Analysis
-
max time kernel
149s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00282.7z
Resource
win7-20241010-en
General
-
Target
RNSM00282.7z
-
Size
6.2MB
-
MD5
5af62ab1200f11c2a8f16099ce18409a
-
SHA1
9295dfda604e99c80a35b749b260b00b66d60df1
-
SHA256
97db43529fd69353e9ceefac584cc7a1aec8dbe9f7f444f70b7ac5067e27fe1f
-
SHA512
24209bca094aed1f29a7856dd440d4dc776dfb7920ed1b1b97b68da8b067f629d907d1cd3c59ade602ea52db5ca8c7a307ca2d01584553f92b92166f3bd186f2
-
SSDEEP
196608:QH9qbJam61w2+/ZIO6DL9yfgnjlLY0SQo2yP0HMB8ODTFVCZo1DC3:QHYbN6rNvDL/RLK/P4K8WFVCGI3
Malware Config
Extracted
netwire
micro.loginto.me:3360
c0der.ddns.net:3360
bakbumz.ddns.net:3360
-
activex_autorun
true
-
activex_key
{IGXB136N-WP56-42I3-3EN8-85A00571YU01}
-
copy_executable
true
-
delete_original
false
-
host_id
2016-%Rand%
-
install_path
%AppData%\Install\Notepad.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
parola
-
registry_autorun
true
-
startup_name
Notepad
-
use_mutex
false
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+pofpi.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/70E2D9F0B522C0AF
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/70E2D9F0B522C0AF
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/70E2D9F0B522C0AF
http://xlowfznrg4wf7dli.ONION/70E2D9F0B522C0AF
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+lne.txt
http://alcov44uvcwkrend.softpay4562.com/13E9FBFA6C3A8CD7
http://tsbfdsv.extr6mchf.com/13E9FBFA6C3A8CD7
http://psbc532jm8c.hsh73cu37n1.net/13E9FBFA6C3A8CD7
https://vf4xdqg4mp3hnw5g.onion.to/13E9FBFA6C3A8CD7
http://vf4xdqg4mp3hnw5g.onion/13E9FBFA6C3A8CD7
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+man.txt
http://jf73ndna34df.ceorldess.com/13E9FBFA6C3A8CD7
http://fqa4dnfh5fsk4.tarsfee.com/13E9FBFA6C3A8CD7
http://hrdsjrnvskdjnt.pay4softrn.com/13E9FBFA6C3A8CD7
https://t7r67vsrpjcm5dfc.onion.to/13E9FBFA6C3A8CD7
https://t7r67vsrpjcm5dfc.tor2web.org/13E9FBFA6C3A8CD7
https://t7r67vsrpjcm5dfc.onion.cab/13E9FBFA6C3A8CD7
http://t7r67vsrpjcm5dfc.onion/13E9FBFA6C3A8CD7
Extracted
C:\Users\Admin\Desktop\_HELP_HELP_HELP_OVA31S_.hta
cerber
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+cljdp.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/59474F67A7E51D49
http://b4youfred5485jgsa3453f.italazudda.com/59474F67A7E51D49
http://5rport45vcdef345adfkksawe.bematvocal.at/59474F67A7E51D49
http://fwgrhsao3aoml7ej.onion/59474F67A7E51D49
http://fwgrhsao3aoml7ej.ONION/59474F67A7E51D49
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/484-232-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/484-229-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Njrat family
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Contacts a large (17503) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/1660-144-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1660-307-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/2912-327-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/2912-330-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/2912-390-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Modifies boot configuration data using bcdedit 1 TTPs 9 IoCs
pid Process 1572 bcdedit.exe 2460 bcdedit.exe 2872 bcdedit.exe 3060 bcdedit.exe 2424 bcdedit.exe 3328 bcdedit.exe 1584 bcdedit.exe 1816 bcdedit.exe 3876 bcdedit.exe -
Renames multiple (179) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (263) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" compact.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 2221 2060 mshta.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{IGXB136N-WP56-42I3-3EN8-85A00571YU01} Notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{IGXB136N-WP56-42I3-3EN8-85A00571YU01}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Notepad.exe\"" Notepad.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2872 netsh.exe -
Drops startup file 16 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+cljdp.png hwhrrgmjbicc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\compact.lnk Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbf82ab21c4b4330d14655c4f7b31aa2.exe njrat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+cljdp.png hwhrrgmjbicc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+cljdp.html hwhrrgmjbicc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+cljdp.html hwhrrgmjbicc.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbf82ab21c4b4330d14655c4f7b31aa2.exe njrat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe -
Executes dropped EXE 49 IoCs
pid Process 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 2776 Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 2956 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 2884 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 2080 Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe 2716 Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe 1796 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 1848 Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe 1420 Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe 2196 Trojan-Ransom.Win32.Blocker.eawb-2ffde1f8c618f58127dc15cf16eebd67ca3faca642fa7370a4a208c12b96a756.exe 2064 Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe 2516 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 668 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 1660 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 2120 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 1724 Trojan-Ransom.Win32.Locky.xnv-aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696.exe 236 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe 2584 Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe 976 Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe 1672 Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe 2552 Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe 872 Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe 1808 Xfdpsi.exe 2904 AdobeART.exe 1856 hbjhv-a.exe 2912 AdobeART.exe 2468 oyapmgbhhlwn.exe 484 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 2196 hbjhv-a.exe 1760 Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe 2428 compact.exe 1580 Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe 2664 regdrv.exe 2988 Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe 1840 Notepad.exe 1256 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe 2236 snjr.exe 332 qyrepskhf2.exe 2108 Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe 2312 njrat.exe 2232 hwhrrgmjbicc.exe 2960 Notepad.exe 2660 regdrv.exe 1408 Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe 3320 hwhrrgmjbicc.exe 3648 compact.exe 3744 compact.exe -
Loads dropped DLL 64 IoCs
