Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00274.7z
Resource
win7-20240903-en
General
-
Target
RNSM00274.7z
-
Size
7.2MB
-
MD5
a110916d0a468ccda9c0b17572338215
-
SHA1
176443a15db6d58376f474183ff813c7420bb9b9
-
SHA256
1149ed9ea9f52479ac6b28f048afbea32353e7a5c28030a9b78a58d75a3e6609
-
SHA512
846a622fdc1db53dbb18243d094cfb2b4b0b82e7704d58a78a49586e80f989fea18ca439869ce894b2e177627dd6f9454aedf40e8d2c09ca5ef7addd5966ede1
-
SSDEEP
196608:wT3R+yaMNsXtYjkIkdltX0iKtxQ4UINKz6zZ+ur:w7YMNykkdltEfxX5NKM+4
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (533) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "2" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 776 netsh.exe -
Executes dropped EXE 30 IoCs
pid Process 1208 HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe 680 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 1484 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 2668 Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe 2016 Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe 792 Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe 760 Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe 2088 Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe 2496 Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 324 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe 852 HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe 2068 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 2036 Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe 2860 Trojan-Ransom.Win32.Locky.adyn-a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603.exe 1724 Trojan-Ransom.Win32.Locky.bil-05732ede48f8437b96291442446d5fd3972768a0f642c7626248c60ff92abd82.exe 2028 Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe 1656 Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe 1784 Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe 2572 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 2920 scvhost.exe 2236 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2152 HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe 2424 HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe 1560 Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe 1672 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 2052 securityscan.exe -
Loads dropped DLL 13 IoCs
pid Process 1484 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 680 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 324 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe 852 HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe 2068 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 1208 HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe 2068 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 792 Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe 792 Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe 792 Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe 792 Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\windows = "\"C:\\Program Files (x86)\\windows\\windows.exe\" -a /a" Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\idaqetrw = "\"C:\\Windows\\yzulacic.exe\"" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\cUhFZfEf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\builds.exe" Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\scvhost.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\MSBuild.exe" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\securityscan = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\log\\C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\log\\securityscan.exe" securityscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "\"C:\\Program Files (x86)\\windows\\windows.exe\" -a /a" Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: scvhost.exe File opened (read-only) \??\e: scvhost.exe File opened (read-only) \??\m: scvhost.exe File opened (read-only) \??\r: scvhost.exe File opened (read-only) \??\a: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\n: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\i: scvhost.exe File opened (read-only) \??\v: scvhost.exe File opened (read-only) \??\x: scvhost.exe File opened (read-only) \??\t: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\h: scvhost.exe File opened (read-only) \??\p: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\r: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\j: scvhost.exe File opened (read-only) \??\q: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\e: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\x: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\o: scvhost.exe File opened (read-only) \??