Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00285.7z
Resource
win7-20240708-en
General
-
Target
RNSM00285.7z
-
Size
4.4MB
-
MD5
0f3a44d5d6269a72d18e62de45e77381
-
SHA1
fc3681d29d62e37d26ff13697c764bf1612bb65b
-
SHA256
86c5188059a4fc949c9698c43e1a59229e0784c97fe70b46f3b49b2e96c107b0
-
SHA512
16e60bd278822ce6b78d711b96fe26c73b5920433eaa8b476685f2f24e803640fbdb2749b3cad887cce33a4e5fe00db938f8690594d63683c5635f66e107823b
-
SSDEEP
98304:J3M9IfbLlCUZnMRwQfEjGq7Hx7+RyvWwQORS5:Jc9IfbL4CMREjGkzQd5
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+xvjfp.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/C880A8F6AE72BE9A
http://b4youfred5485jgsa3453f.italazudda.com/C880A8F6AE72BE9A
http://5rport45vcdef345adfkksawe.bematvocal.at/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.onion/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.ONION/C880A8F6AE72BE9A
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dlefp.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/C880A8F6AE72BE9A
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/C880A8F6AE72BE9A
http://94375hfsjhbdfkj5wfg.aladadear.com/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.onion/C880A8F6AE72BE9A
http://fwgrhsao3aoml7ej.ONION/C880A8F6AE72BE9A
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+aspum.txt
http://t54ndnku456ngkwsudqer.wallymac.com/D3F9968D41E97A19
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/D3F9968D41E97A19
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/D3F9968D41E97A19
http://xlowfznrg4wf7dli.onion/D3F9968D41E97A19
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Gozi family
-
Modifies firewall policy service 3 TTPs 18 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging Process not Found -
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\RPC-EPMap Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Parameters Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo\0 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Type = "32" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSOut Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\Teredo Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\DeleteFlag = "1" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\DeleteFlag = "1" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSIn Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Type = "32" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\ErrorControl = "0" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Security Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Security Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\ErrorControl = "0" Process not Found -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (333) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\AppDataLow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\bifjrjsu\\rfbvgdbb.exe" explorer.exe -
Contacts a large (676) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\etadpug\ImagePath = "\"C:\\Program Files (x86)\\Google\\Desktop\\Install\\{1ee153ff-dd8a-6dfb-a01f-3ca78eb2dcd0}\\ \\...\\\u202eﯹ๛\\{1ee153ff-dd8a-6dfb-a01f-3ca78eb2dcd0}\\GoogleUpdate.exe\" <" Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe -
Executes dropped EXE 37 IoCs
pid Process 1728 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 1096 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 2060 Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe 2268 Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe 2588 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 2792 Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe 340 Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe 2780 Trojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exe 2712 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 2776 Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe 3040 Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe 676 UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe 2796 Trojan-Ransom.Win32.Zerber.ddcg-56cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177.exe 2556 Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe 1756 UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe 2240 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 1832 ebjcabfbdfbhj.exe 2336 Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe 816 UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe 2600 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 1784 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 2856 Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe 1176 Auxiprop.exe 2180 Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe 2980 Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe 2676 Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe 2832 wjhykdpjwqbg.exe 552 asgciacggweq.exe 2976 ciacggweqinc.exe 2476 Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe 1736 ijcwbnphmnik.exe 992 wjhykdpjwqbg.exe 1032 asgciacggweq.exe 2528 ciacggweqinc.exe 2640 oienn.exe 1144 ijcwbnphmnik.exe -
Loads dropped DLL 39 IoCs