pid Process 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 2956 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 2776 Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe 2776 Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe 2776 Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe 2884 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 2884 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 236 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe 236 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe 2552 Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe 1660 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 1660 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 976 Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe 872 Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe 668 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 668 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 2064 Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe 2064 Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe 2584 Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe 2584 Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe 484 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 1848 Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe 1840 Notepad.exe 1840 Notepad.exe 2080 Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe 2236 snjr.exe 2664 regdrv.exe 2664 regdrv.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\compact = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" compact.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\compact = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Notepad = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Notepad.exe" Notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bbf82ab21c4b4330d14655c4f7b31aa2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\njrat.exe\" .." njrat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\compact = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" compact.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\compact = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Octopus = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ntw.exe\"" Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" AdobeART.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\qsnmvhpgneku = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\oyapmgbhhlwn.exe\"" oyapmgbhhlwn.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\meryHmas = "C:\\Users\\Admin\\AppData\\Roaming\\qyrepskhf2.exe" qyrepskhf2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Acronis = "C:\\Users\\Admin\\AppData\\Roaming\\hbjhv-a.exe" hbjhv-a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry Driver = "C:\\Users\\Admin\\AppData\\Roaming\\regdrv.exe" regdrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\bbf82ab21c4b4330d14655c4f7b31aa2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\njrat.exe\" .." njrat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\qyqdnaroopdm = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\hwhrrgmjbicc.exe\"" hwhrrgmjbicc.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: regdrv.exe File opened (read-only) \??\M: regdrv.exe File opened (read-only) \??\P: regdrv.exe File opened (read-only) \??\U: regdrv.exe File opened (read-only) \??\X: regdrv.exe File opened (read-only) \??\Y: regdrv.exe File opened (read-only) \??\K: regdrv.exe File opened (read-only) \??\L: regdrv.exe File opened (read-only) \??\O: regdrv.exe File opened (read-only) \??\Q: regdrv.exe File opened (read-only) \??\S: regdrv.exe File opened (read-only) \??\V: regdrv.exe File opened (read-only) \??\A: regdrv.exe File opened (read-only) \??\G: regdrv.exe File opened (read-only) \??\I: regdrv.exe File opened (read-only) \??\R: regdrv.exe File opened (read-only) \??\T: regdrv.exe File opened (read-only) \??\W: regdrv.exe File opened (read-only) \??\E: regdrv.exe File opened (read-only) \??\H: regdrv.exe File opened (read-only) \??\J: regdrv.exe File opened (read-only) \??\N: regdrv.exe File opened (read-only) \??\Z: regdrv.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1100 myexternalip.com 2253 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE81E.bmp" Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 708 set thread context of 2516 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 51 PID 2916 set thread context of 668 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 52 PID 1796 set thread context of 1660 1796 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 53 PID 2956 set thread context of 2120 2956 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 55 PID 2884 set thread context of 484 2884 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 63 PID 2904 set thread context of 2912 2904 AdobeART.exe 67 PID 1856 set thread context of 2196 1856 hbjhv-a.exe 72 PID 2552 set thread context of 1760 2552 Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe 73 PID 976 set thread context of 1580 976 Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe 76 PID 872 set thread context of 2988 872 Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe 79 PID 236 set thread context of 1256 236 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe 82 PID 1840 set thread context of 2960 1840 Notepad.exe 87 PID 2716 set thread context of 2108 2716 Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe 101 PID 1672 set thread context of 1408 1672 Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe 124 PID 2232 set thread context of 3320 2232 hwhrrgmjbicc.exe 135 -
resource yara_rule behavioral1/memory/2516-115-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1660-145-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1660-144-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1660-141-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1660-139-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2516-118-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2516-117-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2516-116-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2120-170-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2120-167-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1660-307-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2912-327-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2516-331-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2912-330-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2120-335-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2120-371-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2912-390-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2120-460-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_selectionsubpicture.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\resources.pak oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_m.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\en-US\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows NT\TableTextService\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\how_recover+lne.txt hbjhv-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\how_recover+lne.html hbjhv-a.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\how_recover+lne.html hbjhv-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca@valencia\how_recover+lne.txt hbjhv-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\203x8subpicture.png hbjhv-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv hwhrrgmjbicc.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\Recovery+cljdp.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\Recovery+cljdp.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\how_recover+lne.txt hbjhv-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\15x15dot.png hbjhv-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\how_recover+lne.txt hbjhv-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\Recovery+cljdp.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\how_recover+lne.html hbjhv-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png hbjhv-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Media Player\en-US\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\Recovery+cljdp.html hwhrrgmjbicc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\how_recover+lne.html hbjhv-a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIcon.png qyrepskhf2.