\p: scvhost.exe File opened (read-only) \??\w: scvhost.exe File opened (read-only) \??\v: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\x: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\n: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\l: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\v: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\n: scvhost.exe File opened (read-only) \??\a: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\t: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\e: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\y: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\g: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\p: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\q: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\z: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\t: scvhost.exe File opened (read-only) \??\u: scvhost.exe File opened (read-only) \??\y: scvhost.exe File opened (read-only) \??\z: scvhost.exe File opened (read-only) \??\l: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\k: scvhost.exe File opened (read-only) \??\k: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\m: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\z: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\o: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\s: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\g: scvhost.exe File opened (read-only) \??\l: scvhost.exe File opened (read-only) \??\m: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\b: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\r: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\s: scvhost.exe File opened (read-only) \??\q: scvhost.exe File opened (read-only) \??\g: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\i: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\k: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\u: Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\o: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe File opened (read-only) \??\u: Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 530 icanhazip.com 547 ipecho.net -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a059-53.dat autoit_exe behavioral1/files/0x0005000000019d7b-50.dat autoit_exe behavioral1/memory/2016-75-0x00000000008C0000-0x00000000009B3000-memory.dmp autoit_exe behavioral1/files/0x000500000001a063-68.dat autoit_exe behavioral1/memory/2016-227-0x00000000008C0000-0x00000000009B3000-memory.dmp autoit_exe behavioral1/memory/1796-248-0x0000000000A30000-0x0000000000B5A000-memory.dmp autoit_exe behavioral1/memory/1796-244-0x0000000000A30000-0x0000000000B5A000-memory.dmp autoit_exe behavioral1/memory/2016-243-0x00000000008C0000-0x00000000009B3000-memory.dmp autoit_exe behavioral1/memory/2016-276-0x00000000008C0000-0x00000000009B3000-memory.dmp autoit_exe behavioral1/memory/1796-277-0x0000000000A30000-0x0000000000B5A000-memory.dmp autoit_exe behavioral1/memory/2172-329-0x0000000140000000-0x00000001405E8000-memory.dmp autoit_exe behavioral1/memory/1796-389-0x0000000000A30000-0x0000000000B5A000-memory.dmp autoit_exe behavioral1/memory/2052-424-0x0000000001240000-0x000000000136A000-memory.dmp autoit_exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2036 Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe 1856 svchost.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1656 set thread context of 1784 1656 Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe 55 PID 1484 set thread context of 2572 1484 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 56 PID 760 set thread context of 2448 760 Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe 60 PID 324 set thread context of 2236 324 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe 61 PID 680 set thread context of 2592 680 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 65 PID 1208 set thread context of 2152 1208 HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe 66 PID 2068 set thread context of 1672 2068 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 67 PID 852 set thread context of 2424 852 HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe 80 PID 2668 set thread context of 1560 2668 Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe 84 PID 1672 set thread context of 1552 1672 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 95 -