pid Process 1728 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 2496 WerFault.exe 2496 WerFault.exe 3040 Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe 2196 WerFault.exe 2196 WerFault.exe 1096 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 1096 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 676 UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe 1756 UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe 1756 UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe 2556 Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe 1756 UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe 676 UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2496 WerFault.exe 2196 WerFault.exe 2832 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 2824 cmd.exe 2240 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 2516 mshta.exe 1684 Process not Found 1260 explorer.exe 3064 PING.EXE 2280 nslookup.exe 992 wjhykdpjwqbg.exe 1032 asgciacggweq.exe 1144 ijcwbnphmnik.exe 1696 Process not Found 2784 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\bitgnenodxtd = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ciacggweqinc.exe\"" ciacggweqinc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\12_23-dst = "C:\\Windows\\wjhykdpjwqbg.exe" wjhykdpjwqbg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\aroinics_svc = "C:\\Windows\\SYSTEM32\\CMD.EXE /C START C:\\Windows\\ijcwbnphmnik.exe" ijcwbnphmnik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{1ee153ff-dd8a-6dfb-a01f-3ca78eb2dcd0}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{1ee153ff-dd8a-6dfb-a01f-3ca78eb2dcd0}\\GoogleUpdate.exe\" >" Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\clicgsvc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Cmncrsrv\\Auxiprop.exe" Trojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\dvxrcbitgnen = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\asgciacggweq.exe\"" asgciacggweq.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini Process not Found File created \systemroot\assembly\GAC_32\Desktop.ini Process not Found -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpCB4B.bmp" HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 1728 set thread context of 2240 1728 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 51 PID 2588 set thread context of 1840 2588 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 53 PID 3040 set thread context of 2336 3040 Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe 55 PID 676 set thread context of 816 676 UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe 52 PID 1096 set thread context of 2600 1096 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 56 PID 1840 set thread context of 2816 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 57 PID 2712 set thread context of 1784 2712 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 59 PID 2556 set thread context of 2856 2556 Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe 63 PID 1176 set thread context of 1040 1176 Auxiprop.exe 82 PID 1040 set thread context of 1184 1040 svchost.exe 21 PID 2792 set thread context of 2180 2792 Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe 85 PID 2060 set thread context of 2980 2060 Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe 86 PID 2268 set thread context of 2676 2268 Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe 87 PID 340 set thread context of 2476 340 Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe 98 PID 2832 set thread context of 992 2832 wjhykdpjwqbg.exe 113 PID 552 set thread context of 1032 552 asgciacggweq.exe 114 PID 2976 set thread context of 2528 2976 ciacggweqinc.exe 115 PID 1736 set thread context of 1144 1736 ijcwbnphmnik.exe 123 -
resource yara_rule behavioral1/memory/2240-119-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2240-118-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2240-120-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2240-116-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2240-225-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2240-417-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2240-593-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\Recovery+dlefp.txt wjhykdpjwqbg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\settings.js ijcwbnphmnik.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-shadow.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Common Files\Services\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Defender\de-DE\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\Recovery+dlefp.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Recovery+xvjfp.txt asgciacggweq.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png asgciacggweq.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Recovery+xvjfp.txt asgciacggweq.exe File opened for modification C:\Program Files\Windows Defender\es-ES\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\Recovery+xvjfp.txt asgciacggweq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\Recovery+dlefp.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_flyout.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\Recovery+xvjfp.txt asgciacggweq.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Common Files\System\en-US\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Defender\es-ES\systemprofile\AppData\Local\Microsoft\Windows\Recovery+dlefp.html wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\Recovery+dlefp.html wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceDaYi.txt wjhykdpjwqbg.exe File opened for modification C:\Program Files\Java\jre7\lib\management\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\Recovery+dlefp.txt wjhykdpjwqbg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png asgciacggweq.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_SelectionSubpicture.png ijcwbnphmnik.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\Recovery+xvjfp.html asgciacggweq.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\Recovery+dlefp.html wjhykdpjwqbg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\Recovery+dlefp.