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-over-select.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_cloudy.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-docked.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt hbjhv-a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\_RECoVERY_+pofpi.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\how_recover+lne.txt hbjhv-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\library.js oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_RECoVERY_+pofpi.html oyapmgbhhlwn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NavigationButtonSubpicture.png hbjhv-a.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_RECoVERY_+pofpi.txt oyapmgbhhlwn.exe File opened for modification C:\Program Files\Java\jre7\lib\security\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\weather.css oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_few-showers.png oyapmgbhhlwn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\calendar.css hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\Recovery+cljdp.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_left.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\how_recover+lne.html hbjhv-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\Recovery+cljdp.html hwhrrgmjbicc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\Recovery+cljdp.png hwhrrgmjbicc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\Windows Photo Viewer\Recovery+cljdp.txt hwhrrgmjbicc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png hbjhv-a.exe File opened for modification C:\Program Files\Microsoft Office\how_recover+lne.html hbjhv-a.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File created C:\Windows\hwhrrgmjbicc.exe Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe File opened for modification C:\Windows\hwhrrgmjbicc.exe Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\ Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File created C:\Windows\oyapmgbhhlwn.exe Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qyrepskhf2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwhrrgmjbicc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwhrrgmjbicc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compact.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xnv-aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xfdpsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compact.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compact.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeART.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyapmgbhhlwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbjhv-a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbjhv-a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njrat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeART.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1596 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000016ca5-66.dat nsis_installer_1 behavioral1/files/0x0007000000016ca5-66.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1044 vssadmin.exe 1912 vssadmin.exe 2488 vssadmin.exe 2336 vssadmin.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop compact.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\compact.exe\"" compact.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a55200cb3adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000d21de32e25423f5d1a0b436b39d68eaa2d658517e85e75ebbe9ed72de03ae9fa000000000e8000000002000020000000755f0790ccfedcdfe7761479361c687e8661580120b61ad2c0e8118c9b6ead1520000000cf3e1249692094f9a1dbdf9d31090c7a6c528c22c6c760d2dd3f498d45f05d7840000000aed6de99449879e91fa38096cd08c8f84b46a522707db8ad89d33927fdd1485be44f5cdeff7d72e51d337ed717ddd22f658b7482f21580999614ac73723e73d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39D535B1-A6BE-11EF-B3B7-668826FBEB66} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 hwhrrgmjbicc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 hwhrrgmjbicc.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4072 NOTEPAD.EXE 3896 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2164 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 20 IoCs
pid Process 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 2956 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 2776 Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe 2884 Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 2080 Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe 1420 Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe 2716 Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe 2196 Trojan-Ransom.Win32.Blocker.eawb-2ffde1f8c618f58127dc15cf16eebd67ca3faca642fa7370a4a208c12b96a756.exe 1796 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 2064 Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe 1848 Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe 1724 Trojan-Ransom.Win32.Locky.xnv-aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696.exe 976 Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe 236 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe 1672 Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe 2584 Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe 2552 Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe 872 Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 2516 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 2516 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 2468 oyapmgbhhlwn.exe 584 taskmgr.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2120 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 2120 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe 2468 oyapmgbhhlwn.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1304 7zFM.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 2956 HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe 2552 Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe 976 Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe 872 Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 oyapmgbhhlwn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1304 7zFM.exe Token: 35 1304 7zFM.exe Token: SeSecurityPrivilege 1304 7zFM.exe Token: SeDebugPrivilege 584 taskmgr.exe Token: SeDebugPrivilege 1420 Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe Token: SeDebugPrivilege 668 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe Token: SeDebugPrivilege 2584 Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe Token: SeDebugPrivilege 2468 oyapmgbhhlwn.exe Token: SeDebugPrivilege 2196 hbjhv-a.exe Token: SeDebugPrivilege 2428 compact.exe Token: SeShutdownPrivilege 1256 Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe Token: SeIncreaseQuotaPrivilege 852 WMIC.exe Token: SeSecurityPrivilege 852 WMIC.exe Token: SeTakeOwnershipPrivilege 852 WMIC.exe Token: SeLoadDriverPrivilege 852 WMIC.exe Token: SeSystemProfilePrivilege 852 WMIC.exe Token: SeSystemtimePrivilege 852 WMIC.exe Token: SeProfSingleProcessPrivilege 852 WMIC.exe Token: SeIncBasePriorityPrivilege 852 WMIC.exe Token: SeCreatePagefilePrivilege 852 WMIC.exe Token: SeBackupPrivilege 852 WMIC.exe Token: SeRestorePrivilege 852 WMIC.exe Token: SeShutdownPrivilege 852 WMIC.exe Token: SeDebugPrivilege 852 WMIC.exe Token: SeSystemEnvironmentPrivilege 852 WMIC.exe Token: SeRemoteShutdownPrivilege 852 WMIC.exe Token: SeUndockPrivilege 852 WMIC.exe Token: SeManageVolumePrivilege 852 WMIC.exe Token: 33 852 WMIC.exe Token: 34 852 WMIC.exe Token: 35 852 WMIC.exe Token: SeDebugPrivilege 2920 HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe Token: SeIncreaseQuotaPrivilege 852 WMIC.exe Token: SeSecurityPrivilege 852 WMIC.exe Token: SeTakeOwnershipPrivilege 852 WMIC.exe Token: SeLoadDriverPrivilege 852 WMIC.exe Token: SeSystemProfilePrivilege 852 WMIC.exe Token: SeSystemtimePrivilege 852 WMIC.exe Token: SeProfSingleProcessPrivilege 852 WMIC.exe Token: SeIncBasePriorityPrivilege 852 WMIC.exe Token: SeCreatePagefilePrivilege 852 WMIC.exe Token: SeBackupPrivilege 852 WMIC.exe Token: SeRestorePrivilege 852 WMIC.exe Token: SeShutdownPrivilege 852 WMIC.exe Token: SeDebugPrivilege 852 WMIC.exe Token: SeSystemEnvironmentPrivilege 852 WMIC.exe Token: SeRemoteShutdownPrivilege 852 WMIC.exe Token: SeUndockPrivilege 852 WMIC.exe Token: SeManageVolumePrivilege 852 WMIC.exe Token: 33 852 WMIC.exe Token: 34 852 WMIC.exe Token: 35 852 WMIC.exe Token: SeDebugPrivilege 2080 Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe Token: SeDebugPrivilege 332 qyrepskhf2.exe Token: SeDebugPrivilege 2108 Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe Token: SeBackupPrivilege 3048 vssvc.exe Token: SeRestorePrivilege 3048 vssvc.exe Token: SeAuditPrivilege 3048 vssvc.exe Token: 33 2948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2948 AUDIODG.EXE Token: 33 2948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2948 AUDIODG.EXE Token: SeDebugPrivilege 3320 hwhrrgmjbicc.exe Token: SeIncreaseQuotaPrivilege 2744 WMIC.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 1304 7zFM.exe 1304 7zFM.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 108 DllHost.exe 108 DllHost.exe 2064 DllHost.exe 4092 iexplore.exe 2064 DllHost.exe 3472 DllHost.exe 3472 DllHost.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe 584 taskmgr.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 2716 Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe 1796 Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe 1672 Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe 2904 AdobeART.exe 2232 hwhrrgmjbicc.exe 4092 iexplore.exe 4092 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 3460 IEXPLORE.EXE 3460 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 4092 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 212 IEXPLORE.EXE 212 IEXPLORE.EXE 212 IEXPLORE.EXE 212 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2920 2728 cmd.exe 36 PID 2728 wrote to memory of 2920 2728 cmd.exe 36 PID 2728 wrote to memory of 2920 2728 cmd.exe 36 PID 2728 wrote to memory of 2920 2728 cmd.exe 36 PID 2728 wrote to memory of 708 2728 cmd.exe 37 PID 2728 wrote to memory of 708 2728 cmd.exe 37 PID 2728 wrote to memory of 708 2728 cmd.exe 37 PID 2728 wrote to memory of 708 2728 cmd.exe 37 PID 2728 wrote to memory of 2956 2728 cmd.exe 38 PID 2728 wrote to memory of 2956 2728 cmd.exe 38 PID 2728 wrote to memory of 2956 2728 cmd.exe 38 PID 2728 wrote to memory of 2956 2728 cmd.exe 38 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2776 2728 cmd.exe 39 PID 2728 wrote to memory of 2884 2728 cmd.exe 40 PID 2728 wrote to memory of 2884 2728 cmd.exe 40 PID 2728 wrote to memory of 2884 2728 cmd.exe 40 PID 2728 wrote to memory of 2884 2728 cmd.exe 40 PID 2728 wrote to memory of 2916 2728 cmd.exe 41 PID 2728 wrote to memory of 2916 2728 cmd.exe 41 PID 2728 wrote to memory of 2916 2728 cmd.exe 41 PID 2728 wrote to memory of 2916 2728 cmd.exe 41 PID 2728 wrote to memory of 2080 2728 cmd.exe 42 PID 2728 wrote to memory of 2080 2728 cmd.exe 42 PID 2728 wrote to memory of 2080 2728 cmd.exe 42 PID 2728 wrote to memory of 2080 2728 cmd.exe 42 PID 2728 wrote to memory of 1420 2728 cmd.exe 44 PID 2728 wrote to memory of 1420 2728 cmd.exe 44 PID 2728 wrote to memory of 1420 2728 cmd.exe 44 PID 2728 wrote to memory of 1420 2728 cmd.exe 44 PID 2728 wrote to memory of 2716 2728 cmd.exe 45 PID 2728 wrote to memory of 2716 2728 cmd.exe 45 PID 2728 wrote to memory of 2716 2728 cmd.exe 45 PID 2728 wrote to memory of 2716 2728 cmd.exe 45 PID 2728 wrote to memory of 2196 2728 cmd.exe 46 PID 2728 wrote to memory of 2196 2728 cmd.exe 46 PID 2728 wrote to memory of 2196 2728 cmd.exe 46 PID 2728 wrote to memory of 2196 2728 cmd.exe 46 PID 2728 wrote to memory of 1796 2728 cmd.exe 47 PID 2728 wrote to memory of 1796 2728 cmd.exe 47 PID 2728 wrote to memory of 1796 2728 cmd.exe 47 PID 2728 wrote to memory of 1796 2728 cmd.exe 47 PID 2728 wrote to memory of 2064 2728 cmd.exe 48 PID 2728 wrote to memory of 2064 2728 cmd.exe 48 PID 2728 wrote to memory of 2064 2728 cmd.exe 48 PID 2728 wrote to memory of 2064 2728 cmd.exe 48 PID 2728 wrote to memory of 1848 2728 cmd.exe 49 PID 2728 wrote to memory of 1848 2728 cmd.exe 49 PID 2728 wrote to memory of 1848 2728 cmd.exe 49 PID 2728 wrote to memory of 1848 2728 cmd.exe 49 PID 708 wrote to memory of 2516 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 51 PID 708 wrote to memory of 2516 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 51 PID 708 wrote to memory of 2516 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 51 PID 708 wrote to memory of 2516 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 51 PID 708 wrote to memory of 2516 708 HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe 51 PID 2916 wrote to memory of 668 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 52 PID 2916 wrote to memory of 668 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 52 PID 2916 wrote to memory of 668 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 52 PID 2916 wrote to memory of 668 2916 Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe 52 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qyrepskhf2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hbjhv-a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" hbjhv-a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hwhrrgmjbicc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" hwhrrgmjbicc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System oyapmgbhhlwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" oyapmgbhhlwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qyrepskhf2.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00282.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1304
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exeHEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "Update\4f6047d6-c9b5-42a4-a781-6f0f5ef8cc4a" /F3⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\4f6047d6-c9b5-42a4-a781-6f0f5ef8cc4a" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1569543683.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K "C:\Users\Admin\AppData\Roaming\adobeupdate.exe"3⤵PID:1316
-
-
-
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exeHEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exeHEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
-
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2956 -
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exeTrojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Xfdpsi.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Xfdpsi.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exeTrojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2884 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exeC:\Users\Admin\Desktop\00282\Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:484 -
