Analysis
-
max time kernel
253s -
max time network
256s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00293.7z
Resource
win7-20240903-en
General
-
Target
RNSM00293.7z
-
Size
6.0MB
-
MD5
7f2848772a398030c54e1c38f33e55b1
-
SHA1
f152362c1c62144106f62b26baaacde7b893d99a
-
SHA256
950e37343e3deb0b86b27ff5e0aac2690afe3fcf6cf1405d7660a9398b195222
-
SHA512
5bcaa1e9ae707203e42300a393339ca00b1c87af3e77d4b1d9a4174c7132500d50e15ea228093d5ecea878f6c540a4fab17fa4469e9f8c92226e0c100dea562c
-
SSDEEP
98304:Y1SMscnIGxA06I6+hk7UtlZhJMOCv0zqUSSPBLUOrovx70WrKKMixdclkKlOQd1:YjsPGxj6mlTJnhGyUOrAB0KMixdnad1
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+uky.txt
http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E
http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E
https://t7r67vsrpjcm5dfc.onion.to/2743F4EE3A36CA3E
https://t7r67vsrpjcm5dfc.tor2web.org/2743F4EE3A36CA3E
https://t7r67vsrpjcm5dfc.onion.cab/2743F4EE3A36CA3E
http://t7r67vsrpjcm5dfc.onion/2743F4EE3A36CA3E
Extracted
njrat
0.7d
HacKed
abdelkawii.zapto.org:5555
f497dfd998155558ed591c65cb1136d5
-
reg_key
f497dfd998155558ed591c65cb1136d5
-
splitter
|'|'|
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+wpvuf.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/FD8BDF412DD53D77
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/FD8BDF412DD53D77
http://5rport45vcdef345adfkksawe.bematvocal.at/FD8BDF412DD53D77
http://fwgrhsao3aoml7ej.onion/FD8BDF412DD53D77
http://fwgrhsao3aoml7ej.ONION/FD8BDF412DD53D77
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cvhwj.txt
http://t54ndnku456ngkwsudqer.wallymac.com/BBFFDAB5759CF8DF
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/BBFFDAB5759CF8DF
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/BBFFDAB5759CF8DF
http://xlowfznrg4wf7dli.onion/BBFFDAB5759CF8DF
http://xlowfznrg4wf7dli.ONION/BBFFDAB5759CF8DF
Extracted
C:\Users\Public\Videos\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.xo59ok.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.zx34jk.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.rt4e34.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.as13fd.win/477C-90BF-775B-0291-25B3
http://cerberhhyed5frqa.onion/477C-90BF-775B-0291-25B3
Extracted
C:\Users\Public\Favorites\# DECRYPT MY FILES #.html
Signatures
-
Cerber 9 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc Process Mutant opened shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe Mutant opened shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} fsutil.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} fsutil.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} fsutil.exe Mutant created shell.{09E9B32D-A1F9-EE12-5345-0AA66691BEA7} fsutil.exe -
Cerber family
-
Gozi family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Njrat family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2552 mshta.exe 80 -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Contacts a large (17698) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions regsvr32.exe -
Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys regsvr32.exe -
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2980-157-0x0000000001DD0000-0x0000000001E92000-memory.dmp modiloader_stage2 behavioral1/memory/2980-156-0x0000000000400000-0x0000000000436000-memory.dmp modiloader_stage2 behavioral1/memory/2980-154-0x0000000000400000-0x0000000000436000-memory.dmp modiloader_stage2 behavioral1/memory/3952-19186-0x0000000140000000-0x00000001405E8000-memory.dmp modiloader_stage2 -
Modifies boot configuration data using bcdedit 1 TTPs 8 IoCs
pid Process 200 bcdedit.exe 1596 bcdedit.exe 1068 bcdedit.exe 2096 bcdedit.exe 896 bcdedit.exe 2864 bcdedit.exe 2020 bcdedit.exe 2892 bcdedit.exe -
Renames multiple (406) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\NAPSTAT.EXE\"" Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" fsutil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "mshta javascript:FwmhQ5Awq=\"hCpBJYdqB6\";jR1=new%20ActiveXObject(\"WScript.Shell\");iT8HrHfT=\"sSg8bo\";UFJJ8=jR1.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\b42158a3c4\\\\8f0d257e\");IHh8p7YNja=\"Dvk7DOff\";eval(UFJJ8);K7DQcZ4v=\"tJOP4\";" regsvr32.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 2218 2708 mshta.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools regsvr32.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2648 netsh.exe 2556 netsh.exe 1488 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Drops startup file 24 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+uky.txt utgneacroic.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f497dfd998155558ed591c65cb1136d5.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+cvhwj.html cycegapxoetm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+wpvuf.html dhsbynyrrvyt.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fsutil.lnk Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+uky.html utgneacroic.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f497dfd998155558ed591c65cb1136d5.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+wpvuf.txt dhsbynyrrvyt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fsutil.lnk fsutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\NAPSTAT.lnk Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_recover+uky.txt utgneacroic.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_recover+uky.html utgneacroic.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+cvhwj.html cycegapxoetm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+wpvuf.txt dhsbynyrrvyt.exe -
Executes dropped EXE 58 IoCs
pid Process 676 HEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exe 1276 HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 2028 Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe 1988 Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe 1484 HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe 2688 Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe 1060 Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe 1312 Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe 2088 Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe 2764 Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe 2068 Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe 3000 Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe 2916 Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe 816 Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe 1324 Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe 1432 Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe 1336 Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe 1296 Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe 1812 Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe 2684 UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe 1896 Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe 2084 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1772 Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe 2072 Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe 1140 xuohe.exe 1748 xuohe.exe 2980 Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe 916 Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe 1016 ddacabfcdbib.exe 1268 Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe 1612 Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe 2156 Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe 3020 Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe 356 NAPSTAT.EXE 2676 utgneacroic.exe 2620 Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe 2896 fsutil.exe 220 svchost.exe 468 fsutil.exe 1780 fsutil.exe 1608 fsutil.exe 2024 Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe 912 fsutil.exe 2236 Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe 2888 cycegapxoetm.exe 1292 fsutil.exe 2196 fsutil.exe 2332 fsutil.exe 1792 fsutil.exe 2724 fsutil.exe 2016 fsutil.exe 1700 fsutil.exe 2152 cycegapxoetm.exe 2256 fsutil.exe 4052 fsutil.exe 3116 fsutil.exe 3156 fsutil.exe -
Loads dropped DLL 34 IoCs
