809c5f0074c3b33406d20b4fa44263e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53401c08150ab171a4aba9d61154ca6c0
SHA1d47c729094a546b026a8a21038a20e66b349ea4f
SHA256e10ef3374770e92897133938cd97c3dd00993c9c2e9f6ca0322f2bfa64cb39f8
SHA51294f62cce77a6f1252d1c2887a692c766ee8be961078b3b897953bb9e871b85f79905f6db7216f37464caebbceb16bebdfcbb76e5ef6f6a344b9aefa2f52c98fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c694bc5db0655875f37579d6059fc6bd
SHA148d5a3af053849da6c0c2f24faed64a9559e2112
SHA256a89d413f723686e62db5ec7796d77a6d1382f53702ae2f26d3cd9b863ab6258f
SHA512cd1961618e688e1bc2bc23a5fc873bfe745ecc3dbf52e4100b8934c7a090dd9336fd5d9671d6e65f7e6cfb65f4930bcfccd1f3cfcf8440bb07cd33a679f92c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7541610ab8df73fc43c1b1f924de23
SHA1b8d3871bdef153400eeedf78f7145a4c214eadba
SHA256dddbdcabacd4822f1410bf3b682775135a66f00016d0244a63508aec59c5eab7
SHA512153c39706d84e8246ca159002deecde37b2f12b19357a7d7ab3e516c1201a64bc7eebe5f5d71ed7b708b3227b3ea7fa14bec6cf1fc6320899fdd6468616f2cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190f04055a873be640fede80c6c3b042
SHA142332a12758390ac148c2b24da1affb13b91acb3
SHA2568d4e38c3ad4719b6e68350c961db1aacddfe62797be8f70250b3ea73f6731980
SHA51253f3f28de787a90c2eaf443fa4c42cc8adc451213490be4d23fce73ab3181e7a4c039350da73f779bee1cd3df1933579da4bda5b0392252d88dadd1f3922e39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b88a94bbf9b5cc615eea05cee0765b
SHA117a1d41ca8115aa7e9f33094d25a861cc2d390f8
SHA2565673134c66bc5b41051bdce77ad64004114a4c664f5d96aa39d7cb3fe07923c8
SHA512e8b53c5e3a343ed5fb1408081e6a95c31863d35bc16555c73179df2744fb6b38003b78024c91096c419fe352175cfccbfeaa3ddca6916ef4532247bb8eaee762
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
349B
MD5ff97e670975227eb7180d3127795c8a6
SHA1f022e59e77bedcd4980e2f028f8ec9af22b683c8
SHA25688d7cba46ccd94557da19b2cad540bfba9a642ae00c75e5178797205ca3839ad
SHA512378ed614fe554e577a90b9c3b8f853d7390b9ff3673d59a446d2f2c377ab0d58c1e5b63e160a129ca8697189076e2b92d169f6274b51101b25961e8bc7cbbba2
-
Filesize
404B
MD52b5e3b8b9f06f7cf6a65e531a761bfea
SHA1907548a9821115631ce53b1ab81a834d016bae86
SHA2569e19e5bb3caee69f58ef4665a650963fe65f3c40926e0651348e4b6f97d37110
SHA512b239016c65cf0d08fce6e26bc75282ef7274419af38e5f3a7a147d9690558dc22e50d2d19379ae4c96e3c5af916fc2fb6a05b3f1096345e1027bc0423c866301
-
Filesize
72KB
MD5c752300c1fc342b351fc6a2f7d0983ff
SHA10c2aee8f87d64c6e33b08c7a8a1b9067e6105d97
SHA256e0cd14e8dbc426db7878669b017b632bc1e276af2c6536a84bb8ccfbf690c3fb
SHA512a0ea8e43810a7f759dd52dfca6b4a73fa3fb4d136e32917b2d992fdad26016056f9e945755ead3e028d12dbee677ac6c831d76de7b84a2176fd30c0634a909b9
-
Filesize
100KB
MD5a7d92f7680550009f5aa98f538db694a
SHA19c390f0e25955eb62d1d74c792cb063bf0dc1d11
SHA25603769cacc07e97206a7f669c36880c38eecfc26dac98ee45ed9c9c20866fe6c0
SHA5122a703ab882e7fd343328c2112e09384d0a175aebc78f20c3a3115989d7f7994035a4c0ab45ca9cdddcc6fcae9dca752034003b8584d4af3c6ba4293d83639bb3
-
Filesize
37KB
MD5e0cba97d6c9203b638fe94402106091b
SHA1ba331d35ea9a19e0f5d228c8a0b6152cdb4c5c6b
SHA256fb3004f3e89257c0e13b9fe4b641e5ffccac45aca0a09d0d96146cbbadb55b62
SHA5127c12ab9704b6a9887dc12f09c03505721f2ee26fed621ca8ddee27e366795d36f61a0b5b6204374d9a4e6faea3c7dc82a29abc1b9b8723c9549af4ab2d8cfd7e