C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeC:\Users\Admin\AppData\Roaming\Install\Notepad.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exeTrojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exeTrojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:668 -
C:\Users\Admin\AppData\Roaming\hbjhv-a.exeC:\Users\Admin\AppData\Roaming\hbjhv-a.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Users\Admin\AppData\Roaming\hbjhv-a.exeC:\Users\Admin\AppData\Roaming\hbjhv-a.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2196 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootems off6⤵
- Modifies boot configuration data using bcdedit
PID:1572
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} advancedoptions off6⤵
- Modifies boot configuration data using bcdedit
PID:2460
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} optionsedit off6⤵
- Modifies boot configuration data using bcdedit
PID:2872
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures6⤵
- Modifies boot configuration data using bcdedit
PID:3060
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} recoveryenabled off6⤵
- Modifies boot configuration data using bcdedit
PID:2424
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:1912
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00282\TROJAN~4.EXE4⤵PID:1332
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exeTrojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Users\Admin\AppData\Roaming\qyrepskhf2.exeC:\Users\Admin\AppData\Roaming\qyrepskhf2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:332 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet4⤵
- Interacts with shadow copies
PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00282\TR759F~1.EXE3⤵PID:828
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exeTrojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\oyapmgbhhlwn.exeC:\Windows\oyapmgbhhlwn.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2468 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4072
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:472067 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3460
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:996371 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:2110482 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:212
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\OYAPMG~1.EXE4⤵
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:2488
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete6⤵PID:1600
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no6⤵
- Modifies boot configuration data using bcdedit
PID:3328
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures6⤵
- Modifies boot configuration data using bcdedit
PID:1584
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00282\TR33F6~1.EXE3⤵PID:2300
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exeTrojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exeTrojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\hwhrrgmjbicc.exeC:\Windows\hwhrrgmjbicc.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Windows\hwhrrgmjbicc.exeC:\Windows\hwhrrgmjbicc.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3320 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\HWHRRG~1.EXE6⤵
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"7⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:3744 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet8⤵
- Interacts with shadow copies
PID:2336
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete8⤵PID:3304
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no8⤵
- Modifies boot configuration data using bcdedit
PID:1816
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures8⤵
- Modifies boot configuration data using bcdedit
PID:3876
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00282\TRF58D~1.EXE4⤵PID:632
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.eawb-2ffde1f8c618f58127dc15cf16eebd67ca3faca642fa7370a4a208c12b96a756.exeTrojan-Ransom.Win32.Blocker.eawb-2ffde1f8c618f58127dc15cf16eebd67ca3faca642fa7370a4a208c12b96a756.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2196
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exeTrojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe"C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exeTrojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" echo.>C:\Users\Admin\AppData\Local\Temp\regdrv.exe:Zone.Identifier3⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\regdrv.exeC:\Users\Admin\AppData\Local\Temp\regdrv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" echo.>C:\Users\Admin\AppData\Roaming\regdrv.exe:Zone.Identifier4⤵PID:2444
-
-
C:\Users\Admin\AppData\Roaming\regdrv.exeC:\Users\Admin\AppData\Roaming\regdrv.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exeTrojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Octopuscpy.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\snjr.exe"C:\Users\Admin\AppData\Local\Temp\snjr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\njrat.exe"C:\Users\Admin\AppData\Local\Temp\njrat.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\njrat.exe" "njrat.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Locky.xnv-aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696.exeTrojan-Ransom.Win32.Locky.xnv-aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys2868.tmp"3⤵PID:3192
-
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"4⤵PID:3664
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exeTrojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:976 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exeTrojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exeTrojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:236 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exeTrojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_HELP_HELP_HELP_OVA31S_.hta"4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:3168
-
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exeTrojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exeTrojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exeTrojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\compact.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1596
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exeTrojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2552 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exeTrojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe3⤵
- Executes dropped EXE
PID:1760
-
-
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exeTrojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:872 -
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exeTrojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe3⤵
- Executes dropped EXE
PID:2988
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:584
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-12873321032093491037745609207410547671-156707293120609019681347854810-1626880663"1⤵PID:1572
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:108
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1337789551763400693-47349565016913362671514161126956099600-356827645-1376175181"1⤵PID:632
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2064
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3472
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1816
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\OSIRIS-c571.htm1⤵PID:1020
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:275457 /prefetch:22⤵PID:2708