pid Process 2084 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 2084 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 3028 taskmgr.exe 2684 UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe 1336 Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe 2684 UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe 2684 UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe 2072 Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe 1324 Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe 1324 Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe 1988 Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe 2620 Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe 2620 Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 468 fsutil.exe 1356 cmd.exe 1608 fsutil.exe 2752 cmd.exe 2288 cmd.exe 1484 HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe 2196 fsutil.exe 1820 cmd.exe 2380 cmd.exe 2016 fsutil.exe 2820 taskmgr.exe 1004 cmd.exe 3984 cmd.exe 3952 taskmgr.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\avicbrkr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Acprtdll\\avrtprxy.exe" Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f497dfd998155558ed591c65cb1136d5 = "\"C:\\Windows\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiwabhv = "C:\\Windows\\SYSTEM32\\CMD.EXE /C START C:\\Windows\\cycegapxoetm.exe" cycegapxoetm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\f497dfd998155558ed591c65cb1136d5 = "\"C:\\Windows\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\NAPSTAT = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\NAPSTAT.EXE\"" Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\fsutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\fsutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\fsutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" fsutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\fsutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" fsutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\{FE49DF12-1E31-FB3A-295A-A3AF3A165B44} = "C:\\Users\\Admin\\AppData\\Roaming\\Bibo\\xuohe.exe" taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\santa_svc = "C:\\Users\\Admin\\AppData\\Roaming\\utgneacroic.exe" utgneacroic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "mshta javascript:GzC9gOkc7d=\"R\";Gb79=new%20ActiveXObject(\"WScript.Shell\");UBZ2h2ClaI=\"NphO\";xnqN52=Gb79.RegRead(\"HKCU\\\\software\\\\b42158a3c4\\\\8f0d257e\");eX7EmKq=\"Bu9E11WcE\";eval(xnqN52);d6ZF0JjY=\"OZjK\";" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\NAPSTAT = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\NAPSTAT.EXE\"" Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\uxvkevbukowl = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\dhsbynyrrvyt.exe\"" dhsbynyrrvyt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mshta javascript:C5qamlxjq=\"hY1xi\";m9U8=new%20ActiveXObject(\"WScript.Shell\");SHjF6Ntl=\"bR\";jaB4K=m9U8.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\b42158a3c4\\\\8f0d257e\");o3yKTiIVr8=\"0\";eval(jaB4K);sBmZBv0V5z=\"8RrkxgfU7\";" regsvr32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fsutil.exe -
pid Process 316 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 myexternalip.com 1123 ipinfo.io 2222 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regsvr32.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp848B.bmp" HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp344A.bmp" fsutil.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1124 taskhost.exe 1124 taskhost.exe 1124 taskhost.exe 1124 taskhost.exe 1176 Dwm.exe 1176 Dwm.exe 1176 Dwm.exe 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1748 xuohe.exe 1748 xuohe.exe 1748 xuohe.exe 1748 xuohe.exe 1748 xuohe.exe 856 conhost.exe 856 conhost.exe 1928 conhost.exe 856 conhost.exe 1928 conhost.exe 856 conhost.exe 1928 conhost.exe 1928 conhost.exe 288 conhost.exe 288 conhost.exe 3008 conhost.exe 288 conhost.exe 3008 conhost.exe 288 conhost.exe 3008 conhost.exe 3008 conhost.exe 1648 DllHost.exe 1648 DllHost.exe 1648 DllHost.exe 1648 DllHost.exe 784 vssadmin.exe 784 vssadmin.exe 784 vssadmin.exe 784 vssadmin.exe 2812 mshta.exe 2812 mshta.exe 2812 mshta.exe 2812 mshta.exe 1892 DllHost.exe 1892 DllHost.exe 1892 DllHost.exe 1892 DllHost.exe 1908 conhost.exe 1908 conhost.exe 1908 conhost.exe 1908 conhost.exe 2280 conhost.exe 2280 conhost.exe 2280 conhost.exe 2280 conhost.exe 712 conhost.exe 712 conhost.exe 712 conhost.exe 712 conhost.exe 220 svchost.exe 220 svchost.exe 220 svchost.exe 220 svchost.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 1172 set thread context of 2084 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 61 PID 1140 set thread context of 1748 1140 xuohe.exe 64 PID 816 set thread context of 2980 816 Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe 65 PID 2068 set thread context of 916 2068 Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe 66 PID 2688 set thread context of 1268 2688 Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe 75 PID 1336 set thread context of 1612 1336 Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe 76 PID 2072 set thread context of 2156 2072 Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe 83 PID 2088 set thread context of 2024 2088 Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe 133 PID 1060 set thread context of 2236 1060 Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe 142 PID 2560 set thread context of 1892 2560 dhsbynyrrvyt.exe 185 PID 2888 set thread context of 2152 2888 cycegapxoetm.exe 189 -
resource yara_rule behavioral1/memory/2688-319-0x0000000000400000-0x000000000056D000-memory.dmp upx behavioral1/memory/1268-329-0x0000000000400000-0x0000000000531000-memory.dmp upx behavioral1/memory/2688-111-0x0000000000400000-0x000000000056D000-memory.dmp upx behavioral1/files/0x0009000000016d46-76.dat upx behavioral1/memory/3020-420-0x0000000000400000-0x00000000005D4000-memory.dmp upx behavioral1/memory/1268-1124-0x0000000000400000-0x0000000000531000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\cpu.js cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\settings.js dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\Recovery+wpvuf.txt dhsbynyrrvyt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\how_recover+uky.txt utgneacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-backglow.png utgneacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-full.png cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\how_recover+uky.html utgneacroic.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_ReCoVeRy_+cvhwj.html cycegapxoetm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG_PAL.wmv dhsbynyrrvyt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_SelectionSubpicture.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Recovery+wpvuf.txt dhsbynyrrvyt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\how_recover+uky.txt utgneacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\picturePuzzle.css utgneacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_ReCoVeRy_+cvhwj.html cycegapxoetm.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\VideoLAN\VLC\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\how_recover+uky.txt utgneacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_buttongraphic.png utgneacroic.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitevignette1047.png utgneacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\settings.css dhsbynyrrvyt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_ReCoVeRy_+cvhwj.html cycegapxoetm.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext-hot.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\Recovery+wpvuf.txt dhsbynyrrvyt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_notes.wmv cycegapxoetm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\glass.png utgneacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter_partly-cloudy.png utgneacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png cycegapxoetm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png cycegapxoetm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_selectionsubpicture.png cycegapxoetm.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\Recovery+wpvuf.txt dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_ReCoVeRy_+cvhwj.png cycegapxoetm.exe File opened for modification C:\Program Files\Reference Assemblies\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\Recovery+wpvuf.html dhsbynyrrvyt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\how_recover+uky.html utgneacroic.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_ReCoVeRy_+cvhwj.txt cycegapxoetm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_play.png utgneacroic.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Recovery+wpvuf.png dhsbynyrrvyt.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_ReCoVeRy_+cvhwj.html cycegapxoetm.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File created C:\Windows\svchost.exe HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File created C:\Windows\cycegapxoetm.exe Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification C:\Windows\cycegapxoetm.exe Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\ HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2252 1016 WerFault.exe 67 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cycegapxoetm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddacabfcdbib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhsbynyrrvyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cycegapxoetm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4828 cmd.exe 4496 PING.EXE 2340 cmd.exe 2532 cmd.exe 2428 cmd.exe 2972 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000500000001957c-102.dat nsis_installer_1 behavioral1/files/0x000500000001957c-102.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 732 vssadmin.exe 1284 vssadmin.exe 784 vssadmin.exe 2372 vssadmin.exe 1872 vssadmin.exe 200 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2052 taskkill.exe 5040 taskkill.exe -