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg wjhykdpjwqbg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Recovery+dlefp.html wjhykdpjwqbg.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\Recovery+dlefp.html wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\hint_over.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_hover.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\Recovery+dlefp.txt wjhykdpjwqbg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_ReCoVeRy_+aspum.html ijcwbnphmnik.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\Recovery+dlefp.html wjhykdpjwqbg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_ReCoVeRy_+aspum.txt ijcwbnphmnik.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Recovery+dlefp.txt wjhykdpjwqbg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_ReCoVeRy_+aspum.png ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\Recovery+dlefp.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\calendar.css wjhykdpjwqbg.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\29.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_windy.png ijcwbnphmnik.exe File opened for modification C:\Program Files\Windows Defender\en-US\systemprofile\AppData\Local\Microsoft\Windows\History\Recovery+xvjfp.png asgciacggweq.exe File opened for modification C:\Program Files\DVD Maker\es-ES\Recovery+dlefp.png wjhykdpjwqbg.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\Recovery+dlefp.txt wjhykdpjwqbg.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\ciacggweqinc.exe Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe File created C:\Windows\ijcwbnphmnik.exe Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe File opened for modification C:\Windows\win.ini UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe File opened for modification \??\c:\windows\ HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe File created C:\Windows\wjhykdpjwqbg.exe Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe File opened for modification C:\Windows\wjhykdpjwqbg.exe Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe File created C:\Windows\asgciacggweq.exe Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe File opened for modification C:\Windows\asgciacggweq.exe Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe File created C:\Windows\ciacggweqinc.exe Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe File opened for modification C:\Windows\ijcwbnphmnik.exe Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2496 2776 WerFault.exe 44 2196 2796 WerFault.exe 43 2832 1784 WerFault.exe 59 1256 1832 WerFault.exe 54 -
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asgciacggweq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebjcabfbdfbhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjhykdpjwqbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijcwbnphmnik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjhykdpjwqbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oienn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciacggweqinc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijcwbnphmnik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.ddcg-56cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Auxiprop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciacggweqinc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asgciacggweq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3064 PING.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00050000000195c7-67.dat nsis_installer_1 behavioral1/files/0x00050000000195c7-67.dat nsis_installer_2 behavioral1/files/0x00050000000195c8-73.dat nsis_installer_1 behavioral1/files/0x00050000000195c8-73.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2608 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 2656 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 asgciacggweq.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 asgciacggweq.exe -
NTFS ADS 19 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\fr-FR:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\de-DE:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\en-US:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{1ee153ff-dd8a-6dfb-a01f-3ca78eb2dcd0}\ \...\ﯹ๛\{1ee153ff-dd8a-6dfb-a01f-3ca78eb2dcd0}\@\:@ Process not Found -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3064 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 15 IoCs
pid Process 1728 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 1096 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 2060 Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe 2792 Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe 2268 Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe 340 Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe 2588 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 2780 Trojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exe 2712 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 2796 Trojan-Ransom.Win32.Zerber.ddcg-56cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177.exe 2776 Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe 2556 Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe 3040 Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe 1756 UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe 676 UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 2712 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2240 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 2016 taskmgr.exe 2016 taskmgr.exe 476 Process not Found 2016 taskmgr.exe 1176 Auxiprop.exe 2016 taskmgr.exe 1184 Explorer.EXE 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 1728 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe 3040 Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe 1096 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 2556 Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe 1176 Auxiprop.exe 1040 svchost.exe 2600 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe 2600 Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1144 ijcwbnphmnik.