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:275472 /prefetch:22⤵PID:748
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:796
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD51a158517666bd10c2b431c1736dd39c4
SHA1527f52fd6494de01db57f9f06c7066b471aa0698
SHA2565124ab8385f9a6b1cc1af010602127217663e5111e9626fb6cee16ec28f561bb
SHA5126a8b6a1c4b837ccdbd1528db042719ae8499551429193bcd6100f69dd176c4e5bc49585a55debc29a21ed4527ec762dc1d1162e05a3209a5934a5f9e2d4c52f2
-
Filesize
68KB
MD5a83c6554cf51c225e7d257837e1dc52a
SHA181121023aa50c6d6b278b1c7186634529452d0ad
SHA256178b2d3165be4a5512c0310577450b3e95fa82974570b52df26cfba80f486fb0
SHA51221627886f4b6810ce467fba37b94efd8992dc3aa8da8cf352e55d4aa33d9307447eebb07cebcd39b95b33d14125dd7ca77c0b23deda57d56a7a73be6e36d10c1
-
Filesize
2KB
MD57a40c8cb6513e322362cb4f8cb159979
SHA11d5a9562c74ec39beccbc7eff0511209d288b55a
SHA25653984da5430c3dce29f7729890198bab1fe94fa7ab2712301f4e179d40c93c3b
SHA512587f8cda7a56ab0bef77bf365aa30706a7ff3797f9a18f1e55ce802d903a2e0a77e50bb8ca48c09f71b6b43837ca4b3fceb86cfcc98416c03e9cca740a4cf025
-
Filesize
11KB
MD5be71a7bc7b67509826de75fef63a99f6
SHA1a5223e1187220eca7de5e7dfffb53199efaf2a3a
SHA25605b06c51adfbfbfd6d0fbb6eb9da5577a888b30446a43d0c8e35693daf035589
SHA5122b18c0827993e70f4258b627c3f70ba2055eede67a523bc97769353820a4b608d6138c84c9d4e0574c3cb63ae306a3ae22a9868051b708faf3de489b3d39225c
-
Filesize
64KB
MD539145a65c13a660f0a5234bac9112efe
SHA1a84f3babb36819ab6d8e7ee6011a647c4d9b4aec
SHA25693f90e8b88637a6c9e459878aab8567adc39967d1ddb1216b2054aaff3cd8085
SHA512ec51483e7e7cf3503e77b34f52a8d88ea8f61b1e183c2c87fa5ec24561150ff4c333e6180d33b883d8efa0baf344a4748a0aa7bdf3d491ab9e0a77dcd8e116b3
-
Filesize
1KB
MD516a414722d759456d25e1f14a9b642b8
SHA183965eab4373e8602857de3f2b3f09e280229ae5
SHA256cb78e6064b34866facf7625ff97e9cb5f9d8c60e2ad3d686e08b3c8717051ced
SHA512867903c52b0b94579dfe4668bb1950f4bdc8b43fbe7036f4d4c99597fc55fb4fb0f23ac3ca1c73e43d5ac700a3683f27b7915e0fc0ba55005d70794d39f609c9
-
Filesize
9KB
MD596abf06061ee0feb2d18c4128b63ca22
SHA1abb59a968bf0156d46b186b011af974fa2b097e3
SHA256630d7bce2e993c24bc6416269527146db0642ac430d6f823de1887e40dcfcba7
SHA512348098e6f4d1df2061aa1a2a861ee8e9c12cd058b250deea0c008a3431e2d43c31a93355e59a6fd136b09822ef98963fc9a26a08d3b10ead765106e7723b09f6
-
Filesize
2KB
MD5fbcb915249bb638ad13d795f9c71b858
SHA164d3a21f1aa364d3a5715b9f47a74e8397ad9959
SHA256a78e2d46cb02675d38a3858595305264a1f1b659992590872607b5b9263ada04
SHA512f0ca035fa286446c3cc437bdc0941f2443321adcc16cf975f13a0d84105d8513e88259845223e4ad7f867a323c686e053ac0790e43b0f0c19bd5dab92efa331d
-
Filesize
10KB
MD5bc9c6e3e8e9c02ceb4f120b2b4b4c7bb
SHA1367ecd77a6b7f90407deb24ea8ee318a1342563c
SHA256ded972ae725b68a85a48b5830151dc24651c49aedbe218fdf48fcea4c7adfd95
SHA5128afd7f2725925319cf40c69d18deb677f4f3f68219c660577d6e0ed6194c1fdbf41c12b353724444e889383a538e607ad265a792ee66fb7ee8bf0bcbc1358f51
-
Filesize
2KB
MD5479ac1874c6b53c7676030ed1b4c51e0
SHA1a5e3fce6da79c50d024e4d1d1457680adbaae822
SHA256d39577a2542490448a148cdc69044dbde9440554f7192ab485d65d5e77bc081d
SHA51266923f04dd219ebc7798c6c9010866fc525378ba8c16bcedc647cfe310441ed4302e11c65ceac925a1ac0e81413a2b4b12e65738fbb8accb0cd93b2136bcfdbf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5e1b69cc81c0dc8a3605251cb08d2c106
SHA104437ef71ecdbf328c41162c2b834841aaf4bfa1
SHA2564e81436960ad54d3da3b01d05ec65a4845aa3cd5fb4661dde8ea8feb4b4b1eb0
SHA5126d1b9cf392603b932891a7756c4d60a490e6ec2a56a1fa48e5d30ffc8eef7c3f2d2c5d48510f1187c9a4d2fb451cee4e337ccb4a968bf1ff671a34276b6904bc
-
Filesize
109KB
MD53e4d9bff95093f80a16c11126af58adc
SHA15a20bd7bd578abd23cf73f7885dc8dae2323d8bd
SHA25672597457359721c31dfaed607b667473060cb3d66499f988b64163996137c585
SHA512f02839b79657beb1832d9e58ab08328644308947a433f57eab814f22409df18226038c04faf423afb927ee122085cb32f33fa2897e786db13a59466942f30a49
-
Filesize
173KB
MD5a8bb5a821c776cc9cb136274b01ca918
SHA1e05f96659eba1d34b0973725bb954b87491f0091
SHA256904827e5a11f15aa67d01a641d3a457cd83d925458305641ce5e46fcb074228b
SHA512a39c733ee0238963b2161fa06bdd480fa9b4c9fbd73bab6e73fccb5e42e591ff065941c091514f902f00b2c7861e7271faa53fd30d81be957fcfff725606da77
-
C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\vcRuntimeAdditional_x86\OSIRIS-7231.htm
Filesize8KB
MD5c4edcfc87f7756bf747707d94bff589b
SHA1cb38481573b0e62845a23e1dc02af7ab08693088
SHA2566e862ac77fdbc5cb7585c3224c8ff17beee7c2d1bebeb4c28a0abee29a07afc5
SHA512ac9fa51cde20dc850bc647d71c4656e031eb96cf8a8162b175f29b98838180898ed9a1aabf23c460b2b2769783b01625547ee7f3a574b6a497f9447ba7044260
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b62b0275b6e4cc9a50984caa26dc775b
SHA1f3b2cdbd6bbab48a3dcb7e2a8004cf75a7953d52
SHA2564bfb0bce61d664cbf9e0cfcf3e468c5f7d5c173428085a41a62b86dca4903043
SHA5128c00bfe240351e7fe671435a2048101b7db2d190d668c0a71062153176ea374fbab6f86061b2f64f11beb96345ef0d6dee3d57cd195186f82eac7a8307b9a9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504801c4cf3ef6ff9e2ec2f88032aab18
SHA1159d466612765fff9608149592f7c3bf30e0d4e2
SHA256137d6a8451b26c092699eeae8193d3dfbf53ad31771abaf5230f983120e73a71
SHA5122545d3bc209c409d79dddbb8c6b8f52535fdd9768abfdb64aaf565c63c57412aa732d5c4b0e0b254879acce1e96c8bc18b09e4de74a069937c8aee52a6055a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e60dde80acaa2009e82988fb22ce10
SHA1ac79a1b1170130f9b227d8983170413ccd0efc3e
SHA256800b13ae61d711eaa80277f27c3f436aaece233113d67be326a620138c9042ef
SHA512e8f9bf6f39960312ac0bb63e13f0f7a20728de1abd1f2622425ce180062394789e812345f2e698eb83da92dae28603ae2a4f0691158b3be2e9d0ae5d922dd99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0bb49407ba17c27608a30d3c257ed4c
SHA17d5945abd944f1d748b5f96dc535368cc3c4b607
SHA256c2eedb716c357e01137433069d39bde0612a10f14b6f6e899faac850bdb97efb
SHA512abafc3f4376cda9a7c81bd9fbf7e2a906e09627411fbe4c02ee8c5c3ea0e41009a700c6bd6307a0bcfa14dc20fa3a2f6896929991765febc846eb85e7c4c1a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e39cb6988e05c7e9ac1b225cc6e0002
SHA1ddac83ca3bc806fdf16b46352fc78e2036293eed
SHA256fab471abc9e5866cd66c8ed0c2ac63f6fe6993fb693eff8bc037200f4def4afb
SHA5122ac12ddc8636a0aea9f539472301a98b96c4cb584373b8b8ddf6fd8bff70c1d931b74aed6a24e1b52274a39b144f7f655d750b46953805d9e7124d7ab10cd548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b10dbeba5c4c55063603c1304efc86c
SHA12b65b1088730617c5e026efbbcec33146a2008ce
SHA25608b3d172eb72754829777997f127a7f6643a283ab2147f702f6d3dd8b4fbbd14
SHA512175b6c7087239c24df01eabc8fbe280a90f7044fa062006bf3cecdfe42ab81a6abf18d1f89875618312115add24d31b9d068b5525c2d6ec16542ef317f56dc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12e00e715ee1d8f0632911a8a3d7c1e
SHA1395cd6fb0fac88b25025839a96d8448610f7b1f3
SHA256616327d50b7cc75e08450ec4c9ecbf71bc70d89dc1865d49520cd93013a5ebba
SHA512c5fabc4bb1a36d1028f7af29bf317dc18a2eff040b2823deca3a9daa9580c9d2dc59b86dec0f2ae4b62ec54d42d1d4a83856d9e0807837d2b7a0322da21dc94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a46f5ef07821412d626bbb39b55ee33
SHA16fe3f540c461a92b92d712bc2411bec3a8d838e0
SHA2560c0999d81efea081401e334de079b8b437d768983663af707955c589b5ea7cde
SHA512c0fc72cbf01d6165a1e52a1bcc3d512d750cc4cb2618cfde58b4681f3d4735679471b58e31b779e2cf236766cba27eaa1be086a2385f005d7e2187346c10016b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7cc8cee83cb098f2f66918a551dd4c6
SHA14333177ba8090dd58090df61b2a7ef9cebe2e5a4
SHA256530cfeda61610f8a2de646ac0875d4cf25d6d6a4aaa5b751cf5a776fecd679bb