Modifies Control Panel 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\NAPSTAT.EXE\"" Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop fsutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\fsutil.exe\"" fsutil.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = c08fccfb1739db01 iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://ytrest84y5i456hghadefdsd.pontogrot.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 00e7aa0d1839db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url6 = "https://twitter.com/" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 20d509ec1739db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "https://www.facebook.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{056243E1-A50B-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{252CC101-A50B-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "https://www.facebook.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url5 = "https://login.live.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url7 = "https://twitter.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url7 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url4 = "https://login.aliexpress.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d28651d35c9ac810ed35d6a726f439e57b6a49427bfdd57dd50b6f85b0c660e8000000000e8000000002000020000000777e5be9880700b247f02b4fb2d5cc6822843d47bc07b881174ae780d09ba30a20000000084af3808d16e9d7c9488e6acebbd41b87489c0137991f45a0d9ae019f85173740000000f250d8b9d234b58dd203dfe1287f47e8ff5334f42988814118e944f8d14c8b2cb4704e40ba6b7d285fd85df14053adaa4b5228829ee374303fbe8149587093d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "https://login.aliexpress.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Modifies registry class 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 200000001a00eebbfe230000100090e24d373f126545916439c4925e467b00000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 4c003100000000007159fd8c1000303032393300380008000400efbe7159e68c7159fd8c2a0000005266010000000900000000000000000000000000000030003000320039003300000014000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 utgneacroic.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 utgneacroic.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 3048 NOTEPAD.EXE 1928 NOTEPAD.EXE 2720 NOTEPAD.EXE 3968 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4496 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 22 IoCs
pid Process 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1484 HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe 2028 Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe 2688 Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe 1988 Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe 2088 Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe 1060 Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe 2068 Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe 1312 Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe 3000 Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe 2764 Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe 2916 Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe 1432 Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe 816 Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe 1336 Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe 1324 Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe 1896 Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe 1296 Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe 1772 Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe 1812 Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe 2072 Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe 2684 UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 1172 HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe 2764 Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe 2764 Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe 3028 taskmgr.exe 3028 taskmgr.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe 1140 xuohe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1224 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1336 Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe 2072 Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe 316 powershell.exe 316 powershell.exe 316 powershell.exe 2484 regsvr32.exe 2484 regsvr32.exe 2484 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2676 utgneacroic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2380 7zFM.exe Token: 35 2380 7zFM.exe Token: SeSecurityPrivilege 2380 7zFM.exe Token: SeDebugPrivilege 3028 taskmgr.exe Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeDebugPrivilege 1324 Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe Token: SeIncreaseQuotaPrivilege 2656 wmic.exe Token: SeSecurityPrivilege 2656 wmic.exe Token: SeTakeOwnershipPrivilege 2656 wmic.exe Token: SeLoadDriverPrivilege 2656 wmic.exe Token: SeSystemProfilePrivilege 2656 wmic.exe Token: SeSystemtimePrivilege 2656 wmic.exe Token: SeProfSingleProcessPrivilege 2656 wmic.exe Token: SeIncBasePriorityPrivilege 2656 wmic.exe Token: SeCreatePagefilePrivilege 2656 wmic.exe Token: SeBackupPrivilege 2656 wmic.exe Token: SeRestorePrivilege 2656 wmic.exe Token: SeShutdownPrivilege 2656 wmic.exe Token: SeDebugPrivilege 2656 wmic.exe Token: SeSystemEnvironmentPrivilege 2656 wmic.exe Token: SeRemoteShutdownPrivilege 2656 wmic.exe Token: SeUndockPrivilege 2656 wmic.exe Token: SeManageVolumePrivilege 2656 wmic.exe Token: 33 2656 wmic.exe Token: 34 2656 wmic.exe Token: 35 2656 wmic.exe Token: SeDebugPrivilege 1988 Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe Token: SeIncreaseQuotaPrivilege 2656 wmic.exe Token: SeSecurityPrivilege 2656 wmic.exe Token: SeTakeOwnershipPrivilege 2656 wmic.exe Token: SeLoadDriverPrivilege 2656 wmic.exe Token: SeSystemProfilePrivilege 2656 wmic.exe Token: SeSystemtimePrivilege 2656 wmic.exe Token: SeProfSingleProcessPrivilege 2656 wmic.exe Token: SeIncBasePriorityPrivilege 2656 wmic.exe Token: SeCreatePagefilePrivilege 2656 wmic.exe Token: SeBackupPrivilege 2656 wmic.exe Token: SeRestorePrivilege 2656 wmic.exe Token: SeShutdownPrivilege 2656 wmic.exe Token: SeDebugPrivilege 2656 wmic.exe Token: SeSystemEnvironmentPrivilege 2656 wmic.exe Token: SeRemoteShutdownPrivilege 2656 wmic.exe Token: SeUndockPrivilege 2656 wmic.exe Token: SeManageVolumePrivilege 2656 wmic.exe Token: 33 2656 wmic.exe Token: 34 2656 wmic.exe Token: 35 2656 wmic.exe Token: SeDebugPrivilege 356 NAPSTAT.EXE Token: SeBackupPrivilege 2988 vssvc.exe Token: SeRestorePrivilege 2988 vssvc.exe Token: SeAuditPrivilege 2988 vssvc.exe Token: SeDebugPrivilege 2676 utgneacroic.exe Token: SeIncreaseQuotaPrivilege 2120 wmic.exe Token: SeSecurityPrivilege 2120 wmic.exe Token: SeTakeOwnershipPrivilege 2120 wmic.exe Token: SeLoadDriverPrivilege 2120 wmic.exe Token: SeSystemProfilePrivilege 2120 wmic.exe Token: SeSystemtimePrivilege 2120 wmic.exe Token: SeProfSingleProcessPrivilege 2120 wmic.exe Token: SeIncBasePriorityPrivilege 2120 wmic.exe Token: SeCreatePagefilePrivilege 2120 wmic.exe Token: SeBackupPrivilege 2120 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2380 7zFM.exe 2380 7zFM.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 2828 iexplore.exe 2704 DllHost.exe 2704 DllHost.exe 2704 DllHost.exe 2720 NOTEPAD.