resource yara_rule behavioral1/files/0x0005000000019f47-51.dat upx behavioral1/memory/1796-79-0x0000000000A30000-0x0000000000B5A000-memory.dmp upx behavioral1/files/0x0005000000019f5e-52.dat upx behavioral1/memory/2016-75-0x00000000008C0000-0x00000000009B3000-memory.dmp upx behavioral1/memory/2572-129-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2572-136-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2572-204-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2572-203-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2016-227-0x00000000008C0000-0x00000000009B3000-memory.dmp upx behavioral1/memory/1796-248-0x0000000000A30000-0x0000000000B5A000-memory.dmp upx behavioral1/memory/1796-244-0x0000000000A30000-0x0000000000B5A000-memory.dmp upx behavioral1/memory/2016-243-0x00000000008C0000-0x00000000009B3000-memory.dmp upx behavioral1/memory/2572-252-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2572-251-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2016-276-0x00000000008C0000-0x00000000009B3000-memory.dmp upx behavioral1/memory/1796-277-0x0000000000A30000-0x0000000000B5A000-memory.dmp upx behavioral1/memory/2572-290-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2424-345-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2052-386-0x0000000001240000-0x000000000136A000-memory.dmp upx behavioral1/memory/1796-389-0x0000000000A30000-0x0000000000B5A000-memory.dmp upx behavioral1/memory/2424-407-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2052-424-0x0000000001240000-0x000000000136A000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\windows\windows.exe Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe File opened for modification C:\Program Files (x86)\windows\windows.exe Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\yzulacic.exe svchost.exe File created C:\Windows\yzulacic.exe svchost.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\scvhost.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HOSTNAME.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securityscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.adyn-a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00080000000194ff-48.dat nsis_installer_1 behavioral1/files/0x00080000000194ff-48.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2792 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2940 systeminfo.exe -
Modifies Control Panel 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FF5A3C1-A91C-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C516145-FEF4-44FA-8817-A61CA3B822E3}\WpadNetworkName = "Network 3" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\InfoPathChangeInstallLanguage = "No" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Shared\OfficeUILanguage = "1033" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\UISnapshot = 31003000330033000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\HelpLanguage = "1033" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages\1033 = "On" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\WordMailChangeInstallLanguage = "No" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0171000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C516145-FEF4-44FA-8817-A61CA3B822E3}\8e-ed-f9-c3-b4-fc svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\AccessChangeInstallLanguage = "No" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\LangTuneUp = "OfficeCompleted" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C516145-FEF4-44FA-8817-A61CA3B822E3}\WpadDecisionTime = 606dd5f1283ddb01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ed-f9-c3-b4-fc\WpadDecisionTime = a0ed80f9283ddb01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\HelpFallback = 30003b0031003000330033000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C516145-FEF4-44FA-8817-A61CA3B822E3} svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\UIFallback = 30003b0031003000330033000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\WebDesignerChangeInstallLanguage = "No" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\14.0\Common\LanguageResources svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\WordChangeInstallLanguage = "No" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\OutlookChangeInstallLanguage = "No" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ed-f9-c3-b4-fc\WpadDetectedUrl svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\PreviousInstallLanguage = "1033" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Shared svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0171000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ed-f9-c3-b4-fc\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PhishingFilter svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\WinXPLanguagePatch = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\PPTChangeInstallLanguage = "No" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows NT svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ed-f9-c3-b4-fc svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ed-f9-c3-b4-fc\WpadDecisionTime = 606dd5f1283ddb01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\InstallLanguage = "1033" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\SharePointDesignerChangeInstallLanguage = "No" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C516145-FEF4-44FA-8817-A61CA3B822E3}\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\XLChangeInstallLanguage = "No" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C516145-FEF4-44FA-8817-A61CA3B822E3}\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\ProjectChangeInstallLanguage = "No" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Office\14.0\Common\LanguageResources\OneNoteChangeInstallLanguage = "No" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ed-f9-c3-b4-fc\WpadDecisionReason = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" svchost.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\AppID\Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\毐e Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\毐e\RunAs = "Interactive User" Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\4§ Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\4§\Certificates Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\4§\CRLs Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\4§\CTLs Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\scvhost.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\Desktop\00274\winmgmts:\localhost\root\SecurityCenter2 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe File opened for modification C:\Users\Admin\Desktop\00274\winmgmts:\localhost\root\SecurityCenter2 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 20 IoCs
pid Process 1208 HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe 680 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 852 HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe 1484 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 2068 Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe 2668 Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2016 Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 792 Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe 2036 Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe 760 Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe 2860 Trojan-Ransom.Win32.Locky.adyn-a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603.exe 2088 Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe 1724 Trojan-Ransom.Win32.Locky.bil-05732ede48f8437b96291442446d5fd3972768a0f642c7626248c60ff92abd82.exe 2496 Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe 2028 Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 1656 Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe 324 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2572 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 2572 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2920 scvhost.exe 2172 taskmgr.exe 760 Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 2172 taskmgr.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 2172 taskmgr.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 1796 Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 2592 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1484 HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe 2036 Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe 2036 Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe 324 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe 680 HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe 1208 HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe 852 HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeRestorePrivilege 1644 7zFM.exe Token: 35 1644 7zFM.exe Token: SeSecurityPrivilege 1644 7zFM.exe Token: SeDebugPrivilege 2172 taskmgr.exe Token: SeDebugPrivilege 2448 MSBuild.exe Token: SeDebugPrivilege 2236 Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe Token: SeIncreaseQuotaPrivilege 2332 WMIC.exe Token: SeSecurityPrivilege 2332 WMIC.exe Token: SeTakeOwnershipPrivilege 2332 WMIC.exe Token: SeLoadDriverPrivilege 2332 WMIC.exe Token: SeSystemProfilePrivilege 2332 WMIC.exe Token: SeSystemtimePrivilege 2332 WMIC.exe Token: SeProfSingleProcessPrivilege 2332 WMIC.exe Token: SeIncBasePriorityPrivilege 2332 WMIC.exe Token: SeCreatePagefilePrivilege 2332 WMIC.exe Token: SeBackupPrivilege 2332 WMIC.exe Token: SeRestorePrivilege 2332 WMIC.exe Token: SeShutdownPrivilege 2332 WMIC.exe Token: SeDebugPrivilege 2332 WMIC.exe Token: SeSystemEnvironmentPrivilege 2332 WMIC.exe Token: SeRemoteShutdownPrivilege 2332 WMIC.exe Token: SeUndockPrivilege 2332 WMIC.exe Token: SeManageVolumePrivilege 2332 WMIC.exe Token: 33 2332 WMIC.exe Token: 34 2332 WMIC.exe Token: 35 2332 WMIC.exe Token: SeIncreaseQuotaPrivilege 2332 WMIC.exe Token: SeSecurityPrivilege 2332 WMIC.exe Token: SeTakeOwnershipPrivilege 2332 WMIC.exe Token: SeLoadDriverPrivilege 2332 WMIC.exe Token: SeSystemProfilePrivilege 2332 WMIC.exe Token: SeSystemtimePrivilege 2332 WMIC.exe Token: SeProfSingleProcessPrivilege 2332 WMIC.exe Token: SeIncBasePriorityPrivilege 2332 WMIC.exe Token: SeCreatePagefilePrivilege 2332 WMIC.exe Token: SeBackupPrivilege 2332 WMIC.exe Token: SeRestorePrivilege 2332 WMIC.exe Token: SeShutdownPrivilege 2332 WMIC.exe Token: SeDebugPrivilege 2332 WMIC.exe Token: SeSystemEnvironmentPrivilege 2332 WMIC.exe Token: SeRemoteShutdownPrivilege 2332 WMIC.exe Token: SeUndockPrivilege 2332 WMIC.exe Token: SeManageVolumePrivilege 2332 WMIC.exe Token: 33 2332 WMIC.exe Token: 34 2332 WMIC.exe Token: 35 2332 WMIC.exe Token: SeBackupPrivilege 2076 vssvc.exe Token: SeRestorePrivilege 2076 vssvc.exe Token: SeAuditPrivilege 2076 vssvc.exe Token: SeDebugPrivilege 2668 Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe Token: SeDebugPrivilege 204 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1644 7zFM.exe 1644 7zFM.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 2856 Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2880 Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe 2172 taskmgr.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2052 securityscan.exe 1560 Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe 1668 iexplore.exe 1668 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 1972 iexplore.exe 1972 iexplore.exe 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 1856 svchost.exe 1856 svchost.exe 1372 iexplore.exe 1372 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1208 2628 cmd.exe 35 PID 2628 wrote to memory of 1208 2628 cmd.exe 35 PID 2628 wrote to memory of 1208 2628 cmd.exe 35 PID 2628 wrote to memory of 1208 2628 cmd.exe 35 PID 2628 wrote to memory of 680 2628 cmd.exe 36 PID 2628 wrote to memory of 680 2628 cmd.exe 36 PID 2628 wrote to memory of 680 2628 cmd.exe 36 PID 2628 wrote to memory of 680 2628 cmd.exe 36 PID 2628 wrote to memory of 852 2628 cmd.exe 37 PID 2628 wrote to memory of 852 2628 cmd.exe 37 PID 2628 wrote to memory of 852 2628 cmd.exe 37 PID 2628 wrote to memory of 852 2628 cmd.exe 37 PID 2628 wrote to memory of 1484 2628 cmd.exe 38 PID 2628 wrote to memory of 1484 2628 cmd.exe 38 PID 2628 wrote to memory of 1484 2628 cmd.exe 38 PID 2628 wrote to memory of 1484 2628 cmd.exe 38 PID 2628 wrote to memory of 2068 2628 cmd.exe 39 PID 2628 wrote to memory of 2068 2628 cmd.exe 39 PID 2628 wrote to memory of 2068 2628 cmd.exe 39 PID 2628 wrote to memory of 2068 2628 cmd.exe 39 PID 2628 wrote to memory of 2668 2628 cmd.exe 40 PID 2628 wrote to memory of 2668 2628 cmd.exe 40 PID 2628 wrote to memory of 2668 2628 cmd.exe 40 PID 2628 wrote to memory of 2668 2628 cmd.exe 40 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2880 2628 cmd.exe 41 PID 2628 wrote to memory of 2016 2628 cmd.exe 42 PID 2628 wrote to memory of 2016 2628 cmd.exe 42 PID 2628 wrote to memory of 2016 2628 cmd.exe 42 PID 2628 wrote to memory of 2016 2628 cmd.exe 42 PID 2628 wrote to memory of 1796 2628 cmd.exe 43 PID 2628 wrote to memory of 1796 2628 cmd.exe 43 PID 2628 wrote to memory of 1796 2628 cmd.exe 43 PID 2628 wrote to memory of 1796 2628 cmd.exe 43 PID 2628 wrote to memory of 792 2628 cmd.exe 44 PID 2628 wrote to memory of 792 2628 cmd.exe 44 PID 2628 wrote to memory of 792 2628 cmd.exe 44 PID 2628 wrote to memory of 792 2628 cmd.exe 44 PID 2628 wrote to memory of 2036 2628 cmd.exe 45 PID 2628 wrote to memory of 2036 2628 cmd.exe 45 PID 2628 wrote to memory of 2036 2628 cmd.exe 45 PID 2628 wrote to memory of 2036 2628 cmd.exe 45 PID 2628 wrote to memory of 760 2628 cmd.exe 46 PID 2628 wrote to memory of 760 2628 cmd.exe 46 PID 2628 wrote to memory of 760 2628 cmd.exe 46 PID 2628 wrote to memory of 760 2628 cmd.exe 46 