SHA512a1a1c12560f5326b09c38a81c44cf501d26a7b58889fc6df916db921860584561a688872f82026db45d12c4bca3d5a4321fbb93742c7fc8285bbc8bc2376cdeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9af91498b2b844ce18b34a4b1d05d44
SHA16c85a870c48fe6318029f2bd43f9aee148f56817
SHA2564ff35b157bdc1376a0a57539273a63798703b41cc5205a893fc72ea5707ebe10
SHA512459dd6f64a8e6652903fd42f9a1cc06e668fe51d60894473280c8fd82450859711aa82f02c3632ac6d1a99bfe81c29b26ddd0bf2c1d6dee859247ca77aca6553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856fdbd9fce9119f5a767fa269f4fb8d
SHA1e4237bac6343c501a0181db17b710871a8397afb
SHA256c2efb22249797032cf1017f8d2aac546c43fe6b4ace964f0751d81f98d61e50d
SHA5121fbda9af26a480ce0340d423fa837d9633225b0e20f1c1241964c090cf70d02a3acbf41aecf5338581dbef0fb7fe997a9cc10c304fa687509a54efb5d99aa551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bee56ea622ed38ac7e4d00dec3d88ec
SHA14ceffb3ed5727042a09ce2d71e1c3568800ebca5
SHA256f473a81f3f5a8577b1d4efe35ed3557487d79601ea169a3b68b2eb110d90572f
SHA5124b4302e62a80906306514c328ea6c7e796ed7c8ec7acbf3c4c40f107eb0e74ba8c17ef71f3887cffdcb255d94a80a5c2af06f9def79d29030fabaf820a5871dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f6dd8f8f9017f6a250f8cd5734717e
SHA1bb31204e5e9cd9bd7344047b5cb56af795e686c9
SHA256a9c9271841e9b2de5c1f669cf3ef0cfd3b0ad110cf432e455a9ae7aff095d262
SHA51205a016544f936cfa0dbe7d69a90b2e81830964e5bce4a7c380237cc3cabe838b63d6ed2efcfc93333fe992eae8e3431c21edb41facf2df50bcb756e1a71880c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f9dc66d1c072457964411ffb5037c0
SHA18a5f61c59ffdeb8775a7dd6d07e5eac7d361baae
SHA256863a059390cedf1a4b434daeb3dd8db34c1b00a01e4a1058f5db334b292c4161
SHA512ccf576a02d90df1dddf4bbb2468c1b51ed5ed91c4486d8a8477843ae149c03fd42b8d7036933779dcf64cb5f09092bcfd3818edeeddfd174008c233434e6bb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552501fe65bb79a3d8a51b7a636d0db14
SHA1e47721cc3e4709dbc6924e472fd70032053ec540
SHA256a01c33dec9ce2f930470c0e865417c6a711c36a9d9e0bd962c97083f0d19b509
SHA512f8b7782b87f4f3053f0cec58619b7955b32efddde1ed4669284fd51d1e9c968df8812cc4eded832715a2609092284b2b7e31ac545d5d296ceafd55b6a1bed1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55149493be4ad2be9bc65cde2ef25ca93
SHA16f73dc98bb803994649398462c84c44fd7013401
SHA2566ecf74812da7425dbb3391e7c64acb761264e12047b1d85c246bde8ca554f479
SHA512b26065690ead6c859bd0396f71acbf82d0a83affcb0fbcb7c25798fa3ef2b9f90ff35a7f06f60c19ff75c4a7ca830f58442a572eabc719756271fce2b967b692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559192adc50f232fa9a5bfe4d8774525c
SHA1248b7ccfa6683b61c6478e7d3248e38a0d642029
SHA2569db526620005f181945903b6440f3d3519d034673a14e6779e8f3250383ea04f
SHA512accaf45c912be53820fa0fb62efbc05a278871b55fa71424cf5b320c1e1d83ef3fd01dbac7afe13b821ddb93979eaa0d4bb75e8029f868e55c8f9e6f75b33055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da1d296c4c71b79a92bc6599010f070
SHA1e556cec3a982bfbe3e6729d6788d9a809e7e70ec
SHA256fecade2d9eeb404f7dfc454bac2aa79c04b8ac299ba542aaabebcb1c68179e46
SHA5123ac537ffeb2d748f003577c1b42e80117d145f3253d43f713a40fe3ee7b78855e5d8e56f84013f71641a15b44a2110fb676d746d1c473f9ca138d7267603e216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531acc6806173f5856d2fc1c8360d047e
SHA1ca7d6ddacbe119e22b4f77de6509811bf10b3820
SHA2560c9092ccf5ab5b0c93140c43ac5971ab69a2b762c82f0128fda298930a07f9d7
SHA5125e29065211dc56c74e1fcf66b6e6704f154f977d3093ba6fa98fb1a3d4e6766b0367804b3d8cf2c1d50909815ab5255f8f1580242cefeebb56b9c752443f47a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56b5bcfe68a6d2d632cec052fdca15c24
SHA12a7dc6c99991f73d90648804adf5098c8ba1b907
SHA25606994b3612692fc83b3c2c0ed3cf4eb1aab556e2efe9b646b5a34c1d3c50069c
SHA51297f9a2e5942e69830046fab4a997f7a991fa41aa8333614e3840c162eaea8be97ab2b4145435c391a811f00a32002b8c0b171b43d74509baaf8eaa1db6429f6d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
9.5MB
MD510fbc44866e0cefee78b8922924482af
SHA1d2a030a8f1942fd3254da0ae3b0a7e63589560c4
SHA256641626b7344b2dac9b329255d35b2a53dd8731183a9b3830691be04c070a65c4
SHA512f60cf6fc91885ec41b0449b105e5689aa4a1e3ca9d7e4966d4939e7d40d81c08b41e963496b84bbf8fc01ed24e0a09b5cecad4a3eb00ac4de15fa7e9f479e7b5
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
18KB
MD5f5fbd3d88fc67fa0298b94bf84d59656
SHA118e7edc38c1001b269c10244c75f2f81a4089b47
SHA256fd220aea1c6989fb0cdbe593c1a8710de1157e7da58e58958d938f390d86ebc3
SHA512b3eef24a0890c6bc0809a57342fcc5d5c746a66848833ca908f8a650266fc49b34d1efe844cb647aaeba81067ed22484a82831efdab8ecd8e7348f0d74c751cb
-
Filesize
23KB
MD53082264ae9026f3d860115c844f2dd0e
SHA1b14ed0712494c2b627123f9aec48b13fdd47a944
SHA25630f14286b8aa23b6f72f537dfc92c754e143c91ed3af186e003b90cc884a460c
SHA512ff72a781e32d3399767f489b4fafd5a729769b652cd8cdf13b44757aa7ebdbb5abe07cb93ccf0c65178a37d548f3c2be0753f6331ab5de280bb7852a7e2ebe8b
-
Filesize
20KB
MD513d1bd2ab8230ea402577f9c9439467b
SHA14a20d5fb8e409c211b47747d7a6382d853b125f6
SHA256ae973561323eceb2f660bcd6e46810a0e5a16a7cccb2452472de8d6b49566be7
SHA512cacba35ec56eda9d39a9c5ef60f6a5aef33fa48f492af237e41ec2bcfd551da3e088537163c226289c0f32ff3674b5916f181d2a7082a63213e2cfc5509f84a1
-
Filesize
72KB
MD5ad71a3a39d2b59c493f1158353228ab4
SHA1a27a4c87131769ba65963b08835b191745647a53
SHA25600c9037adfce0c649c02fe5ecfeb998f3a3e44ab637fca01efe5826d880a3f3a
SHA512eeb490576728a2cb8586e19aa4c4809d4dcf5bd999f47397cf86c6f54da486d6ad23366720ffdc3ccdb0c9c6371522e4992f0024cbdb5a1473d314fac136cedd
-
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Generic-f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194.exe
Filesize1.3MB
MD5b41fd5398fff081a8371dad6c3eb23ef
SHA1497c08f78215128ac60ba878b4393a21c6b3cdb4
SHA256f1b5cea52e738db88ecc79bfe309848392fb9d78be4827ddf0f3222280ce8194
SHA51280bda2e3473a7648c82096e0f10fa9880cf7205ab55178472677c686f16cf865749decaa558f430a84b6606014bac6b7e10f1cac1878f85ad911c21d1f44af50
-
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Shade.gen-903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414.exe
Filesize895KB
MD5bd473fe047a3962c718c2ecfb6b8c5ed
SHA10d2a9799cd68dc7663c431a303f9ca8981f21a6e
SHA256903874f34f196c071e5d5d45947d14d4055fe39f297f85199103e1ee99375414
SHA512cb64dc828d4ab8966773ad870896abbdd400ccc5e23fbff58942ac2978d01fe42591123b5df75d3e05094afd9d613ce43c26717285c6b762e987f08365e09a07
-
C:\Users\Admin\Desktop\00282\HEUR-Trojan-Ransom.Win32.Zerber.gen-c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7.exe
Filesize910KB
MD528e60ba64bfbf427c654670d38747ed1
SHA1eff9e1f10be3078e1d23cf38ee040437c8d1af96
SHA256c9cd071df9878030ac9273d81c8608c54ddcedd0258e8e556297206d26424cb7
SHA512fe58df5148b564fe5799dabed7ba163b303da066cedc7ae5dd7246f99542bf1f7b1afd8f8d082836f977d60ca418a0fa73fd63a1a21d8f39119e4d575dec2e92
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.MSIL.Cyclone.a-b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968.exe
Filesize332KB
MD50c09ee39aafb83911bd33bbb9383c601
SHA10c14056618d324ef682c52475a7589f1fbc5cc7e
SHA256b81c2be2f09d2a25011594b5d4e1ad2626070b8fe18eade90edce4b24ed91968
SHA512ec814bcb4edeebba1f8426cbb96e458d967914126d75bb97d13de097eeec6e5aa417e8e459bd7881f6356a4996aa4952cc19e4aee5f3a107589e519456a48d5d
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.NSIS.Onion.jrn-2fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1.exe
Filesize150KB
MD50b055d14e4257cefa03f3bd0fd68767e
SHA14541ec0db42b3389dc7d06cc980bfb58a2a78620
SHA2562fe3dc08b68486f6f6a8f8f2eb8892bd1f340d254d092dff7d6fadd863f32ec1
SHA5123266a117721451c69243442a0cb63ef380b78f150313f55ff268ba3f09bedfe91df4df53366f50e85cd8dff288c2dffc39e2b7057a6977437f0aa2258cdbdbe1