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 3028 taskmgr.exe 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2688 Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe 2088 Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe 816 Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe 1432 Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe 1896 Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe 3008 conhost.exe 2896 fsutil.exe 1780 fsutil.exe 712 conhost.exe 2560 dhsbynyrrvyt.exe 912 fsutil.exe 1292 fsutil.exe 2828 iexplore.exe 2828 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 1792 fsutil.exe 2724 fsutil.exe 1224 Explorer.EXE 448 iexplore.exe 448 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 448 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3380 IEXPLORE.EXE 3380 IEXPLORE.EXE 3920 conhost.exe 2256 fsutil.exe 4052 fsutil.exe 3380 IEXPLORE.EXE 3380 IEXPLORE.EXE 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE 3380 IEXPLORE.EXE 3380 IEXPLORE.EXE 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE 3756 IEXPLORE.EXE 3756 IEXPLORE.EXE 448 iexplore.exe 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE 448 iexplore.exe 448 iexplore.exe 3380 IEXPLORE.EXE 3380 IEXPLORE.EXE 448 iexplore.exe 448 iexplore.exe 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 448 iexplore.exe 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 448 iexplore.exe 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1224 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 676 2584 cmd.exe 36 PID 2584 wrote to memory of 676 2584 cmd.exe 36 PID 2584 wrote to memory of 676 2584 cmd.exe 36 PID 2584 wrote to memory of 1276 2584 cmd.exe 37 PID 2584 wrote to memory of 1276 2584 cmd.exe 37 PID 2584 wrote to memory of 1276 2584 cmd.exe 37 PID 2584 wrote to memory of 1172 2584 cmd.exe 38 PID 2584 wrote to memory of 1172 2584 cmd.exe 38 PID 2584 wrote to memory of 1172 2584 cmd.exe 38 PID 2584 wrote to memory of 1172 2584 cmd.exe 38 PID 2584 wrote to memory of 1484 2584 cmd.exe 39 PID 2584 wrote to memory of 1484 2584 cmd.exe 39 PID 2584 wrote to memory of 1484 2584 cmd.exe 39 PID 2584 wrote to memory of 1484 2584 cmd.exe 39 PID 2584 wrote to memory of 2028 2584 cmd.exe 40 PID 2584 wrote to memory of 2028 2584 cmd.exe 40 PID 2584 wrote to memory of 2028 2584 cmd.exe 40 PID 2584 wrote to memory of 2028 2584 cmd.exe 40 PID 2584 wrote to memory of 2688 2584 cmd.exe 41 PID 2584 wrote to memory of 2688 2584 cmd.exe 41 PID 2584 wrote to memory of 2688 2584 cmd.exe 41 PID 2584 wrote to memory of 2688 2584 cmd.exe 41 PID 2584 wrote to memory of 1988 2584 cmd.exe 42 PID 2584 wrote to memory of 1988 2584 cmd.exe 42 PID 2584 wrote to memory of 1988 2584 cmd.exe 42 PID 2584 wrote to memory of 1988 2584 cmd.exe 42 PID 2584 wrote to memory of 2088 2584 cmd.exe 43 PID 2584 wrote to memory of 2088 2584 cmd.exe 43 PID 2584 wrote to memory of 2088 2584 cmd.exe 43 PID 2584 wrote to memory of 2088 2584 cmd.exe 43 PID 2584 wrote to memory of 1060 2584 cmd.exe 44 PID 2584 wrote to memory of 1060 2584 cmd.exe 44 PID 2584 wrote to memory of 1060 2584 cmd.exe 44 PID 2584 wrote to memory of 1060 2584 cmd.exe 44 PID 2584 wrote to memory of 2068 2584 cmd.exe 45 PID 2584 wrote to memory of 2068 2584 cmd.exe 45 PID 2584 wrote to memory of 2068 2584 cmd.exe 45 PID 2584 wrote to memory of 2068 2584 cmd.exe 45 PID 2584 wrote to memory of 1312 2584 cmd.exe 46 PID 2584 wrote to memory of 1312 2584 cmd.exe 46 PID 2584 wrote to memory of 1312 2584 cmd.exe 46 PID 2584 wrote to memory of 1312 2584 cmd.exe 46 PID 2584 wrote to memory of 3000 2584 cmd.exe 47 PID 2584 wrote to memory of 3000 2584 cmd.exe 47 PID 2584 wrote to memory of 3000 2584 cmd.exe 47 PID 2584 wrote to memory of 3000 2584 cmd.exe 47 PID 2584 wrote to memory of 2764 2584 cmd.exe 48 PID 2584 wrote to memory of 2764 2584 cmd.exe 48 PID 2584 wrote to memory of 2764 2584 cmd.exe 48 PID 2584 wrote to memory of 2764 2584 cmd.exe 48 PID 2584 wrote to memory of 2916 2584 cmd.exe 49 PID 2584 wrote to memory of 2916 2584 cmd.exe 49 PID 2584 wrote to memory of 2916 2584 cmd.exe 49 PID 2584 wrote to memory of 2916 2584 cmd.exe 49 PID 2584 wrote to memory of 1432 2584 cmd.exe 50 PID 2584 wrote to memory of 1432 2584 cmd.exe 50 PID 2584 wrote to memory of 1432 2584 cmd.exe 50 PID 2584 wrote to memory of 1432 2584 cmd.exe 50 PID 2584 wrote to memory of 816 2584 cmd.exe 51 PID 2584 wrote to memory of 816 2584 cmd.exe 51 PID 2584 wrote to memory of 816 2584 cmd.exe 51 PID 2584 wrote to memory of 816 2584 cmd.exe 51 PID 2584 wrote to memory of 1336 2584 cmd.exe 52 PID 2584 wrote to memory of 1336 2584 cmd.exe 52 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System utgneacroic.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" utgneacroic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cycegapxoetm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" cycegapxoetm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1224 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00293.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2380
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exeHEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exe3⤵
- Executes dropped EXE
PID:676 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 3884⤵PID:1844
-
-
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exeHEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1276 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:220 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Windows\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2648
-
-
-
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exeHEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exeHEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe"C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe"C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_4c8a34f7.bat"5⤵PID:2044
-
-
-
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exeHEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe3⤵
- Cerber
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1484 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___EN7EL_.hta"4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2708
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___9AJHW_.txt4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"6⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:2016 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:1284
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete7⤵PID:2176
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no7⤵
- Modifies boot configuration data using bcdedit
PID:2020
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures7⤵
- Modifies boot configuration data using bcdedit
PID:2892
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt7⤵PID:1496
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"7⤵PID:3232
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "fsutil.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe" > NUL7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4828 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "fsutil.exe"8⤵
- Kills process with taskkill
PID:5040
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4496
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe"5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2052
-
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exeTrojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2028
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exeTrojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe"C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe"4⤵
- Drops startup file
- Executes dropped EXE
PID:1268
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exeTrojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Users\Admin\AppData\Roaming\utgneacroic.exeC:\Users\Admin\AppData\Roaming\utgneacroic.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2676 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet5⤵
- Interacts with shadow copies
PID:2372
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_Restore_FILES.TXT5⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:2720
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Howto_Restore_FILES.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\UTGNEA~1.EXE5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"7⤵
- Executes dropped EXE
PID:1700
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00293\TROJAN~3.EXE4⤵PID:2960
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exeTrojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exeTrojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\dhsbynyrrvyt.exeC:\Windows\dhsbynyrrvyt.exe5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\dhsbynyrrvyt.exeC:\Windows\dhsbynyrrvyt.exe6⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
PID:1892 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:216
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT7⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\DHSBYN~1.EXE7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4052 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"9⤵
- Executes dropped EXE
PID:3156
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00293\TROJAN~4.EXE5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"7⤵
- Cerber
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet8⤵
- Interacts with shadow copies
PID:732
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete8⤵PID:1676
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no8⤵
- Modifies boot configuration data using bcdedit
PID:896
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures8⤵
- Modifies boot configuration data using bcdedit
PID:2864
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exeTrojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1060 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exeTrojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\cycegapxoetm.exeC:\Windows\cycegapxoetm.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\cycegapxoetm.exeC:\Windows\cycegapxoetm.exe6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:2152 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:2188