PID 2628 wrote to memory of 2860 2628 cmd.exe 47 PID 2628 wrote to memory of 2860 2628 cmd.exe 47 PID 2628 wrote to memory of 2860 2628 cmd.exe 47 PID 2628 wrote to memory of 2860 2628 cmd.exe 47 PID 2628 wrote to memory of 2088 2628 cmd.exe 48 PID 2628 wrote to memory of 2088 2628 cmd.exe 48 PID 2628 wrote to memory of 2088 2628 cmd.exe 48 PID 2628 wrote to memory of 2088 2628 cmd.exe 48 PID 2628 wrote to memory of 1724 2628 cmd.exe 49 PID 2628 wrote to memory of 1724 2628 cmd.exe 49 PID 2628 wrote to memory of 1724 2628 cmd.exe 49 PID 2628 wrote to memory of 1724 2628 cmd.exe 49 PID 2628 wrote to memory of 2496 2628 cmd.exe 50 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\TaskbarNoNotification = "1" Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00274.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1644
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exeHEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1208 -
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exeHEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exeHEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:680 -
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exeHEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exeHEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:852 -
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exeHEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exeHEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1484 -
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exeHEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exeTrojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2068 -
C:\Users\Admin\Desktop\00274\Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exeTrojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1552
-
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exeTrojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe"C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exeTrojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2880
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exeTrojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2016
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exeTrojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe2⤵
- UAC bypass
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall add allowedprogram program = STcONaURjstoJeQ(uMqeEfSfaGeNmho("yJmAEIBBXdvRXSFRGegUiJnA")) name = STcONaURjstoJeQ(uMqeEfSfaGeNmho("XQ0V1bwVGZ0FQZ==")) mode = ENABLE3⤵
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram program = STcONaURjstoJeQ(uMqeEfSfaGeNmho("yJmAEIBBXdvRXSFRGegUiJnA")) name = STcONaURjstoJeQ(uMqeEfSfaGeNmho("XQ0V1bwVGZ0FQZ==")) mode = ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\log\pass.exe all3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k systeminfo3⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k ipconfig3⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\ipconfig.exeipconfig4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2792
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\log\securityscan.exeC:\Users\Admin\AppData\Roaming\Microsoft\log\securityscan.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k HOSTNAME4⤵
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\HOSTNAME.EXEHOSTNAME5⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exeTrojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C echo. > "C:\Users\Admin\AppData\Roaming\scvhost.exe":Zone.Identifier3⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1080
-
-
C:\Users\Admin\AppData\Roaming\scvhost.exe"C:\Users\Admin\AppData\Roaming\scvhost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exeTrojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2036
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exeTrojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.adyn-a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603.exeTrojan-Ransom.Win32.Locky.adyn-a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2860
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exeTrojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2088 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys1CF3.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:584
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.bil-05732ede48f8437b96291442446d5fd3972768a0f642c7626248c60ff92abd82.exeTrojan-Ransom.Win32.Locky.bil-05732ede48f8437b96291442446d5fd3972768a0f642c7626248c60ff92abd82.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1724