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2020 7zFM.exe Token: 35 2020 7zFM.exe Token: SeSecurityPrivilege 2020 7zFM.exe Token: SeDebugPrivilege 2016 taskmgr.exe Token: SeRestorePrivilege 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Token: SeDebugPrivilege 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Token: SeDebugPrivilege 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Token: SeRestorePrivilege 1840 Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe Token: SeShutdownPrivilege 2240 HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe Token: SeBackupPrivilege 476 Process not Found Token: SeRestorePrivilege 476 Process not Found Token: SeSecurityPrivilege 476 Process not Found Token: SeTakeOwnershipPrivilege 476 Process not Found Token: SeBackupPrivilege 476 Process not Found Token: SeRestorePrivilege 476 Process not Found Token: SeSecurityPrivilege 476 Process not Found Token: SeTakeOwnershipPrivilege 476 Process not Found Token: SeBackupPrivilege 476 Process not Found Token: SeRestorePrivilege 476 Process not Found Token: SeSecurityPrivilege 476 Process not Found Token: SeTakeOwnershipPrivilege 476 Process not Found Token: SeBackupPrivilege 476 Process not Found Token: SeRestorePrivilege 476 Process not Found Token: SeSecurityPrivilege 476 Process not Found Token: SeTakeOwnershipPrivilege 476 Process not Found Token: SeBackupPrivilege 476 Process not Found Token: SeRestorePrivilege 476 Process not Found Token: SeSecurityPrivilege 476 Process not Found Token: SeTakeOwnershipPrivilege 476 Process not Found Token: SeIncreaseQuotaPrivilege 2528 wmic.exe Token: SeSecurityPrivilege 2528 wmic.exe Token: SeTakeOwnershipPrivilege 2528 wmic.exe Token: SeLoadDriverPrivilege 2528 wmic.exe Token: SeSystemProfilePrivilege 2528 wmic.exe Token: SeSystemtimePrivilege 2528 wmic.exe Token: SeProfSingleProcessPrivilege 2528 wmic.exe Token: SeIncBasePriorityPrivilege 2528 wmic.exe Token: SeCreatePagefilePrivilege 2528 wmic.exe Token: SeBackupPrivilege 2528 wmic.exe Token: SeRestorePrivilege 2528 wmic.exe Token: SeShutdownPrivilege 2528 wmic.exe Token: SeDebugPrivilege 2528 wmic.exe Token: SeSystemEnvironmentPrivilege 2528 wmic.exe Token: SeRemoteShutdownPrivilege 2528 wmic.exe Token: SeUndockPrivilege 2528 wmic.exe Token: SeManageVolumePrivilege 2528 wmic.exe Token: 33 2528 wmic.exe Token: 34 2528 wmic.exe Token: 35 2528 wmic.exe Token: SeIncreaseQuotaPrivilege 2528 wmic.exe Token: SeSecurityPrivilege 2528 wmic.exe Token: SeTakeOwnershipPrivilege 2528 wmic.exe Token: SeLoadDriverPrivilege 2528 wmic.exe Token: SeSystemProfilePrivilege 2528 wmic.exe Token: SeSystemtimePrivilege 2528 wmic.exe Token: SeProfSingleProcessPrivilege 2528 wmic.exe Token: SeIncBasePriorityPrivilege 2528 wmic.exe Token: SeCreatePagefilePrivilege 2528 wmic.exe Token: SeBackupPrivilege 2528 wmic.exe Token: SeRestorePrivilege 2528 wmic.exe Token: SeShutdownPrivilege 2528 wmic.exe Token: SeDebugPrivilege 2528 wmic.exe Token: SeSystemEnvironmentPrivilege 2528 wmic.exe Token: SeRemoteShutdownPrivilege 2528 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2020 7zFM.exe 2020 7zFM.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 1184 Explorer.EXE 1184 Explorer.EXE 1184 Explorer.EXE 1184 Explorer.EXE 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2656 DllHost.exe 2016 taskmgr.exe 2656 DllHost.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 1184 Explorer.EXE 1184 Explorer.EXE 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 1184 Explorer.EXE 1184 Explorer.EXE 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 1184 Explorer.EXE 1184 Explorer.EXE 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe 2016 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2268 Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe 2060 Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe 2712 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 2792 Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe 2712 Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe 2832 wjhykdpjwqbg.exe 552 asgciacggweq.exe 2976 ciacggweqinc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1728 2536 cmd.exe 34 PID 2536 wrote to memory of 1728 2536 cmd.exe 34 PID 2536 wrote to memory of 1728 2536 cmd.exe 34 PID 2536 wrote to memory of 1728 2536 cmd.exe 34 PID 2536 wrote to memory of 1096 2536 cmd.exe 35 PID 2536 wrote to memory of 1096 2536 cmd.exe 35 PID 2536 wrote to memory of 1096 2536 cmd.exe 35 PID 2536 wrote to memory of 1096 2536 cmd.exe 35 PID 2536 wrote to memory of 2060 2536 cmd.exe 36 PID 2536 wrote to memory of 2060 2536 cmd.exe 36 PID 2536 wrote to memory of 2060 2536 cmd.exe 36 PID 2536 wrote to memory of 2060 2536 cmd.exe 36 PID 2536 wrote to memory of 2792 2536 cmd.exe 37 PID 2536 wrote to memory of 2792 2536 cmd.exe 37 PID 2536 wrote to memory of 2792 2536 cmd.exe 37 PID 2536 wrote to memory of 2792 2536 cmd.exe 37 PID 2536 wrote to memory of 2268 2536 cmd.exe 38 PID 2536 wrote to memory of 2268 2536 cmd.exe 38 PID 2536 wrote to memory of 2268 