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT7⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3968
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:3436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\CYCEGA~1.EXE7⤵
- Loads dropped DLL
PID:1004 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"9⤵
- Executes dropped EXE
PID:3116
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00293\TRC39D~1.EXE5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"7⤵
- Executes dropped EXE
PID:2332
-
-
-
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exeTrojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2068 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exeTrojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\F22C\7916.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Acprtdll\avrtprxy.exe" "C:\Users\Admin\Desktop\00293\TRDF4A~1.EXE""5⤵
- Loads dropped DLL
PID:1356 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"7⤵
- Cerber
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet8⤵
- Interacts with shadow copies
PID:200
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete8⤵PID:1724
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no8⤵
- Modifies boot configuration data using bcdedit
PID:1068
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures8⤵
- Modifies boot configuration data using bcdedit
PID:2096
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exeTrojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1312
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exeTrojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3000
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exeTrojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exeTrojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2916
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exeTrojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe"C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe"4⤵
- Executes dropped EXE
PID:3020
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exeTrojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:816 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe"C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exeTrojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1336 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exeTrojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe4⤵
- Cerber
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exeTrojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe3⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\NAPSTAT.EXE"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\NAPSTAT.EXE"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:356
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2532
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exeTrojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exeTrojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe4⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:2620 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"6⤵
- Cerber
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:1872
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete7⤵PID:2868
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no7⤵
- Modifies boot configuration data using bcdedit
PID:200
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures7⤵
- Modifies boot configuration data using bcdedit
PID:1596
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2972
-
-
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exeTrojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1296
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exeTrojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1772
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exeTrojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1812
-
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exeTrojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2072 -
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exeTrojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe4⤵
- Cerber
- Executes dropped EXE
PID:2156
-
-
-
C:\Users\Admin\Desktop\00293\UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exeUDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\ddacabfcdbib.exeC:\Users\Admin\AppData\Local\Temp\ddacabfcdbib.exe 5-0-2-1-2-7-6-2-5-8-3 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⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get serialnumber5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 3685⤵
- Loads dropped DLL
- Program crash
PID:2252
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3028
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Interacts with shadow copies
PID:784
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2820
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:2548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2409758,0x7fef2409768,0x7fef24097783⤵PID:2240
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:799757 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:734221 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3380
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:930835 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3740
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:996366 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3756
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\FD8BDF412DD53D772⤵
- Modifies registry class
PID:2128
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
PID:3952
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:900
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2097112986230851570-1414800950-2103494792-677496434-109055203415618296141324722264"1⤵PID:2604
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "710016460181157307251185309-16939756962032369104-1832865331540928936-1356303096"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:288
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "779261563-8851502551291512031-1825792408-268873716-904481705-1567690898-327631823"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:856
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "15814796746778154151302866083-12774757441602940102-979717966-1015261619748148200"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3008
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-9943979601950876343-1148589387337874102-15231873611922583890981142537-2035741589"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1928
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1648
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:bB8hfUVlF="GY2N";CK7=new%20ActiveXObject("WScript.Shell");xqWoQ51qS="7adDxDuYj";mG5we=CK7.RegRead("HKLM\\software\\Wow6432Node\\Rx0cAxF00\\wK0J3473AL");f1ku2iHsp="2lUX";eval(mG5we);R0lROH8A="Wp";1⤵
- Process spawned unexpected child process
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:jdwqvr2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:316 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Adds policy Run key to start application
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:2484 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵PID:1516
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1892
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2056864727-119582718114050008751210078619-536721718-158826225371169398481078981"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1908
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1772939062-391346014-859578196-7725443986823917181141276007426579924-1178309767"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2280
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "394104633467982519147484344818772968881922698729-142011952919856146-2076843098"1⤵PID:2144
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "213091137612313621251606035851545619445-187667752949073205515665117451394696437"1⤵PID:2188
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1818496215-968802290-856047379-671997172-1885651694-1254912632485369724-1060803665"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:712
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2956
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2704
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2000
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2608
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-744713243-15483819051060845573129507662014238448441476390636-6544389141344148593"1⤵PID:2464
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2472
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2404
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3288
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3184
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:3384
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1515703329-1985206076341489689-2111122006-4764630831561695879-6074262651416311785"1⤵