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exeTrojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2496 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys38EB.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exeTrojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys96C3.tmp"3⤵PID:2884
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exeTrojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2856 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:209929 /prefetch:24⤵PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys6C0C.tmp"3⤵PID:2276
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exeTrojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1656 -
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exeTrojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exeTrojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:324 -
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exeTrojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2128
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2172 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2172 -s 5362⤵PID:2872
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious use of AdjustPrivilegeToken
PID:204 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 204 -s 4882⤵PID:1304
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1260
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:2184
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:2344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
7Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59fdb8323fb01c409ef5b7db050213d1f
SHA1216b94003e6d3a48851e86a35c5bd5218cacc9fe
SHA2561caf5761e6f587a6aa3b9d69b3dc50d8740d7fcc02c35b8f26564759a4e604f7
SHA51220bc6edb0a41f74472a22ac406ba8567a35e7afe4fcc6b16cac7201a41fb26bc5390f52d73e2f4af67ef3a2ca2a3c9d9c547dcfabdcd290bd7a0c395cef59aa5
-
Filesize
8KB
MD59bd39e1201d7d9c98f2f367a01205025
SHA1759fc27d0489d42b9f372e0712e92bcb877d160c
SHA256f3c08c262038f7bd8e8468da960b74ed8c5065cc1d972ed863e3c9bf5a094d22
SHA512d5ab554572a6ba2b943390883cf2b3454f2e27b253d7d9d94d6e788c945cb01870fbdc6b1866e252f6d4328db3ba0fd8da83282b299fa89a22b80e024e310a94
-
Filesize
7KB
MD5301efddfccfcf1e166a4935fee40c1df
SHA1a798bc331b8e5a3e15816b3f6c2b74de1c65ce2f
SHA25692cb54d9be6a94afce6cbb14434491b5917fee25dfa5f64b549be0a908eaad8a
SHA5128764b92971dc40cf5c9055dcec039b52e88adb716ad455249455e3bdebfd17cff2a9ae16c360db539d8dcb86e99a80c279114a76cb46cf03826e5baf9511e24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524732160053e5b5deacb1422a1a92028
SHA14dfae016d81974d5f0424234b811a7a022ce8a11
SHA256a1f3357cd0a01ff2a2c3486cd793e5db4724ef1a0816343cfac6b7ac5430073e
SHA5126e68d66ffa7b2f53e71999a9627e8714cfb6c9b3421bab509961023a4cca204e952ef15d31824755f204c594667d5d81f9d4c9d41e4dec4c54e838daa33c0ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62084f60577ea5ed2dd4ede83597bb2
SHA1fadf66b47ccf862019aa1d12b6647537bbbd11e5
SHA256f73862ce95c5484e9865d27ae519a80fcc9513cb9de432d60a843cf826317b33
SHA512cafa5e3784194572217ffcb2d363cad9bcc8521faba61f3a7337f9ca7f044f78227d78e281f4239d75155e4a5fc8f3366c9de7a79eb8d01c4073ac190237f0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5f52deadb1f48b1555f24bc1ba11a9
SHA1facfff2f2ae4793cbac8a547bd91b3718b026f99
SHA2565f025c7660900798b120f5acecbc569a1a0b04323bad2483f7a21aeba1dc2c96
SHA51206259c97cf290f4b330387a120ef6c1f5447a88944a9493b537904bc6a43646e55a0d2fb82dc9e902b2d873f2d1f8e50c6539963d8b65936ad0bf030ab2027ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e6373d989f4f9c6581cac4dccee233
SHA13a8db964dbc5a61e9224117631ef62ac5aea9438
SHA256ae8ed2ae996d2e27f04228513ea9a05679220c81fb088eba003d488430ab0cc5
SHA512e8dab4c0d455037ef24598ccc9403cd1d697a0779169456c8d6e3dbe4f61520397d1c3f8fdfe4f1f157b0ae203addf52601a7da9d1049c38e77713e71aa77b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8fb128dc026695d5107d3c29c41525
SHA172c0577662f81ffd19433a2011974001b33b17ea
SHA2561072676b46414b8a50740170c3d6a2b0afe04633e3f7d0ce0473325951d0f793
SHA5128bad24197895497c55df23f15c88342fd54026c9ed482f1efc14a37c637147e81e30aa3512043f1412b935e1a928f643bac42c10c0a80b97bd49b7af961b15e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18aa8b96f31a79c2ee9b1eef1904396
SHA15a14458e8305e1c9d0671ab87f4c35c90bf2fe2d
SHA256b11c9b13f5eaa7ceebd29155d2a057d8de0e8239dcbcebe344320ae22c1fcd2a
SHA512692a9b25892292997d4b03f83638869b3290a3aa977e56cfde309b8584dec9c8f7f3cc6aa80c7f48253ef8cb22df8874b9cdfdef559bf182dceed21eef114934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e49a670d8ed39f0922dfd8caf6c02c