2536 cmd.exe 38 PID 2536 wrote to memory of 2268 2536 cmd.exe 38 PID 2536 wrote to memory of 340 2536 cmd.exe 39 PID 2536 wrote to memory of 340 2536 cmd.exe 39 PID 2536 wrote to memory of 340 2536 cmd.exe 39 PID 2536 wrote to memory of 340 2536 cmd.exe 39 PID 2536 wrote to memory of 2588 2536 cmd.exe 40 PID 2536 wrote to memory of 2588 2536 cmd.exe 40 PID 2536 wrote to memory of 2588 2536 cmd.exe 40 PID 2536 wrote to memory of 2588 2536 cmd.exe 40 PID 2536 wrote to memory of 2780 2536 cmd.exe 41 PID 2536 wrote to memory of 2780 2536 cmd.exe 41 PID 2536 wrote to memory of 2780 2536 cmd.exe 41 PID 2536 wrote to memory of 2780 2536 cmd.exe 41 PID 2536 wrote to memory of 2712 2536 cmd.exe 42 PID 2536 wrote to memory of 2712 2536 cmd.exe 42 PID 2536 wrote to memory of 2712 2536 cmd.exe 42 PID 2536 wrote to memory of 2712 2536 cmd.exe 42 PID 2536 wrote to memory of 2796 2536 cmd.exe 43 PID 2536 wrote to memory of 2796 2536 cmd.exe 43 PID 2536 wrote to memory of 2796 2536 cmd.exe 43 PID 2536 wrote to memory of 2796 2536 cmd.exe 43 PID 2536 wrote to memory of 2776 2536 cmd.exe 44 PID 2536 wrote to memory of 2776 2536 cmd.exe 44 PID 2536 wrote to memory of 2776 2536 cmd.exe 44 PID 2536 wrote to memory of 2776 2536 cmd.exe 44 PID 2536 wrote to memory of 2556 2536 cmd.exe 45 PID 2536 wrote to memory of 2556 2536 cmd.exe 45 PID 2536 wrote to memory of 2556 2536 cmd.exe 45 PID 2536 wrote to memory of 2556 2536 cmd.exe 45 PID 2536 wrote to memory of 3040 2536 cmd.exe 46 PID 2536 wrote to memory of 3040 2536 cmd.exe 46 PID 2536 wrote to memory of 3040 2536 cmd.exe 46 PID 2536 wrote to memory of 3040 2536 cmd.exe 46 PID 2536 wrote to memory of 1756 2536 cmd.exe 47 PID 2536 wrote to memory of 1756 2536 cmd.exe 47 PID 2536 wrote to memory of 1756 2536 cmd.exe 47 PID 2536 wrote to memory of 1756 2536 cmd.exe 47 PID 2536 wrote to memory of 676 2536 cmd.exe 48 PID 2536 wrote to memory of 676 2536 cmd.exe 48 PID 2536 wrote to memory of 676 2536 cmd.exe 48 PID 2536 wrote to memory of 676 2536 cmd.exe 48 PID 2776 wrote to memory of 2496 2776 Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe 49 PID 2776 wrote to memory of 2496 2776 Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe 49 PID 2776 wrote to memory of 2496 2776 Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe 49 PID 2776 wrote to memory of 2496 2776 Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe 49 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wjhykdpjwqbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" wjhykdpjwqbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ijcwbnphmnik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ijcwbnphmnik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System asgciacggweq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" asgciacggweq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ciacggweqinc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ciacggweqinc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1184 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00285.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2020
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\Desktop\00285\HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1728 -
C:\Users\Admin\Desktop\00285\HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_IFX82_README_.hta"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2516
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:1548
-
C:\Windows\system32\taskkill.exetaskkill /f /im "HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe"6⤵
- Kills process with taskkill
PID:2656
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- Loads dropped DLL
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3064
-
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exeTrojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1096 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exeTrojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2600 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Adds policy Run key to start application
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1260
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exeTrojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exeTrojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\asgciacggweq.exeC:\Windows\asgciacggweq.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Windows\asgciacggweq.exeC:\Windows\asgciacggweq.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- System policy modification
PID:1032 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:2208
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00285\TROJAN~2.EXE5⤵
- System Location Discovery: System Language Discovery
PID:300
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exeTrojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exeTrojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\wjhykdpjwqbg.exeC:\Windows\wjhykdpjwqbg.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Windows\wjhykdpjwqbg.exeC:\Windows\wjhykdpjwqbg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:992 -
C:\Users\Admin\Documents\oienn.exeC:\Users\Admin\Documents\oienn.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet8⤵
- Interacts with shadow copies
PID:2608
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00285\TROJAN~3.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exeTrojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exeTrojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\ciacggweqinc.exeC:\Windows\ciacggweqinc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\ciacggweqinc.exeC:\Windows\ciacggweqinc.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- System policy modification