- Suspicious use of SetWindowsHookEx
PID:3920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3440
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2960
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2228
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:4196
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4881⤵PID:3460
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3572
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:4736
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2464
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:4116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:332
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
File and Directory Discovery
1Network Service Discovery
2Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5886ef19975f74c2886f0968c8c3a0338
SHA1f4657ee3cecf2459f738901ff4327130b4f759b4
SHA256cbe25728003b77630ea06fc48fe8ec2b5202af0c5fd55fbd1b9c017cb5dcd0e8
SHA51233d20d2d7145cacc45b9bc320b6502bb5d333a72bbdd1e638ea047f5de367e0686693ddd80738652e6830456e468761b96f6ddc57a71fdb97ef274433dc2f594
-
Filesize
68KB
MD583fceca6684ada988ddf2c74e75bfe55
SHA17524465864e441ce9a9547e7f5837d358daec4b8
SHA25654d95210a62bfc133d8b36cdcac6fa075f393ceec62bb16d30ae1fc451faef97
SHA5123e4708fb24c9907bf0082e7c2d83118f763569bb6be99f4d37ed83a4d68dce7a101a26386f1d9a9c21660787b35cdc7e4f2f737fc12c3d6d5020ac981b02c6b4
-
Filesize
2KB
MD58a56e501ad7cf98b39793e3a427b864a
SHA1436405ac686bfa66d14c25e7cf4268eab89ac6a3
SHA25659dd0dfebf784aadd8cea323b364f22236ecf63cf41bd97e72513db34d5b301d
SHA5120e833c6a77c7bd5a3b4e39a7033d8ec7b6f3eeee90e275649af89ed41af80053dd0013798ac06a94e7c726181c9c0f46bc5dd7c58f6e8dd1a3bd66fce54b30c5
-
Filesize
14KB
MD5614044fe561bfea34b6af3de0ea376df
SHA166b24cf15014daa4900b6b9554c812d28be5bf0e
SHA256760cbf28754f3d6a3fe32fc2561fc83f211d9dec0c877a3f97f82b296e849201
SHA512c8ba55930a2a086df40cb8505b94bc1651818d5db67c9a59019996fbf2f5db9b43459835915be960bb736048062c045097189a96a7057df79e68c8d644939aea
-
Filesize
64KB
MD5e00c3fa4269edf3c92625e52744e564b
SHA1f91ba2b9386cb790214e49c30cc48d6a045b8881
SHA25658cfa4352eb13784a1a7255080851c7b7f576180bed957a7a90834a164992180
SHA51281d61861a8942e9bcb961ba8e7c3c9e13e3036847485e8deb2933886711956fd7e65108691338d4c9bc32122ada663e5f0dd972a5e02d2701bff7268cfef530e
-
Filesize
1KB
MD56a3d66603c1b9fd2d0fb317d6b88eff3
SHA1360ca1ff961cc3c236facc86efb070f9611eecc7
SHA2561672bb5500444f6f6f03b769f02fa78b54fd46e0f6cf705433c108acdd4e3ae8
SHA5124cbf06cc56a15168adb2a43c8f4b72855446d19ce7ac8777fb0870b49d61707fecae9e79a6f171792ff5158c3de25a7f03c4a1089fb288b11b92862100bb2b4e
-
Filesize
9KB
MD565ae3625a111e9f6f223e84bb2dcf515
SHA12b10a3d3838082e72e5bf90f7deb7869c16d92e6
SHA25657d42d3d0dd8cc44d215050e87e6d1e9163081c41f06647c3225814158407ce3
SHA5121934990e145a4d3033c86ca7d6c162c7dd2397dc3a958ee76eb979ddb7aa706a7cd1cf2e3c3d70fd56e98deb9da52b21a2b43a7b1d6cf9cb5382ebeb92e55e6d
-
Filesize
2KB
MD54e41078d7bc467e2f27f1f97d2feeb8d
SHA1cfb62242503feddcb92a470c24ea052353bf2c1d
SHA2565d43543704db85daee0f86b816497766cdc621ebc8e2c040c12b50db5cd844fe
SHA512ad89bce2f5abb232b406a89a9e979a0922d1ec7c3465a68c04186922096b04397dfc823584707352501a85a1e2485e063fc87d8394ab546785d10a4704764acb
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD56ada5d5c1576534ebd093dd40298f97b
SHA1b71877ba7e44a672a6240f566fac7e65da43b0d2
SHA256d6fdc142c80302cef8093193f05eda46eaad25e44f482f439357568fd99b275c
SHA512fc3df42f70d9874d3e201b7def37dbe607568f11c19474d14a93dbe6627784759f7197748c93c1c232f70bb16642cb9efcc588c8dd2ebeefe744eb4df9d1b0ed
-
Filesize
109KB
MD5c080b66c3563215884671da0aac85d39
SHA1fc6b8014a94d0be0e6b8a3fdfce164cc656754ef
SHA256e4d925424b7eee29159971abdf6297a872cf50233d5c078c6022d137ad3a66ea
SHA51264c91375c17e481c4d6b0589db3463927c2f026405d10a546085c52e95339923bd2e55b02a14e5b2436b46d6d9e158a2e5ea3d7d5a1e68b7bddc8bcdf91ca5a2
-
Filesize
173KB
MD5ea71a9b36f68c9da21260a7a7de694bb
SHA1186c50282d90011b8988aff3a0eb7cee2500e99b
SHA256eadafae611933580e4527209189f0621bb9ad8c6e58f0cb8ee8342d3cd9fa0dd
SHA512a7200e70ca86266142bc029c32ccb7f863d8e45539a8796d626e997dceaa40b8150a41fe4508d67b0ee2e50cb24431256cb32ec429df625f2cadac5261fc50e5
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5633cb542fcc4a2351ba6018100556b72
SHA1e029a0119f26a0a4c1729cb8f25cdf8abb448dff
SHA256f819b4f5b80d4c7975347ccad4c75109e42043e236c4f3c889f8a4fd4acbc427
SHA5129fbcf597bd5f41f3cbcb2b03e367f719f03575d24e0465eaf7c6e68280a1c38ab43093cbbb4a6243847a43297e8385625b645b36937298ef19d76ef15015708b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8b0189acce3a42d84757fa924c5d68
SHA1fe1af0271befefb7e863a5775faa33c17b81cb9f
SHA256d32498aeefc5458b5ef21c9d0fb63f28a46fb44446f0ecc8e62854e55ca9f243
SHA51201a76734d8942d76f929ea457a45649d71ba9c9dd4d439b8e091b36d3ea5803e556cf148ab6e999c27e2e9ff984ad8e7ae010775c6d961d2aa5429f44f1abef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d340e263e1bc36f73e6ef66af374bd8a
SHA1cce16e505168ebd3e4e00610d754998e9bfcae59
SHA25656df32b0bdd5e8fb58774a39cb93b9e6eb52456ca4647d192f988aea9148110f
SHA5121ef4e99284137bee55147174b637d8303c1fb40eb1025dd29ad4b936321b2ed94c232f8e009f728e01b760b512678202fc792914e7dab2796600cb375a996f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59479bcc1d7aca1b02e4cad9364ad07b1
SHA1b45634ead9614c9beb0783723698ae7da2b4622d
SHA256db7e9797798d2898d5829d8d80a71dad0dde8e5c89529be776fef2eb110228a5
SHA512beec31fd6e662e75e3bbd4061afc99b87b10e62310bb702dc604059fc9e2b2e38b92c50b842fd60a2e3ee685a31c76d00b446e184c3a3d5ba5dca8cd1de37a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991d44e8d4cbbd446310ae15fd337bf8
SHA1bb95d765cbad36388dc811f7f5c346823d857e88
SHA25691fb6a65a5758a51edcce46c1f8734407857c08eba935a76fdac27b3718b26a9
SHA512d5e9f103c2a39169c97cae0efe93051a48021b0d59e2bcfa1b7e7a8bbc2a967c1fa1e183ab84e668dc870a762f45fdc4ed47a4ad264161e6c6bc50e1929e1365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a3279b2dcb9a253e4f2fded7e2dbf2
SHA17883cfb397e37b5f2d363361004f1d9e5256a521
SHA2562ed5c18015be86197aa76c66e307d05417dff37d9f126a8755985c05c4ee1f5c
SHA5124851b1382d9044105f6ba8ad2cb8dd656d205cb5ebc7692c354466e5cddd5fd1dff09550d06cbeb557e7f2ee0c3082fca4a9b8f4ff87d919e437a2891d62dd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58695f7739f87bd2671db9db2b15b1754
SHA1892f69a24004b2ae8600e76e93dd90a833dc4305
SHA256ead4a7705dae424d3936ad5dfc06ec2b4b4aa78cdd35070226c7d10af0b29f84
SHA512bc7776486841637eabb6a9a37e526af1430e8778a576c0c539e9ddf6aa2530f8f481b6b54a1039b84a16dbbbcbdbb9c3a8355d02177e3690f3205aba50bbc0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318e26c00f652170609efab910e033cb
SHA1699cbd74c3d6309ce2688ed4bba853f49a051902
SHA256e4438f87dcf8050b9f4ada7d6e2e85322469f89c63e578a9df8c95f59366764f
SHA5120c2c0319845141690f97827c7dade856d5f0939d5d45bf78ea82d3a0d6db36536ffeebd1ef49a0c1323028bbb03da6bd0fae68845b14eff0dc65fcecd34e1413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471b6d94a659c5066ed8dd0281963745
SHA1236bebdb933a24e397a34e4224906eabe611b856
SHA2563101e8d153daed1dc7e787058c809205cac2e616f163a46fdbec014cb5d83a35
SHA5129b62aafe4dc3b7457363471122d1e5312b498ffb1c85f7e268b0f022b0ec4053d7da3467515ebac5e10ecdb21fdeb3d4453b6d9a135fcc74108a1bc7eab18450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8e57af4cc9d893c0a1e18ae075c5b0
SHA1d49a69e3e283ddf4c405c1cb1df4b2b5a82ff5f4
SHA256499afee0916acf03a4b301c51f1cbfe2d60f338d92cc9da33ba56cd6c1f24b11
SHA5124d637cd5085cddeeb773363798376ae198ebe89c40a1fa387be2891e7dc3c2bd87a8e1041d79e09125a677cb2f96caf060814874f38a635dc5627dfabe813f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d225c1ffdbfc7b3ff04c1e4a3e8cd2c8
SHA1800cbf6537c2d6507aae3c6eb8b452651c87adc7
SHA2564104776c8f6f719acbc94469078e4580c954aa994d030d715a77b63a1039fa27
SHA5121cb78281833be9919046e6968a4ed7352493f3e588598a6d3f416ed8f593804456f1c4e88048022b26b634310aa2eba0340641b91b11626e3ba9a865e5c4e45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f26508d55eaf36a4b782b2fa37df17
SHA192772d5e30af8e957dd558bff629db55bb8480df
SHA2569455d515b51f68bab6169455821f678420596f04782772909541b02cbfe021e4
SHA512f4902d674966861b4c94bad4c0e24cf8ca1ab4479fc774f56eaddf24c3f08e5e748e626a9f9bf6138e62f60bfaa48440c6ae343f6a2cb36975c3e11d4c557db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d88f20ebe199e9ef0e2cc5f196719c6
SHA130d84c2b4547873cad55d9fe88da63ba8fc87b7a
SHA25618c48149a43e7b72b58075723ef4d98ddd13dd5109c8f391df7c250727d836e7
SHA51240558d597e48b78ea4672037a5ad7e92cfd75760a092fa9e4b8c0d133a56affa7b637e7fcff08c5a1c38d1b4ea211fa77e34759f909479f0e26ae4833a64c21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f3fd82fa011556cb8d5fbca0c80111
SHA1a6e22f89164969bbd91f8ff91f45644f3cf20f05
SHA256036674d29cbcd99c6c8cf2db2c172e1add5d2821ec86d80f56502e0061fde724
SHA51268396cc119f57312501051f3f59992da406a8253a0d222f58df2cbf95f1912b8f36d482b6b06c516929ad8fc1120760344b38e99d6e826a8f6d633fca607ed91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8659cf3aeda3d3e1ac86abb1e6cc77