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
16KB
MD537cf0f5c1448f048e2050af11ac38a53
SHA1ba036c55a45f4f3856132259699e94826a50e20a
SHA2565971052eae7e57456c4fc80829b3405531d248d12c4e85ac4ff2e7fec8621d4e
SHA512479f1438d9906ed24e59e7a8359d4a5227be10536a096063f00b766d834b234cb8c0abcf2da4c8b8cd181d76afc6ded3363dd1cbdfcda0d1fd639d832046dc1b
-
Filesize
1KB
MD5cfebfb72b21df10c8121b2996a0f66fa
SHA1ffa4c492e9f3dc5cd960b10cb3b9b4079b0e023a
SHA25621cbfc0d389e4fcb3550e2ff52e9b75347e46cba3d5be1c2f31ee8ff83229de9
SHA512f6f47f2230f7e4a275f4b7bb3d3dd01dadc722f63213054c91f9947dc84ab9a524e331d010cd7f5378be8692423aebff713016426315bbc58f54870c6d335b13
-
Filesize
1KB
MD5257b5c5ea60768d4f7ff63fc1e367afe
SHA169247768d5c1b982545cf6f6bdb860f049775624
SHA256e9239c319b09d5c015abcbafa0423572f7e22e8c29576882604944b7d70087c7
SHA5127b1b67d4f7f57dc4237522ac356d46cf6a1bfaf2a27c4d60ef0af07dc467c38f652950aa4bb25245e7336d98dac3cc515853ad7c1dbb5046a8d25b0b04e471b7
-
Filesize
11KB
MD5f208134246fc0e084bf3c221a7235b9e
SHA17bcd5a68be46d4be56b3b38ffe2edd449793d3f6
SHA256c5de40c6c14e7a9ac7d20ef48c08d2ff00af6fb886e9387113c68e1ebd98412c
SHA5126cae05792210f8222e3338e19b0f372e28582e7e3e7dfb3f5f543d4cf137462a09b7f343b4214e84a9eb532058bfea572a8ce1fe01a543834d33504ec01cc2b5
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe
Filesize143KB
MD54181762593fe73ba01f1797126a857ee
SHA1d7e2fd23ebbcd151a56de54ea8b47c47b419b07e
SHA25649e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e
SHA512b66a0fc4fe35c624b09ba17e79c64ac2ca603dae270ea1c70a13e59d865ed3f4e535f27ea40653a9fe12a20ff9e86a270994d597f7cdb4460547b224c820017d
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe
Filesize424KB
MD5b23fa070c30dc9f4d3dc84139cf2768a
SHA10844890fa88cab2d267441ef9f26c82a4a33680d
SHA2565f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a
SHA51274f69072650547f2c781d0c6f9518ce2abe1e7ed293bcff591b23338ad8bf4cc76bdaa61a961262cd5e80f34b898b240068f6da27b4b3ab954082fc3fa83953a
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe
Filesize195KB
MD5a4a68c88f7eb1dffc3f88b9c46d4d171
SHA1d66ed274796f19eceba82c12564064df8d2022ac
SHA256bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a
SHA5129f75dfd772a1f98dedcf158d127195653280fdc585027118d1e608cebb1e3f3571169ae54f3e24a907660fcefa140217ac10ec67eb5baa9d7e480136fd220a56
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe
Filesize747KB
MD558d64fa0cf5086dd9489b6709c09f3a7
SHA1dea524d765059e3c60cd48cbcf7075d48e3de0d3
SHA256a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4
SHA512d88cf3adf7585254fbc891e7f70b9b434ace56d80f781598e8fe2cb97d7ee8af108240c15d91bf7da5551664d21e306ee4ed162270ee4b1bdd5c8b75a859c387
-
C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe
Filesize388KB
MD5d3cfd1fc9af8933b5eb985d5a6a346dc
SHA1b4a09a551060f11eff9bcea71b87385ca0214b94
SHA256ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90
SHA5128701d2b43384cc604297285b1b4a0c119ee77b385ac11b9767c7264985534889589798b974fe9b6ee50a5fdf771d882f67b2e034f7a2f3ab06dee426a9a92a0b
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe
Filesize208KB
MD526fc9c23c0de0c785708a7d703590b97
SHA110629a0b09e9f87d3a6fd0a9faf4ee737b4354e4