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00285\TROJAN~4.EXE5⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exeTrojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:340 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exeTrojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\ijcwbnphmnik.exeC:\Windows\ijcwbnphmnik.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\ijcwbnphmnik.exeC:\Windows\ijcwbnphmnik.exe6⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- System policy modification
PID:1144 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:2832
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00285\TR382D~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exeTrojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2588 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe"C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe"4⤵
- Modifies security service
- Sets service image path in registry
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exeTrojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9676\CB3B.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Cmncrsrv\Auxiprop.exe" "C:\Users\Admin\Desktop\00285\TRBDC5~1.EXE""4⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\MICROS~1\Cmncrsrv\Auxiprop.exe" "C:\Users\Admin\Desktop\00285\TRBDC5~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Users\Admin\AppData\Roaming\MICROS~1\Cmncrsrv\Auxiprop.exe"C:\Users\Admin\AppData\Roaming\MICROS~1\Cmncrsrv\Auxiprop.exe" "C:\Users\Admin\Desktop\00285\TRBDC5~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1176 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1040
-
-
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exeTrojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exeC:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 1525⤵
- Loads dropped DLL
- Program crash
PID:2832
-
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.ddcg-56cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177.exeTrojan-Ransom.Win32.Zerber.ddcg-56cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1244⤵
- Loads dropped DLL
- Program crash
PID:2196
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exeTrojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 1244⤵
- Loads dropped DLL
- Program crash
PID:2496
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exeTrojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2556 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exeTrojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe4⤵
- Executes dropped EXE
PID:2856
-
-
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exeTrojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:3040 -
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exeTrojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe4⤵
- Executes dropped EXE
PID:2336
-
-
-
C:\Users\Admin\Desktop\00285\UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exeUDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\ebjcabfbdfbhj.exeC:\Users\Admin\AppData\Local\Temp\ebjcabfbdfbhj.exe 7^4^9^1^2^0^4^1^2^9^5 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⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732039868.txt bios get serialnumber5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732039868.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732039868.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732039868.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732039868.txt bios get version5⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 3685⤵
- Loads dropped DLL
- Program crash
PID:1256
-
-
-
-
C:\Users\Admin\Desktop\00285\UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exeUDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:676 -
C:\Users\Admin\Desktop\00285\UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exeUDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:816
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2016
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\847E.bi1"2⤵PID:1932
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵
- Loads dropped DLL
PID:2280
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\847E.bi1"2⤵PID:1936
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2656
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1744
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
9Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD57222db81d97be5efbfad3d9330c9d0e1
SHA1718f8b94f9b0da70bc32af10676938f17df4104e
SHA2561c7d4638b4819772afa9f477c71c8cc75ec7066c4181ccd548f3e90e6396e0c9
SHA5126eae831bf132f7bb868a3d3463fd873c3ddb3f394e9f011fbf10963995b5dd6b24c71ef5df3e3434afb7553e5599cc8b4fd7c31b75d69be57b995230c6f877f6
-
Filesize
67KB
MD5e9bf3949b62068099cc208ebab95d916
SHA1fc73ede0b5ad6f518094b8d1b463ef5453863c96
SHA256ff429fa4a549886ee203f843cc1f9b894f6b46d91882ece83db61e42196f33bf
SHA5123d981f7a46c8b7e96afc41fcc39e7d681ca425b1a6019819579810d4035f3d2cd1d603c254c9e279c7d0dcca905edf8bfafd41a40c18f4e9a2173607aac58e3a
-
Filesize
2KB
MD57f423eaa889b5f421c203b7b6725ff44
SHA15c917970743d7e664dc7ec570dc106bfcf3701b5
SHA256d72f8070970e6518576a499ab6922126cdbdf0ba75a59a7dbf0faad4c231e4c0
SHA51241c5c82e5f224f57d5a85c7b9172019936123cea21a795d7ce232082da550a6d346be6b3a2bfd796f0ccf2576272901cd80f06fe74488db8ba8813f816ae911d
-
Filesize
8KB
MD58163c69a270e4e96189e4869a9697209
SHA150b86f3785ad553827c32e4fbc4d7938fd604e3e