SHA1e81797b5cb609e489da3bfb7a6353001ed9ce394
SHA2567f1cde2a2e4ea9d04653ef257433e90dd1c4a0a86236511977f1c40ebe6a4ee6
SHA512be451a651c76448f7bfad4f8a61ae6de944e55c01bcca94166109d1610b6f26ea96fa57095f6c7153c9fdb4f4a287e1a9b7e72c4dabd32c9c53440b91b7f3b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225e01ca924c2a0e5900d30218d6ac3b
SHA1c7418e3cc9a47113a5e8af7b2c827f0bce3c03ea
SHA256ad325fc4aa674905110edcf0a849d98d072e5bb9615a1635157eb77ff6a26521
SHA512a1941f8dbf7f0d74f8afd14d76ccff835501027d38a3b02f7e8e792cdca93b73779c3a79da1a994087c9532e9ed44030f05efffa9b83557b963cfc0e62d498d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf4cdbdd35f4dff8661c8df6ae6fb60
SHA18c7111fc2fe07ea2fd3a7f1449d291b9470c864a
SHA256b26a3627b3b16e4c6f757d1f11a5bc4e8f020dd10fe4ee517796b02c69b03c4e
SHA512576bdfd0fcacc69af6377e8b25c1cac90ced6e99932b06bc32179ba1f6d6d6f8e160e20b816e61e2d071cdcc080e9f7d6957a1ccef1706b3c427741a1d456405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec780fcb9f9c41fc4400bffeb6c8f31
SHA143816901b8e8a4a7f5ad1b43aac5c8c8e4e965f6
SHA256d6519c59595a68faaf3d62c4a6af06671c94fd91c50b700dc0826dd4dcfae6ad
SHA51213bcac86d7386532a0d1c7d200f180811dcf74314a46af01680b7741a92c23427ff50bfc6a8ecfe154ed367488d66d4125a50763aa7f1f7ef77d2c41ffe91284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2eabc1aa35fb8a1016c91379ebe5e1
SHA15b4d0b22f233ea90ed02875110b6973ebf1ef9e7
SHA256d289bf72fbbb4a397c8b0209dea40bd0c7dc919b2e847f8b2a23981c7d72e07b
SHA5122dc7e66a94580a738c06081bb5eb9864e1b6347536c5094d5c84225077cf5a81c1bd18446267ab1b2c441161563a85866ad30664ac744f2ef03a05a123120767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581903ec90864e31582e2493c2b017c6a
SHA1c6d835b61c96e4d1d8f245b74f1e45ac069a3d5d
SHA25643dee346a52bd1c65a81674bede889feda2008951353b4db962d4d6d5856b49c
SHA512ca2a965aa46b5f60b935e3bffe5ec91cc61a60633ff2480b3a9e41bbf69b0c622466b28f052818084fd544297bd4c446a9e333a208134a8cdbe40efd2a8949d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac34e7d84c1252ebba726e5af04eaa3e
SHA1cf8bd56c70a5231e209020349ec7db531ae73d0c
SHA256e31ea880ab9fbdcae16687a56fe8e019508e8d1507c011b557076e41b95226fc
SHA512bd52a44966420abbdf4e0f0fac42e382676b4ae05f6ebeb85ecdee5c2561c1cfdaa08708df914a2ff1110b9d0aac5b6069d132227951f4eb4e9fcd820614ca9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b699c8580194aeb499ceb93ce5e0b8
SHA135b0f123aa9ed8580d00a48cc3d39e9ea99c48e0
SHA256879e4edfb50db4926a9e4f8cc5adc5771130e615dae5e6c3e0f69cd9abc36998
SHA5124b2ab31c32740a08e4c2f967168b45f37addf2280128d7713cf75977db5e9210ba7aff4b01985d96a13fc04232772b65e2b9889c27ef30e18e698edbf1185cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f8e723efff30fb2427642f4b76897f
SHA134e955de62a14cba24004aa2ff3f0db8866ff839
SHA256f9b6591b3e9cf730cb459200d5bcd0ec53256f499b73d0738763058c70c5f345
SHA5126ec0b62491472da3e4b909346a79514bed694a7790ad3b7f3543645313977a78229ffc5ef5543895bb7ff5b54536213393c13215e51a04ee2b70856b8f1b09d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c1cb61a1e1efe24287ab551bbbc7e8
SHA1351f61d19b34032fb27cd9a009adaf528b753c4c
SHA25600641e28543d7b4b71a77ef7d438bef6adc42be1dd9c36ed5966e8b6ce697e3c
SHA512f74896011d38b030de01b37fe427f07bea78c137243704a292978c2cf425fd68de1865dda5d897eb26abcb02e1acee7af7cd09df029f0b7a611795ce588e21f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53375187c3f76207cb8455013933d3253
SHA12c086d46402411ad0d7c5a1045c09e3e7a244c1f
SHA25679aa187c79772750d44687af5de567a98c1149eb25780bb214a30ea8e654a3b2
SHA51229425c4601aead3010e80206c729b4f8a89986d882316ae057fe227822b7364d44d12515c2c516519a249debeb44d7f161607e4030ac6f25634e97d47b362ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f229d9ff1517a51837ced038abe161
SHA1f5d86f8199ab40045aee371fb8b84b94a353b102
SHA256d55a77f8befaf5cf595efbaa838f59252782d6c095033f7acac02e24eb2b8e6f
SHA512e6a7fe4515b1d1833bddbfa2c7ff65803075de1bcaaea37b5743e29b905a4e6440ab52e57389ad52d2b68cc754b8e31b0e1c6271eec5e43c99eb0071a55b4408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f606ea051815171296f92633d4492c15
SHA1c0cb59d70852bf1da5bd19e9fa8e69366fd68392
SHA256326d80e8bca56a91db19d3c022d73f476cb0503f5bedec02017ed2f1f2659850
SHA5123670ed4b1550d0f59029991348cc8c37358e480f368cd8b72b8b0ec884c5eef07a576c349560e18914997be435ed80ff5b7fff3bd4e6e7de5c6fa775a6aa0c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0585a840759fa4b0a111725041d465
SHA17f3764e9b8cd1a641132e9ec2bc38c0c28102dcf
SHA2567f0198a08e432a25ea18fa2b4fbed1c2ac43a225930301d2e13a59d42b71b6d9
SHA51295d028a9c32d07a1ab594489bba6f084fd4d1e414cf6851d674cf518091c0fa5f7cc86bb5a664bc2f8edcc8454d1edfaedf18f349c08a9124032b008c1d76648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58178bbb0c6e1c3b772953034871e1154
SHA11133b8e8f35a6dadc52056e650ca6a67a873448f
SHA256acdfc0b84de8fc4b24168a1e5f95176fc25dd102225e74d07cfb4e711e0f4e87
SHA512d76a04a154a953b0f92933c69b3f1f7f26394972bdb38ff850471fea4b3b163c8d9b1aa19c3a819b875a97f6afa1951ff45560f2085a8d61a11c25ff51fce333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5042de4a7adc9c2c52a49d6ec398ac7f1
SHA1cb628046dd79801febc78216bf9b23e176d86069
SHA256356c69cb9a6096b59592a5c968deea8f610404bc5b0da294b95dc4895667819d
SHA51215efd642991830fe68c55e111c877881f27d49362cfce8855593f2e1b9ed1dab90ed1182dd9dc7ac6f3884b95d5a2a0acab8c660e916732d28e67ea5bb760b11
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\qsml[1].xml
Filesize242B
MD5e6fb63ffd2703a114c11df4b8b371baa
SHA110904129fa7420cd9a358743c224a4f73d104b4c
SHA256229502e305f206d84cb63a9b144cc56c65e2ed2f9ef95004ec409781ac95c676
SHA512b991b83918a269952ec7aa0a25fbd44fc6a369a1ce529bf57673b525ff4e0668315d74b2e3e52482a7fcc3de4fc0300b925f178e32c079c554217f2fae371a59
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\qsml[2].xml
Filesize238B
MD5d63c20c4f120c60e3da70e2565226bbd
SHA142bef27d972dbf5f3a250dd55eeed9c277d5b069
SHA25681b65918e34b57f533430f01fac93df8176243a8199abea30112fa325c0d6671
SHA512339f7fd0ee944389f133f079d9f684d689acd3f6ac13924031e43788b6256a09c3f133ff42a878f66ceab6c3347056747eed95dca25a40bfd6877babb1062e9a
-
Filesize
58B
MD5f8e2f71e123c5a848f2a83d2a7aef11e
SHA15e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA25679dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA5128d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
112B
MD562b02af9a6d7e56a411625dc968dc1fc
SHA12ac8257aced517dee27952ed8445c15f851e9d6f
SHA25665ab371a4fc7fcc26e5d14bef726c2f9864b677e1f1b10cbeaaa588da1f238aa
SHA512ca36ff49fc8541bf2939f6aa799bf5e0468fe79ab885faf3f79fd74c0777e58e8ce487604e3221ebfc3bcbc57c43a8c230518819e613414c4348fc40994df73e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
767KB
MD563513c5434ccd51f9bd83845a6b1b36d
SHA14cdcdca0c5fa0193df418270444d9bdacff4d197
SHA25685dcd3ccdb45ffaa60c35b8f5be4f70dddf6f15fb8baf6f4521a84b65df22f0a
SHA512a5ec442a7105d5e4061aae826c4fbf21d22294f65cddf4c31ee738ad9d745516266730be1df0856efa5dc3afb93205154adbb4c1b379b3ab5243b4fb0d35cf56
-
Filesize
120KB
MD5c098029d4cd7b60fb9ec45594b03d022
SHA1f8d3e8fa5003b610283daebc77ddf43adba7e9be
SHA2568b48658998701bd8589c4bd72343eb8361e9daf8038dea775722bbef8e85b632
SHA512780130d6bc7aaf1684d31db2b5da30a11d510e5363466f4f1318dc90bedcbacf2ae88edaab52d30adc5c857fa22cfd755d2a8dace34ce3a6744ebabe2c605d19
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
16KB
MD5dea87653f376636035ea592ca252eb2b
SHA1509eeea42b29c8bc50ac34b5d795f9469e27f179
SHA25687fffa6d452af8cc57eff55bc728bbb2dd59667f014ea811208e762b56d92f16
SHA5126e0ab0e97b3520d84229fbaedf6c892515e29ea532cad69819632966574eac3bfe9dd5a23513e23176ba8f3d8d8a4d41274d17b309302de08b79e5b55975fd77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize4KB
MD52206d544bb6ff613dd5afe4f660ef51a
SHA146a771453e59d48992fb3ee8ca694ed04dc146fb
SHA25615765387645d80d1a51401d6f4bcacde068c73427217cf2f517b817b918ce1b3
SHA512bc5bd4c449ac44f79be7374270f7289d2917a13d9d4f319d737cfd576a9e8c421b916d93f7b328adf5bc99112f0d9c6e14498f1d06dab3b92ddb7a384ad893f7
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exe
Filesize600KB
MD5081bc081c55c6811098f81cff4273c34
SHA1712f6fb5f9885c354f41b0a3244b54555cd42cd7
SHA2568e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1
SHA5120026efd399b8a8fd19ab2044cc49971c9fe6ee00d72b786ccbd6868b749baa8cc9aa2d173f7e5c658e98e5fa1913db5d12dce62acdf3c1a38467532912d22d55
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe
Filesize167KB
MD577fe24f9247f36f17c62ec39b770dfbc
SHA11a81df9eb8494230c8aeb19be64e25ccded7460a
SHA256ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78
SHA512ec5d7bbcd7b3d9e5b14b5e2677bdc7fbb7713f1189c81b655d701180457e8e3b52011604ce368d42dbc79974422d41472244828f90b95cea7e22b80d19052ce0
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe
Filesize184KB
MD5c4708100ddaff7a150e2476e666fed19
SHA1d4ee46978196069f60f6a62630c1abdeaac999a4
SHA256ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2
SHA51256d859b12fa0fea858eed9d811b4202cfb4f0564cae13dd5b8312f1c1ddf8462de0b06f1a0f43718710366356965e7d970f4e764598c9da89f0bd330bb28452e
-
C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe
Filesize251KB
MD5b3f8809cb9c2ab0f9b50f9abfa357407
SHA121e211dd10e8c71633b8dff272d9f704ac76a22b
SHA256609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab
SHA512002d20407c18b9a06972fcccfe1f09f989856f164d0704d719bf64a96ac6df8d984e86cbe87c91b641fa8e3060c0f4ced87e93b823ac1024b83150473c2a95ca
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe
Filesize136KB
MD53e06a9069670e68740a300087e8f91c7
SHA1a49b7cbac50110f8be8e3876349e156450f4f13e
SHA256af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce
SHA512935c6ea0ac09016b0f7e30a92e97bbf4da28e0af96ad2baffd0bc119808a1f556c2f0e757b0eb0360bfccc733ad8815f42d6be6b62dcf38937114f42c14b3555
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe
Filesize663KB
MD51aa75055f1bf5bdebd28e133828ff8e0
SHA1830b4ff4819301e8b4e5739c745c038a722d5f0d
SHA256b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c
SHA512e645e195f49cd82ff2494102233bb32b2fcf5a6e77fe1788edbcc8f33a6d5441d4cec6a49f4b3f8852256b3ecd3592876236c22f449dca28688f21f2cff51103
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe
Filesize318KB
MD515390c45b0137d7d8c9a9f2eaca38ebb
SHA1754289156a17cfeb6d95b294ec946b7770faea04
SHA25600e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288
SHA5122c9e22f8022f6d7601950c3102006d43a12ed472e7a484a7a5964cb3332cca9019da13b51f39e8572b56b9ab1b4ee95bbb3eb727df890ad2011c5dee0db09c5d
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe
Filesize380KB
MD5e8aefb2d57684f39c6f14d12c48f2e72
SHA1425861fa04d10823bdeac3b4b47286223629d8c9
SHA2566dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d
SHA5124fd84bb14b6f0f93975baa969533f2fdaf379f6197e4c015638299c52a6bf08bf1e02ec682ca56426357ccbf797d610f31fe99811fe864366a51ed83774ae3b8
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe
Filesize312KB
MD5da24da5eb477dba25a842fc4089320ac
SHA1fbeb65633dc1f0dc54e062466d470f0848d53f8a
SHA2567a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36
SHA51274e6c2090360b2812ad5cd0ad16753a4bce2194e52de2c8d8f7fc53a35636e3d8d76024645a0bf816fa153478c8eb16dd3f539e556fe0bef3d75e23540c7a7b4
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe
Filesize377KB
MD5c06e0e52fd9d4d83fe66940bd83a4132
SHA19e27d750f9b60c67dcc0219447a894ee3c80057e
SHA256b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227
SHA51285f7db9c9874f7d1c4bc58707bb0990cc5c940b33c6b0ab3891c8b90f78a1fe16c8a1e5c03a62efc9acbed0b180230264e1b330624e5641ab1e6fe892dc2e41c
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe
Filesize244KB
MD50d6ddc729984dd74e675f6d55d978d7e
SHA1e482b7a555496006a13286e22b4127e687cfe368
SHA256c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0
SHA512651fa8c474d4ff870330d9556556102162ffaf4dc4e8ea9a53901bde38fd936d6aefc06400d78474e9d8da5ac9f69301c24e24adf68d6dce9df04fae08d476ad
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe
Filesize193KB
MD5654c468493cae2deadd2427361320be0
SHA1442782bd98183df12913f9a3a66bd6da1a558f57
SHA256d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8
SHA512c2d4b7906dd6c01e472b9e442794ccf774194ad4b40884aeab59787f08ae804f2d401d723509414ec24461646f76deb8b2bab4e430e67a4c610e8b2b094bd17f
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe
Filesize424KB
MD5df35e46c75acc0f181d5a2cdea2818fb
SHA12c51ace4113e03cea46b6dbcdb0592380e7f8796
SHA256994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32
SHA5124b68c1544b721c72dcab35fead16801826eb198d04821d823997b471df795a1fd890baca2274b39fa76f50af20e1f71b11313152dde431e0821b227aec1cb29c
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe
Filesize1.0MB
MD5167ea47b3cae87c05b14f692c4cd80c6
SHA1b0985c5735a023e491837c0c4db2a89eb4feddfa
SHA25649a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247
SHA512b868ca7958785175a41e12c33a25c526c2abd1228efe1e1e71b13843c632f9d80ed39eb0307d35fc6d10b24194ec34d1f1c8c3ce89d0f6d2e4aff74915735b43
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe
Filesize272KB
MD544dc76bb7c8db48ac6c11c7d7ee9f3e6
SHA1d1f63ebc9087c1263772920d1bc82cc91e55d26c
SHA25632f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392
SHA512b34881ebeb3d2050cc450f94ba6933c93fceb881032a3fe47afdc6ea59701dfb8a655a4a2daf9c7046aed6c8d41215d61c56e54b54fce92189ef870b97af1313
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe
Filesize319KB
MD57d20150e3f8bbdaa5760905f2cfac6c6
SHA19247dcc18bba470b0ee210d76e50f8c5563e0677
SHA2560da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30
SHA5120b181ff36fed94641c601161997900b54ecd87416b8c7115184bdd40be1278226608c0b7314514f9b0b128e0c17a799ee3f3eac876833afd7bb9acc1e7723eac
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe
Filesize251KB
MD5cbec2d9d2b3c473e680835200f8f15bf
SHA171a34c1fb6697f7307174727a16162275898f444
SHA2562f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982
SHA51261cdeba44b377dbc1c104b11be1b68200c416809020f9eab6c51accef130c756d98a88d62ad6a44cd697a37b4e548da5d9e2bef282bd83b6eb4015da845cb2e5
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe
Filesize284KB
MD5848235fdd743c15080defc7a5d3afb3a
SHA1913df0ea3fa37304ebb73ee5174f025616e6a0bc
SHA2564f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc
SHA512a1f303e5028627066b3527ecbc918cf70847e71d3b9dcb49ca2dd5def45b53172290ca6981ae2494b72fe2b3dabd9929e0a2962402dc08815867c9db80e4ea55
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe
Filesize220KB
MD5b1a3e21492cccc9f3091b01846b09df9
SHA1b00514c05e019b9a62a11af86d12733471f63a88
SHA256f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04
SHA512600caf029855ba19cb5ffaa29624f767ce07c8a40366844cfbc1aea0432a038ebe5ae7822a5411bd07ad9224ff0a963b6af9c0d40012d5b0abf2010f0695f167
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe
Filesize324KB
MD585aa39140544e9febf297feac54c0bd0
SHA18485b1fc724598bed9d60bfe730ef7fab69379f3
SHA2565c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615
SHA512d831b42654393b29add2e9d3255eced90ef5f9b46babd1e9bbb7757255f8d496453d32240cc7efbc351305a91f9301f10531f70e92b78016d33efda7232435a5
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe
Filesize385KB
MD53384b2d92a6366b65891a93536512d5d
SHA1492b0b96403e1b3f03fc73a60689823d69c498b4
SHA25666c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d
SHA512117c1516e6054fc82f3a276d0c694cd051089a10c47be5d778974ea1b561a3a9c6e3a2fa5de5e7322030bb10147dc8f24652b9138c89ec4ab0f76e93cd94ab77
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe
Filesize297KB
MD517ee3b0026600dfcae6fe2a24f70555d
SHA1add1c1a9faf0a254808e3aacce5b6ceda06bd155
SHA256232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63
SHA512f075f13ae6414e840619e615bdde1198167c97ba44189570e0862a6d236514e5b37a46f23e1b392c95eb705cd9fc1622838d1fc2f190b98a13be81e9b2e6e099
-
C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe
Filesize282KB
MD5e763ee336c6b120d54288ad9c182429f
SHA167d92d68b3a3264eed96c4840760232917fd5729
SHA2569d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3
SHA51226bc042d8d642fd29e43b7ddc5ece2eb1349ace3e34879dc3d3049d921455201504df3adf551d5b9a73e38beb40557c40229f7ee042b90c7274cee8919320a02
-
C:\Users\Admin\Desktop\00293\UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe
Filesize556KB
MD581730fc44577b75164ce51bb10c53aab
SHA1694c8172483c7dac82deb9ce0be17103c6982a29
SHA2560d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d
SHA512722e7dc1f33ca519a9d445c5f5ee1bfdfb875c9b6894e72616837f7487f0c3233a07a43ce41f950c43164190f8c76555443bc5291ee1e9c298b218c573bb8adb
-
Filesize
12KB
MD5dd366be6411e0228e23e52c8970cddb3
SHA1d204a998b3ae14e432ec97043993b91b4e49c1da
SHA256f6d921b86d2afd4be1dd53a3f0e0da36d571cc83b3472a83afd9c5a454028b6c
SHA51209e4154a2c880cb6d1528699c32a7f43ec81ad7bdf7bf7e72ef62d91b410e3676edf778226fd38a3088763b6dca2803e8da97bf5f41aa27cb1f9e4e7e1bbca36
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
85B
MD535ecc8f1c22aa90d513f2f131a4dd9f5
SHA1c831aeccee6ef7f9669e9c8c44ca1bdc7ca75a0f
SHA256033b7b2eb0c58b4f9429d77da01b020d801fd2655e991986d161e5c26cab7b6f
SHA512b7a8763024ac48b0cf59fe1af28836957eddb58796640b64956199f14e8639c0c9539bd391787f84b17f016c4207168923c30b1d761f1d57489f64e96f551dcf
-
Filesize
10KB
MD5be035f023292327ef5b13d25e2824d84
SHA1cba6bfaa10663b8d900dd27b9a3ddd7df6c32a05
SHA256bc4a67dabda74c8b00166e35274f692e33f42744747107b9be1ce4e3e37d409a
SHA512e8bce775253e7f41f2086220e7a8a90c1e69dc9ed6b552b3b98dea62e6a8250805eedd9f91d0b99eda55d83383d98cc8a4d68426223b16202ab3099f8c92f0e1
-
Filesize
1KB
MD526b5ca1f5333bd3246bbb372ecc0cc14
SHA1f68588e4d73db3e847a82c523c0b307f9f2bb062
SHA25623dbdf5a468f0c452c88eb369d8ca47d0c3312f77f301049372732c0839a8ebf
SHA512b8e70369d795412f6ea935352dc9ff24c6922d16f2a9667b46804e88af91c9df6e6f5fe4f61a4af7cf69c2b9c6b8a0ec1dc6a16d706b5dad748bca80edac2b8b
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
Filesize
67KB
MD5d7fd69a1b9de275ef42023c1a6b68362
SHA110cd6a4f8e96fe41ad3cd811e2936edd3f9052dd
SHA25625bb016a9b0313dddd853297b45bd2c0dff87d6ae448e8fb3389d296184410b4
SHA51256ffc170dfedcae217a3a22deefe77cde3806649a75c7598954a9fd70fb0cc27a6ff5f76b9fafb3174cb88b7cbc6a6f03c469203dac3bbfaa58a35bb35b8c527