SHA256143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1
SHA512c588d8b944e58b58ab9dd8194e25b6020b74b67fdfb2e4fd48fa66a1492028e1e775a7c8686b80eb834af32f6b6169e09af468b4a3e0df5a8f3494358ffc427c
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe
Filesize522KB
MD5287b5fbdfcf4066bd3384f609c7e4bdd
SHA1893b95bf219553d8c7f51c11597fde502489c6a8
SHA2565571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00
SHA512c82de6eabff9f598369a38803ff807f8df3cad40fd1985d6c195206a2db13c9de4467b36190639c66bc7a63e06a48fdfe0c62a7b62c945690cad25b9d2a9f7a6
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe
Filesize241KB
MD57ac2a5d95afbcde5ab21cc9bd89f9d74
SHA1a071c3d4a2b2de941ead97e4fa1e568a6ea4d72a
SHA256bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56
SHA512c43f14a8f0dfadc8b95f106336a22f3725cbe509c12a531fd1b799fd91c67bd25aa4879a1c54de2cd2347a1d4c5c2953272602eb5794b680ed0a519ce4f1bf73
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe
Filesize264KB
MD5c61ecba5cba4402b6ec3f18f72ea65a3
SHA1c2a4150a4d750f803aa252b41d8b3b5cb57d71f8
SHA256b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a
SHA51237426c1baafc6e0adccc0205c69e6e998ca711488fe4a008ed7ff27f6b2c7614ef56aa844f4dc9c2eec1f85686a59e56b63e2e22c7b7de2897985130498587b1
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe
Filesize376KB
MD5ebbf795385d1409700a7be2a675e544e
SHA1ad07a0dc336416b6bf54d6eac5dbb755c9292bb7
SHA2569cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3
SHA512c209e5a8cb46fbf201a1891c2b4be9da8d62c5c01450bd658e48fdee675f170a5d56e2adf04737d0ffbe48b68aecedca46ac707378759ea9a05155bb1f3ed293
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe
Filesize372KB
MD5d67539c887392bb78afae787b47a630b
SHA1563d75637eb539b72c2f1c23b588de4cb6ecdec5
SHA25699ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65
SHA5127a1c7d1b0c6e860a13e89e24c1cb0e7188d8198a3a283abfa75d8ea56ebd35c48c8f48016734a620d2693d7e805c283d8fd0fcc490914410a40a56550883ac37
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe
Filesize328KB
MD52b1a58eeb647b9d221ea9bbe1e4fda35
SHA1dddd52a8c7301b5fa2798295bf8e5856229f484b
SHA2563eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710
SHA51248c663c46167b171e3d5602c0eed03ed8b5e2eda9ad08dc80aee76ecf6920e4358097c8a9fd9272a8a26243175e5305b8715990f5b425005a21574a1b3e535a8
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe
Filesize384KB
MD5429264c5f625ea249e52b610a9467793
SHA16683b48092231b1d4f478370f39086ae636a8814
SHA256e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e
SHA5121ceb4de0745172c3305e4319e9b93469dc320b379b7a270be5d67cbe24b0fb0460cbc602ae7c9bb10e377cd5b70f6fec9b1f5be38a2afecdfcd2517e89d22048
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe
Filesize392KB
MD5709eb5a8a6d092006ddfa23f2fa3ed0f
SHA12a7223a10d7e2cc1b5ab5c48d9f8f07c39201e98
SHA25653e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d
SHA512bc2ad43b1fd32f5c53d7922831d0ee01ef7dd0e311004b5d969986072cef4ac7a22de31944931cf9acba9082e8a6aa319138dcc32fd5ade83aa64cbdc3806e4c
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe
Filesize312KB
MD5d3c937349d6bb222656fe59f76c3c294
SHA17bedc3ed455eb124fc917058faf65c0afe0f3a8f
SHA25662b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31