SHA25694d50db05f43f42e2e7d6663d4554656e3ef44d7fd172a3ccec4301f6904e2f0
SHA51269a19f43ca0266600f7171ead77cf7c8ee881fcc5751e0e29b3920933072b1748b036df9dce7141f544d63a1571d2024a828bca522964659cb6edf1a737ffd31
-
Filesize
68KB
MD569585de1153dbd5363754cb0c3ded477
SHA1c63711e3ffdfafa325a83fca11d1c2cb83f77f59
SHA25626c5ba3665987c8e8a35de67da6d057b299820d19a7fb252805f832779cf2a1d
SHA51216743d5d614bcf671a23dec5c5c6fd5a9bf84818f99d6fabd3999a2f312e3aded19850889760153c823645c2cb9a847dd364b731819c5c547e42bd38a1b9e2a5
-
Filesize
2KB
MD5c2c7919c2e042d0b50cfa091f33389fc
SHA1977f1a7163a83c0c64308c01bc9bb53c822ed2f8
SHA256b95a79cbefa2776e19f24964716778ddcfe962597d79ea4467f1aada7b759cde
SHA5126bbb80d032d3f80d5aaf2ebb355c93468bafb8744d4afeab50b5ebae2b687bcc21970c55959017ddecf836f0e4a99b652c1aaf306d14dbfe6b10f0cade455a99
-
Filesize
11KB
MD5de49e15073f98d7c8b523a879d15211b
SHA1af530bc62698472bb12809bf794ed09cc1f44a55
SHA256fc396d73551012b7eec5527e67d887d92821150b785341d84886c4a54c653933
SHA5120b5a28ffc7d1da997f8011f88d5c221f5eec419556aa4fd896d1ec301bc9d114daa8bbddbda0ff1e71040d12cf566f9e85e2eeda5f28d95cd0f5fc2849746cb6
-
Filesize
61KB
MD5692418cdb429e26b461fede2ace446b4
SHA1dfe6dc64bb52b851a4d3d0200417baf2b243d8f6
SHA256d1f9359c271ebb49698d2d15aae2c11c8d81a1e116688a27fc0128720c83dc24
SHA512122c73f420a5a8bb60eaf6a04fc57c1fa3230415252d7d452e1aa5f75acc8ff2e353f5c5569ae2dc447e4308a6c5819ae32b87675840eb73fa3f81b40980cdf0
-
Filesize
1KB
MD59a57d70c373f00e2952a822be483a3d3
SHA1dda1307da5bd51d65790b6a99ab6366e75df92d6
SHA256fc76045ee30af36012d9d7dda03fcf164e791e3d82ea3776a91d28c8067c87c0
SHA512b2a76141e39680bcfd2bfc7fde57146cddb9c7ae25e06636ffc677b9e4595331a6c296bb649809c26d5a9f7bb7176a1740e6e50d097105b69446943ef6671849
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD59c57ed95977c7ec8de0cc60308ff3f38
SHA123235d448c5bd7df0df52593527106520bc9f081
SHA25699f615da60183cb26895f5ea1662a58e347d7f07a54cc41c29091360626125f1
SHA512619ff483d8b977bb1fb98c137c041dfb936b5691b25b17728c4104427f266f0dadd62505e99ad466723a3ae4ffe19411aba68c2c30cb05774c1ff16aacf22082
-
Filesize
109KB
MD5b9bb9cfad9dcf12c368cd6d9b13aab65
SHA157a2a4533279e58bb0d14aa155ed37d6e80f4d85
SHA25609ce3a3bd6c70e7e4e82f62a228cd729af8507cec7cfec1b620e524fa0773572
SHA512521ece65b31ade8845cd456f362938b3c105c165af782173613b9579d28898757c11f4f659343236f97026e57437c94ab00d7870fa186029e7896abd4bb43f42
-
Filesize
173KB
MD577ef8cf92e4c4a9130c65c6fecc8d0b9
SHA1c6a2e20f51d2106684c5e9357bcdfcc2e834c43b
SHA256eee2c4ca3fa5164dd52925d309bd8c1950d3d67e156b78ee764cee32abe65bbf
SHA512808127a820618ae6a62a275479f61194445121a5f8b9c5ca0a2888e9df5722188732ff87934292ea088a34cc8a3b87825c131037cc464b47833de4a6d5edddc2
-
Filesize
344B
MD5b2593ad9a43809cf6aad3923c73d1a4f
SHA1468681556d186d5472c5e7a634d7c35260aac48f
SHA256e7c1aace32955a1a60dff160a9cea8319ef86c69e8df820e1bb06cce8ae58bc9
SHA512535779c654577f12ebe9ffb40aeab8c79be3addfae33614df6c6c417f4101f6cffbfe79de64a168051daaf3031fb16576176d0ef5cc19db86c6a95b27beb278e
-
Filesize
130B
MD56f0a9f565005dbe020c84902ff134642
SHA16c16b9c4abcbec2de19a3746d7fbf6075a1cc0df
SHA256205f5b31b1816593dded3a3d1c24a0993f2fe6950429067e87a762f603ceafba
SHA5124edcadc6bee25a4c22b60621302693cf656012169dc9a7334aa169894a1ce373bd56ef0947c2430e014fc8d7888496135d6686595405b0a42d9eaf63546e6f64
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
112B
MD52fdc227a488d8fa8e4cc0ef27440111b
SHA13a1b0f9b25701345815c6f4a0db646a1ff06eb77
SHA2568324eb1a7726c4766dc34d5269b1d4b137005b0c2f3ff094deeca739f9880c06
SHA512288d518bcadf82a0b6f4bd2b31b5e3c30ab0da380316a8bfc8390fe5ec255e4c8d615bba6fd007066e8f7423c90ec4bc4d8132c4620d3bd1515e8633b07c0808
-
Filesize
764KB
MD502f4478be48200a365d7ec28320a6cd6
SHA101ff2232d933be83a1e85d19692276c37719e1d6
SHA2563a1a70b94fae3c80b505e2bc9d86832ff9e2bb68f7d78bc77544e4bdd942afe7
SHA512e65ea616cc28327ba54fb6cd7b01ff59ff6461c4f3b7448c11167352fc9c1871d91737c9c1d90cf249c5259127c1291bd4b31fb6491f7e57e8ccf9f82c2cd69a
-
Filesize
126KB
MD58502136cbab8cfa9e25cca9e757ce2c4
SHA14554e9fc74c3be3baf6eb4e44baeb886694e4757
SHA256a6150805e2cc881e85069cd92cc3147fce4536c1e572b7778a40cdebfe9bf2bf
SHA51232cb48a50a55efa3f040c2fb581987b4ee5ea63fc65df7a740f04520caf18a85c7fbdefd57be5e53c325c549cd11388b56aabf6932f413b6665a0b54b779f87b
-
C:\Users\Admin\Desktop\00285\HEUR-Trojan-Ransom.Win32.Zerber.gen-0c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671.exe
Filesize230KB
MD5a124167b0fa642c42a842f0edbdff10f
SHA1ed476e488ffe81eed4e30cbd7794fc572c2d8d8f
SHA2560c5f8d77852b7c4799d8b7adf4c4f0d662673feb650e462cbeee169ca480e671
SHA512a8b5a070e2d9c51ba8159bc2d97b3a773b380b026c79d15778dbaad522697f93e1179c6c73c31726343f2d58f330af3b85fb53f1f3cb47886ae0df851f7db86b
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.NSIS.Xamyh.nla-a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297.exe
Filesize132KB
MD54b73a09f7fd3fdb130280681cea57c4d
SHA17d1600e7f58c4afb1d4f4caefca41aad451aa999
SHA256a53c8ed79302d9d4519836e40dca67883903c72ad0bd0dd79b2310a6c7a85297
SHA512dee54fb6fd5c1a52fc5088c690a3fa98d65c322fb59d3d0ea11e7547143bf5f01c886cb02dbfaf5a79672904903133ee667a8673e0a28d2f37ae814d09761070
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.jur-4d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920.exe
Filesize372KB
MD565f9ebbf47b56e35a66d18d0047693f5
SHA1041b180e6beacd2075d3fccdb3a2a989f1056dc3
SHA2564d9c22f0576b050911e87c81632c1d2f6d7b3ef0e753057f88798ff341cbb920
SHA512ee03722ddef6421cd340c2e5397d9038dc665ed783db26745af70d59ecaa8ee5fe6b4af6201a666b389febfb39c46182e3883dda63aba5fbdf5745bf614174c2
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.nws-38f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c.exe