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.aerc-878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85.exe
Filesize316KB
MD52d9ecc1cf1ffe5b500e879dedf8e6306
SHA182238d1373b932123df4d0e0341756343ec6f496
SHA256878d67e8d1ca84b466420e8c5bcecb0beee739c0cbace827a2dab1f1429c6f85
SHA5122cb825c2d15361df955495e3fa8dff5df3567656a190fc8d12f14905ec4389f4018827f3b3950d5696ebc08dd4c0181b948c786de4c6a5cc06677f3a5f4bb3ae
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.bwd-314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d.exe
Filesize330KB
MD5ca49ec4b963e559fb3d0f20b61296e6a
SHA1611c195e3537c07e75cee9f03d770e47c41ccb9b
SHA256314faedeb271c13cdd9665a3391af87180668f9e3fc8c00ef5c0cc4ea5b8bd6d
SHA512290637404b61d08efe270e6364a6644dc7785a0d4a87a45251a7c81b21ff6e13332e8fa631f55ccec9fc4bf8ba76725cdcde9a97c573be6b6009d0700489d033
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.lsm-1a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03.exe
Filesize424KB
MD52588649d9bc703f44eeddb93e602eb36
SHA1b9d43d0a0d2ce69700ae17f2a5e1eae4d1df4609
SHA2561a0c3d07bde5f44928a98d5c3139455f9974ff348095b4bf3b2f4c9b23f1ae03
SHA5120f1965bba62345371156299ccdd9e74d9d76a1797a8a3fe22c48f6e807c426a20ff5e6a21782b261ee96fd3fe7e03bd361cecd8c58b9fe3972223b6d37e11ba6
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Bitman.nwj-e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85.exe
Filesize364KB
MD5cfb82364814c7a5f27197a425a4b32c3
SHA13a2ae5ea32862de1d891fdb9060ff25ca8ee26cb
SHA256e4b6e8818a14748e013434e722d2653096b44329e5604a6b81159a433cba8d85
SHA5128a096a3fd5b99ff9fe45092d4922d49641d8ab16bbf706ff58469fb65ae556c9de950c89dbca4e2e3db55c711fa27e1f4df1ab216b2cdf37f2e7c300c46fccd4
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.eawb-2ffde1f8c618f58127dc15cf16eebd67ca3faca642fa7370a4a208c12b96a756.exe
Filesize448KB
MD5922098c3be28f161154b4510fad07415
SHA17ab5b340d6d8587895cc4d72807c6d97f25e54e5
SHA2562ffde1f8c618f58127dc15cf16eebd67ca3faca642fa7370a4a208c12b96a756
SHA512450028c7fff69109a009b698a890bbd6aa76f726a3192425918f7474c2228f24e4b0c4fd15212611a8a1998f7ad49e226f7001cb49fae4b63442b464ad112b36
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.hluv-b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b.exe
Filesize164KB
MD54b72407b3f49dae393b0002a018975d1
SHA11af612663f7335eccc8e09a56a724fad222b6cfc
SHA256b11064fe9fb26716d0f4a4de4b838abe7e727007c36a37495592a0f46216d57b
SHA51299b490800da2b7d2ce36d4fffaa48d90bf629b7a60ee8a3256b28d9b4bb123f3eb28652bccfe311669374a7792aaf0f93ca982327153ad1527e760be3df6d068
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.ivbh-a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2.exe
Filesize458KB
MD58b348ba0c53ad66f6886d2e7eb1a9c8e
SHA166bd77bf72153961fab670c16254a21210efb2d9
SHA256a943200e2f0d2331ec6eaf7441e4971303fc8db20b745e11ec477d1e2e3372b2
SHA512519f759d38dca2535d01001d8dc67ab57448ffcb6ad762de746f8ea224cae6025ef9212b8ebab48427b17ba52ea6f73121c6351f6b70c8b92ec113dca20c5985
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Blocker.jxpk-3e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a.exe
Filesize450KB
MD58449191b85850e894e951f3d411367c8
SHA10568460a2e498898fba0c48ff5c7007494bfdf7c
SHA2563e4a1ac760fafb91eb7cbbb0c2ce2a5a308f03f7c506cf0c02866271dd4ea60a
SHA5123c9c0860ebd34078957a851a049f9dd0f1f291afe41e7ff69b4a9d92f017ad0a1505437dd3ff31833e5e8c95b8dcef904cab5e30fdc62d36890114dc3fdcd2d6
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Locky.xnv-aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696.exe
Filesize289KB
MD50fd4ffc4ce8793fa76f5673863aec035
SHA126207e60db481ac255dafc2c46a6bde10e06a772
SHA256aaa39db65718c8ea367740e2da1b0eafcd042c7b469fc244e3ebf5ba9244a696
SHA512afc255b4e6d0038dd27a531b25e4ea67bfa3130e3206a1345fb06ea5e7ce1073ef37314ac9933175c300520afa69a7fb7ea874fa6a441d91b13d7847e9bc34fc
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Shade.yn-a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17.exe
Filesize270KB
MD5d35d938cccbccb5b84a19d2271c97ae7
SHA10276b60e586452c60199bd605f45248dc5e7649c
SHA256a5eeba06ab0d94894a423582d05d0e10728dca46d618503e5ebaa5b911c9be17
SHA51288529244f3cd18e277c3bab5be6c7bc9d6bc9a6e7a22b115513312504ab9171f39596eeb070884cb28f28b32e2e13d445df93b08b1982a67857b0cb3231b3308
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.ezzq-6ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3.exe
Filesize261KB
MD5b65a73263102c6d13301d1d889897cea
SHA18d8386e9b37c46cdb65265ef130c15aa8f47c588
SHA2566ffc30be8c3d202eaee11f0961d752c9e7762f48f2ed3e2fd22d69f9e9b96ba3
SHA512dac1e3a0fbd951550f5f57ea6122492af8e24ecd2f6b28b12e28f5af33e086fa6cb387c375d54537da8070ad6ce3680a2ef64f4f72e70abb598c20b27c12bda9
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.faqb-4d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2.exe
Filesize412KB
MD55a44bcbba7850121be90c9a1bd1fe007
SHA10347a1c69fd430e405cf6ce533846ba622ec0a2b
SHA2564d29e02f7f74868e80eb23194417ddacd4f97ff393a316d1aacbeca0e67b80c2
SHA512ea654595b61e6b94a2da4b7b034881105e6f6089c58fc9e4b9e8cb62e33f3c7a338fb03a740456bc7b07def45c1306d45212f4ea3cede14809ad365d90f0db8b
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.gwu-e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3.exe
Filesize129KB
MD5f06f331393ceb572dccd09c0176fc6bf
SHA1f2a80d510673b57c7e8d909adeb895be4218e636
SHA256e54f555db8f72232d7c130104c6b8cc5b32887634e8e2da7158252e3c0caf6f3
SHA51293ee98666cfc0708ad013a118e1da37c37b1eacff638fd3091d7fd2de85dc77997a6a56f6bc0464ae99a20f2b3accf15668d7ce4b3c242eeccfca2f1726f0cfb
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.txu-be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5.exe
Filesize261KB
MD5002ef39cbf1caa457c817a48791143d4
SHA18fab13bdf289376ae82555cffeec3728e33566f2
SHA256be5011d393af2d125a1973732b9180430b9a4ab788f9ddd412fe05d693d390c5
SHA51230be80f663242fb994721d027616568403c67cadaac813dc7604adb0ee46e579d249f71954f1bf7bedfe13d235cf138408273340ebe8b06f12900a46025b9468
-
C:\Users\Admin\Desktop\00282\Trojan-Ransom.Win32.Zerber.uwb-9fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379.exe
Filesize343KB
MD5ef5e4fa9ad61c142620f3a48438e44d5
SHA15d8431fb3bf90a7150ed95d67ff73a7b405d960d
SHA2569fded7e2be6826dc2b92ab6d70369cf20bac613ad104ae7d3c72566f93530379
SHA512a104ca2e3c5aaa681e91366dd3c566a9d98d1c1ff4ed74383ec673c504d8549677e470190afe41635b6745f006902c50c8f9a958de51f470d24b086c8ac316df
-
Filesize
74KB
MD537325828d36d1568caf1e6a6d2b19f51
SHA1b2991e23948e0ceb2f50fdc4fbd3b52a0e624142
SHA25605bcb19eb25d9a99dd66ce20fcfb1b399273ee13cd38d9b9e92a6ed60822cb4c
SHA512867e80095f4e99d34222b3718ed5c26230d7a726c2aa9a356cc810c53902a2eda5180dba50a699662b11bfa2a59c033d39ccb1d3230afddf425ff36fbc123d91
-
Filesize
426KB
MD59410e11a3851fdd15865f86fc69181d1
SHA1c87125ccb16968071cdf757f407ce3c6fb95b46b
SHA256391817601c902237127ab96450022c3ad4d9776a28b2223542eca0415247b68c
SHA5124a6a06d2d2e0e7c059b38d4392a9be444a6cd4eb0502b1231c0b3ce1feb242af0b0f23340511c610cb880c7a0df2cdd7997b73cfe159d1b903c69d08382f134e
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
11KB
MD50ff2d70cfdc8095ea99ca2dabbec3cd7
SHA110c51496d37cecd0e8a503a5a9bb2329d9b38116
SHA256982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b
SHA512cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
69KB
MD53c565490d3f4f58777335551ed91cdd4
SHA113ff222a2d730817805dca32b227351f8dbca3a2
SHA256fa9cb897b88c0be18545a7938a5416440cb8a2a331249374e0785509dd5297b0
SHA512bf4f8b9bd754916887bef285adf6749672f61e2a21ef57059af99bdba82dc3c0575fc575142900c302f77f6e8f729d4b16146e7bfe70f1a2de81184cb4ead70a