SHA512348bca6f5f759ef03ec5282ac301ff5c98fe8521f56ec02a12e71f1824ea88b72f8d2702863ef4e921e65e01523ce6b83bd92cd5fa4f00d4a25d3d6e2fb2da5f
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
Filesize335KB
MD53e63efdd493c52fdfff9b66d1a161197
SHA1f1012aac50a8c491e51a023676d727aedf3fcc63
SHA256198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a
SHA51249de421d97567b1df8479f5b8af5e4532fc83fdb95a8213bb4035e5f62e8ef4b2f38fe8951929c3a493f408edb944b3093b6207aab8fd3e6028fc8b5d48109d2
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe
Filesize3.7MB
MD503865a046bf763f51a0dd20c51890e1a
SHA1d455872c8c44d06ac85cadeb35a990568234d454
SHA256519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8
SHA512207cec6eb7c270769f28af8541178958eadb1db204db55f0b2db1964072c588f95aa89070efcb6e64d52250ecdb4e2c1a9d21479bc78f6147f1ffb46f54422bb
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe
Filesize420KB
MD56bb276429a782f996e45f96c168348a8
SHA1dc479d4c7b4b2e6294922d0b40e4c4481ba90e70
SHA256c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14
SHA5120bbcfa9a56c9bf000fe696528964f0877d54d8c4f0b621a9bef846b120e928835ca798f80ae477973a00e98a49681286b5cb79090747c4f07cdd1bd74df83671
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe
Filesize332KB
MD597abbe42307b444c73464f3ac41bcc6c
SHA1df5c8700c7ffb53433b827498bbd60809fed3eeb
SHA25672f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b
SHA512ea4e191db5a9a294e72209b786f2dc990bc27727d0b387e9bd77b17f3ddaf51dabe6156bcd4a81673dd333e2c02f1e4ed9d15a3cddf60b432346742cee865007
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe
Filesize991KB
MD58e1fadcca5fff8618117a45c7da13f00
SHA11f248de3f5069359c7d6b867c7815a8b633ad92f
SHA2560ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f
SHA512d480b237012c0c82e34eefa0981cc323cb21fd5f27f09b10e7f2c3335cdde1fe5486e56fb5288837336fa3955288b68d883d47ee6c7fd0fb257f347840ca8a73
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe
Filesize86KB
MD50e51b207fc8f2c210e72bf21c6bc6350
SHA1d65969519a1087137f2daf288cae7a2e89ac9672
SHA256826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4
SHA512cce1743b7152daceee6ec3ea1d299409f7f5ddc2a279e2d50c26cc484d0f323e7e3fc058c51a01962634f59f43fbf5ee648bdfc1217038498431bd5a88f964b6
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe
Filesize362KB
MD55437b8e84aaca341e8d714446fc1c09f
SHA1a2d33c337991bdebc3e5fa5fc34c5d553eeee66b
SHA25627f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c
SHA5122db6d1be9257214f10f88aabddc7018791ed60b9ec8de0e65847e788b4e089182dda0140df161d0a5a9e7f1d5cc1ae8c45b8785fae93c27c54747805f33ed15c
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe
Filesize244KB
MD5161a4508eee2eab03646d68be1af6d16
SHA13f16484f16825e4624cefc684ae43aa839df1386
SHA256a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0
SHA51224bd54fa35108192c89e5d8da6e056efe74855bc947c4c03f009b633b2aa5913e240dd877823edc3ea6dd25443983ddee2a45e89bedf14c19ea6eb03c654243a
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe
Filesize106KB
MD5ca4aaf7cae73660f5f4c0a2a28ae63c1
SHA18329070f41385206a9de83696e58319827b55354
SHA25631f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99