Filesize608KB
MD5c4e2d16b8d9c5ecb546e5cff031f5c69
SHA11486c6cacc8d3603b328f49a18c5407b8160db95
SHA25638f69b2e04d20c9ab9d4c940586a3b25ec1332ff1d052d0db4f0dd36f78a4b2c
SHA51276d3f146a3c56b7f7ea9fe8eb79a40f9be6e5bee043f05332a9cb11fb7f44171bde598f22e2e3995ee5c4cb3ab342d353fabc42cd589c56fdb23f38c033c79d2
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.rub-4e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c.exe
Filesize376KB
MD512935dbd00f586ec0b646179af07c349
SHA188004449f0addf604c106400f85b661515c5d7fc
SHA2564e670f07a66337c99b358866f0d2a636e754c759b126440af5642e572ec9990c
SHA512a3a876ad992265aace84cf154223914609ec159fdbc3dbea28cf16f683bf99c852d3dc554faa1cd09ea6167bca936be57ea96ac3504848d1d9c9a89d6bfee5ab
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Bitman.rvk-75f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c.exe
Filesize335KB
MD54c9f52d4d20c30c3e226561c6aef9bb9
SHA147fb61e36de672ef6443e2aef4a25fc16802b77a
SHA25675f9104301deb632f82a5ec75508df9dbcc1bd4dbdede4ade22c894835a1cf0c
SHA51201f98a73035909fd344eec58f052c1b7e63220b6e517eb4347c126996ac5251522ce873a6d3e393687e80c9bcb239a0c90a8546f9434fd5dd689c7ed39275302
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Blocker.bwyj-058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee.exe
Filesize968KB
MD5e2de97987400de187133606f443bb930
SHA10f21c4baa5e0af53b6858168de677420b13b9252
SHA256058b61a9218105bc18a4668e1df0f3b161e62a10a7f07313d631d74bc23292ee
SHA51298d7ed1040ed4d7e103fb4f630e1ee64dc04fc32d3d3acdedddf27975679a83d4901a7d3593bbab523f0d64f8dfd1c74c12919de9752d514a3432ad67e41a7b7
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Foreign.nljr-072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d.exe
Filesize472KB
MD55c0cb264e22a4a0890421e09da40795d
SHA174c7ef4aacc18ee3f57154e5f872a1667eaa1531
SHA256072afe69091f85a2cda00fac06322d62b510b77713966244881ac78e82a9847d
SHA512ef56172e3b86705e2eb7c18fee68a292d8e97575dcbcff78edc2440fb5fefc9d17126d0dc01e4be7332f9a3f22601e0160ea58d9ebdfe61a5718cd3daa29b82e
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.SageCrypt.ahg-3ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230.exe
Filesize892KB
MD58517e92f416cd3878828fe15bda5303a
SHA1c927a86c38b04c581a3e30c65c5c4233eac20a9e
SHA2563ea6f8f2fbf2eb8935bbc0e34aefadc015b5b6e39947e9d86e7ac54f1a332230
SHA5121e472d81a81be14212277667b0709af36b0b70b41337162b0d740a726a240e4077c0db95aa7d4722d63372ddb024a109f64bc04f222704ef0e886af9884361bd
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.ddcg-56cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177.exe
Filesize528KB
MD5a7d135819fd5e6e1b3c876cdc1b68b7c
SHA199619c574bcf1dc7ebb6d4f9b7ae9f661f35275e
SHA25656cda1c31b0c4e081d3703dbfecfc802a19943ab817824e083c10228419dd177
SHA512a2941967cc1fd173fc27b86d76a27d3df4c2dcc6a6f183df3a5b1fbc9655d4350b7ed9620310a836201574ba610f2542600472f34ec56dde5d29d0dd6189f768
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.tbv-73aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4.exe
Filesize291KB
MD5b87c41de87a0c50cf3ed8e5d6b541eb1
SHA1ae8bed18fc3a8fd859f1d233e9c8e8457ef02d97
SHA25673aff729f855cbdb91663c15194de7d2dd262c79eec7bc40c9ea28dddb8996a4
SHA512ee7d9ceb955916561fc0ce7494921ac00c22fcdff7bd6366f0be0377c129144f9bc234c6076295dc778e59fb109477c9f331962d106ea63f0dfc026b54b73fbd
-
C:\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.wgh-f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54.exe
Filesize256KB
MD55b9b90e2d444bdc18843438de53dc072
SHA1899b51de267427b4ea739a796310db8881ae4ab3
SHA256f8986c6f8be4deb02a198a5527f97b5926926d54c6edd35cec23095df740cc54
SHA5129c94002b08ead69c27d1b78fea2281e8b59aba08dcc6d5fb8a68e949d6cde81bc9db6c3e808259e3966254b6061f82c5b8cfb0d949e0870de1be38d454b7c980
-
C:\Users\Admin\Desktop\00285\UDS-Trojan-Ransom.Win32.CryptXXX.sb-7187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b.exe
Filesize558KB
MD584cb3d3e380050624398e78ae3290af0
SHA1a35dea47cc2a3aa34cb95644eb24d5a076a6df4f
SHA2567187a58532fe3b97607c8b4a77003e132b72982b03840d54e7988a562e2b9e8b
SHA5123522ae2c4d4a8579a0408d9761d423fcf631b99239817d31326cf7adabc8e5bf455d22db246872635cdf013c0fedbd83f5b108f065109a2ca1da7b80180bef70
-
C:\Users\Admin\Desktop\00285\UDS-Trojan-Ransom.Win32.Zerber.a-272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585.exe
Filesize267KB
MD5489bc591f75c1eb2857a2bdbc6b38e1b
SHA1de2e47713208c592a4acf7cdd7018b3a16e5870f
SHA256272cb77c20e32c4f23d343be8ddbb7378d981e6ef557ea541656452d925ea585
SHA512df898fb782708284b95a21b6e4435795756b1cf00f549587c7b8e648385a701e9fcf713664c2c7be40f741f2a03bc6be047ee107b9947c6e6a9068b5d348aeb0
-
Filesize
71KB
MD5058d2f5ae38c404e635689186e5f17b1
SHA13a40fc2dbb38252567c15db4f62b74a8978cc56b
SHA2567570712035a77ac08a7e67749b309838d182d1508b5ef957086b01c774f064bd
SHA51286ac3e48387a97114712e5459c16c66f76954089692f1c4f0f3066d6d4f7ed04e763393b13a35db4acbefec5a415c0852801031be8ac84ab7edcbbd0f2cd372f
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5b8992e497d57001ddf100f9c397fcef5
SHA1e26ddf101a2ec5027975d2909306457c6f61cfbd
SHA25698bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
SHA5128823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
\Users\Admin\Desktop\00285\Trojan-Ransom.Win32.Zerber.dfhj-14a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469.exe
Filesize440KB
MD5749bbb8a528867d22dff43a0d1b7c519
SHA167bf768f035f00e8142cfb44072b97d07a9c7af2
SHA25614a4201d2cf744d3a2561141357f54b98105cf8ca1a41deb8f2d756e1ce4b469
SHA5122d43bdb31472421cf25a72ff9200de317c75e1aa99c399ce2e1b09565608443522117be2b4f6f5a5570c301d1c877b63ec04691e78231995b2b912c2996a0c0c