SHA512ca8d886e6118abf5a4fc9262e996e7a14f860a10756789f466ae329b85874a3fb1d4404864988de9288134d5b36e7dce0a314f6360dc7099c09d3bbf0930115d
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe
Filesize1.3MB
MD5303b872b3641da6c94691ae975a23dcb
SHA14367bff498eac3b59c41a4d2b7758ce982a30929
SHA256dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b
SHA51220a229ae6aa7fe76b84d80ff1b5838763e87428a17baa35d2723901f6cdea4661eb3e81f6c5059566404d0ae3626183e7f50feb0d6529cbeb855dcc9f8fa1f4b
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe
Filesize1.1MB
MD5b68fb9b3f4116a7ba60dfb527bb06257
SHA1a438960a29837666fc17ac61562f48c9f4f88e46
SHA25665a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9
SHA5128e1a5663152cdda02f06242f4886cabc93f1c06600aba0cc253f112ade3642ef1d71527c7ede803dfc73c061c3b766b1757f824e2f6f02cbd837935e083e8111
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe
Filesize1.0MB
MD590dc3ddf8523183575a8eaf360c5d2f7
SHA1e060d621f3b504e945b9e90273fd72b5020b8c95
SHA2567f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1
SHA512eac812a31bb7a57014c6f060ca726acf59d16f55a93b5688ae150e43dfaa90f3fa3822ac2c437a58cc5507019f4f1c8d9768901b751ee0d33a70ceb429e01e19
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe
Filesize237KB
MD5ade5230f3603e241bced571994d86bd9
SHA14802fddb06a2d638b30496090113af1e77ba1b68
SHA256fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6
SHA5120be711cdd46e7a7c7d28f8fb0fc36f857c7cb7563ebd6aa7954dea78905eddcab533068247ab955169cfca4db2f27295e88b00b94cb077fe8a7cdbc5b2a7bc0b
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe
Filesize279KB
MD5f9f4bc9f569d56fdd4afd5e0253eb9ac
SHA115214ee8d1fd2f059b890129b1a269a37c329f86
SHA256fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764
SHA512942731790abb7dbaef318f558c1008b7211a2a14763ee5bb11e67e608a152e53b1c8671910ffb9dcbafe6e11ce2d81243bd5c7e8163a0e7b94e0338d2700a00e
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe
Filesize315KB
MD51c1448221033ab44b6c6261b6c759503
SHA1274aed40b021517203e87cc3fb3375976ad69f6e
SHA2561a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e
SHA512bc0447e09b8ce9255e61b019cf8695e7924975f2394e3888beb9eae5a642d93d451d7a44f459978a450986711c7c99c2e2fd3dfe119aae836b1c99d56dc679ce
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe
Filesize499KB
MD5ba5c25351216e2f8d24fc19f97e91be1
SHA10a35383d6e710e9da6cad5a95a413717889c05d4
SHA2561ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9
SHA512ea2ce3f19ea54683612b760a329f9597f12b47a9df41e7c7f717d4a7e37f213d0b4c69ce77715febac767f4e500b11981f1f3caad238c4bc25d68b055206e571
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe
Filesize349KB
MD57d4e4167d6abb1c94db15b285d694e30
SHA1cc3eb73c21d312af0cdef7988c72a823a0e0414a
SHA25626e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d
SHA5121fa938810a920ad5d7d133c8044a4f270f9b077c942420a27f120b0a73677bddab6aff0dadc9c21b4833e756a22d21641becde4a13585fd4328bc176bc68c92a
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe
Filesize540KB
MD54d6dc840b34955406f9fefaf1d6c9556
SHA1820c733896ab5de12c57e6680e2273a39707da0a
SHA2564faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810
SHA512490bc25133802c9edaa8a64dbe133c08e2c7f1a5992271a81978c68bc8dab6b5325d1b5a44f40813c351d87715e2284f654b26a47d4aacae7d6697c7422c58fe
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe
Filesize257KB
MD5cf6cc71d26bbc1ee9a8e006cd18fbf90
SHA12e2c4cf464015fef5eb1b9c14df33913a53c33b7
SHA2564c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b
SHA5124be97b34338704fd3ac3d378470de01aff0c83dd1475d5ff5510e93fc3f3f21f58a57fe6bbc369b617bfa11eec2f46938ad34110eccd87770c3f7f19d11686f4
-
C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe
Filesize343KB
MD5ac9d094d059849e0e8d5e23b05afc5af
SHA1127c9941509965e3d0507240317c1deb6b67c860
SHA256d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97
SHA512643ca360abee60c27b375305e1be3daa19f7476f5e8546e1815b01622babc27066242652885d2b563e86df2d6afaf756d4e1f3b9abb087cbe0f7686ffee7d55e
-
C:\Users\Admin\Desktop\00295\UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe
Filesize1.2MB
MD54de9e5fa123ac62437c6fd03cf8df91f
SHA1628f26c712d08f5818a9103200af617e867916f0
SHA25644f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947
SHA512489989fb01e012d8b3dfa4659986b720a132fea66217b33688c26cc240cfdec31d28ef36e217317cb6290f4ca3515ce32a342303991dbc2651e81d0409844c8d
-
Filesize
64KB
MD5ada21ae46fd26ae1d1cd61df7ef1d464
SHA1d1599e817d9b5016cf3c2563d72294e6bbd85d42
SHA256f85b94d90aa2ac4464408c862b49f560f2d6743597641072c8a4030d3495d1b7
SHA5123ece2e9c4db6d16f83c88c65f13010d064f3edb27b2b0b1ee70d6a60fce497166a21c22a23ab04e1fbe110de7e64e5845fced557b63df82656d336f15148c5e4
-
Filesize
64KB
MD5df2ac7d2e3ca80684f08e2d212322c7d
SHA15c2f0e22c760abbf7af36c1490333dbf95b40dba
SHA256f5b42b2e2697786c3a8484f3b544a0d38af24821f022f5d5436a6eb6b2291599
SHA5120f330932548477b93076314ba4d420150f46b8b65ab4e8ee477c56b8067e08819acd74ae9d6e7b315127a27e634e36485f4e232fb6c8943a7b547f06abfda94d
-
Filesize
1KB
MD55ef52a88f0e1745a869dc9acf9e0ed5f
SHA1190dd91a8da5d06e327a88f9a18f46badf504e77
SHA256b44169908a360e6be4c4bfdac3eddd2ee54a0ab1fddddcc3ddcb601a68cc3d3f
SHA5123c71010f03c5923d0ad80def256f413125ee5a5a5f127d99cfcc8ff82db12001e0eca8faadf1333a753bcf8be68b2d0d63cbbc0063d730bb78c0162bc33c17fd
-
Filesize
4KB
MD57d17132e47d2d7ec5712897825021db2
SHA100a597f2266127f700a068a5b4d6c8afa81c12ef
SHA256e4d33ca513ad2dd086b9a6f882562f974dd2b0c2f9ee27091a151a7c18e6e4a0
SHA512a415d4de5ed92261d66492618a3b76e0c96fe36eb28eda945693782c96516064e303274fbddd10047d79818f54ec2e500fd582eb90cd733c39a94a8fcd7b2a15
-
Filesize
76KB
MD599236a4960fae5b3a0acd42dce579bd8
SHA1cf17e03aed53beaea9fe4e0db230f09a7f77e0c5
SHA256c2c78b0178bf33353676b2251bf6702d6a7036048ee2d6277d51875cd6ad8c73
SHA512b541587d718e1b40a732e445feeb2d49d5e820cfb5ebfde07985d4c4d2101ffb3b9211c16d6a1560f25d4f4b8e54ea9ac58c7d0198bf4af2b24d425e3f5cf41e
-
Filesize
1KB
MD5e2502d7a928a03e013c44a654fa5c7a4
SHA1dabe54669dc333a5d03b044499a75cbcb7ec9170
SHA2563dec4ad6fdb0943b0d2fb7365201614c6c0ec26ecdd8e7be332b86c4ff00b47a
SHA51277d3db3a2966e94057d8632f6b37f8f7df252a8dde6927f86399bb07004dd328cca77cf90a49062e1eba08d35cb520d5b909b7c541d08e25c5ef0c7289be6038
-
Filesize
83B
MD5efdb1df7eb34204c698a32cdb410e616
SHA197c783748b07d694b5e7ad6b508d5a13123951ec
SHA25630ff188f8af83ddf2860b6a282cc884a67746a172faa1943ebaed0f42564b5c3
SHA5129b6497efdd766dfbbc42e319d87f387f7dd5c8e7889a3fe25c60d290e41696c1a2357d6ef029a43d971e697aebff2506c328beeac29653989e368f1479c36248