SHA1c52ea43e44d50186972ed59180da4d204f12ddc3
SHA256a7a48784f8f0ebd2ebdc80d9ce16ef8635035e266fb289186357824119c0c4a5
SHA512657b7f45ed593989ba22be7d6b488f6d4ae898d463fdc54dd20111e4d84e387d5ad88f5422a403c6bd7e517a3245f6fd1374d77ac8bc9e3cb58788e14bc4aabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf78ed93645cdac2d5238da4e38584b
SHA1822cc0f4251237dcfe3d0b1af20dba06de91b0a6
SHA256b78a47bf12370678ae2672579c2dd54e006af3e83f039f4265fa91adad3342a4
SHA5126bbd9a5250cf6ba908c42ee05f573f100a3f93587883956141d490f4452844e94e0fdaff729561c6a74352c073c2de7b29fdb07fcc2eeb5dd6df2a300d7c6674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ec287debf7e79446aea65605c962e2
SHA1c88e4cd909688c383174aae2a9efb40565eee008
SHA2561f63dd768172707c1b5951fdcab89467d0a54d1493ec155d9d89bb957f6928e5
SHA512816ef5f4823cf6f0d2d363230a1e35aa39d15e6908d647bf991429725f4df59679e9998571302d4358eba46e505b7d042b1b654c4a5b6bcbb93710e12d6cbfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f286a0e2c5f5ab17b23f84b313cc7f
SHA1aaec81ade9be77eb1c0b79bd5446526479c2b8e4
SHA256a5f64a6551d288f6a4a42728a712ce818038ed9fbc123fd04d117caa4cee7090
SHA5127826475abc4d010b39020718e590ae5685070c37234f1ea58e8a4b629b6965961648d6e0a250d9d1c53140b4b42845329c84c2f7ac2cc1cf7b18af2538b10c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070b48d054c150886ac38323fcaa991e
SHA18074cfada4e55050e2f8d05309cc2d7114ab1693
SHA2569ae1c89a3997f8698b87825302fedaea4ad7e4a2e5a20a613539385e5c04a4e8
SHA512d0572ca9b054a1dc7b211f7eaa74305e0515dba83318eb9640f37af94ae72d9a660a26d851c7cbebd66d2929a7bd27793cc03644469b15b322592c0725d3b0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57966c35d05b4432c744f64c748c1f6e0
SHA1c82fd63e4f3bd42dc26ae7a11131fe1aa7cd257a
SHA256b2b69894c6fe136e37b4006efac89857d2412eaaa0cb9ebedf9c844fd222ec6c
SHA51275c921aacf708a07bf4b10dc45a0507ef5829bdf857075d945e101c24d457c2386743ec22e557df1ef156a6834d90353677d6dd5eeaf5a908bb68c1031d81536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d4e08fcc50d34a1821b1fcdfc657c7
SHA1497c7b0fcb3b46f02e38988db145d37ceaee25af
SHA256dad8481b2555fda6e87f7a5353b52b3e1b969c0969c39bf4d8ed6ff690385449
SHA51299ecad986d5284cabbe9ab28f6c388921647de46ed37c384fa725a241a13addba2491194aabbed8a4a663dd85d00bed57bef64d63abb1cab4924c4707d4e3643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a083170ed32ce6b4f12f57552a4cc4e
SHA171de3d314711397e8f6776d401925fa9d81faca0
SHA256a376d3c5436954d4d56ddb21f088f2f6799aec102fef8d04055eac9681076016
SHA512cd5b409a353becf20277d27dc0f679e49881762be8762f47777bda500fd06cc0653b79b0dc6bb6b0f62ca5f4bb9c3360d08c58777f7399618e30a6a374a52963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73dd0dbbb86a43096990548b8291bad
SHA1f07f98d4d1f52418324b98358ba3efb6a8776be4
SHA2561b0ec38800b558aefd7acfaeb46010766006ec014a10e0dbf06d65fae9782285
SHA512f68d56b6edc42268453a1a06e8538b8106163d04978b29cb344d77b76140d37c2345f2a5b6172750e31330652bcfef6b23c8c3f760ac23a99051385d8c59d707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf966d56b2c664ae23009406b40b423
SHA1f414b3770d10b22376635129e05666575bf7ae1f
SHA2563c54971eede36c5896ffa3fa39c8b9eed961e43a1cae013d818617cc530dfdd6
SHA512be82f3e65d722ff8bbbdb62f88e63f897fc60846582a25e19a415e7b08ee27018db63366f64dcb57f42a696f68b00d9fddfb25a723695cf959fb25779401b215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec11e83461f278603defed958dec2f64
SHA179d6cd80f317b6c8c9aace8f723ed8b6f0cb16f2
SHA256aed93f8271546ea75f96e6ef2edaa3a574e24b16ecbcc26e84d082bb07e7c3dd
SHA512f1d1ad95a7fd8467f667178e5a7b6dc40faa055870c1307946afab2605bf22fbf98bba3f27bc88811cd078a60cb7e873409a4fcc9da793ff4dec6e398887ac93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6402640c1191c3db3a0c29ccad2c05
SHA11285e427b24d3073e5f15b7be8760f46e4c03bb4
SHA2568d43c8f53b06ff59f679d018fe882860d4ccee08fce913648afb758c9e7faccb
SHA5127e3936eaa82c68c249357d592a713cd548db5a1097632d80e289ba75d0b18c4966aa1f06e9b3a16061db6e159cf06a475d017d2767b16f2401c5d98338ad8481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b083c6315accd291bb77cb200ac07579
SHA1cd8183319294c11ae25e095288a9f21d65c43518
SHA256c52eee26747aa209970476208af5b770dade182023e1339126fe38d832561f8f
SHA5122608de1bc7d75248b7178133986fd67f94f0d6b6180d84d8645c36ab3a505dbf966c116f0bf44649da3bf8bbaf9749a6da3aa3b36c1288a4ec320673ba556fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3aaa18e4b1c037b0332a5163f628ff
SHA138f34d851e6780a28ca9c772c4b2a6396adf2830
SHA2566ec7d465f2c79c28a07a5a85eb82d77c719ec80efaecf0eb988387b2be0fabcb
SHA512e56f185907dff3a90b187750822f82f7277aa092fb6c669da12da7e4e3051487bc7f95209907d7ad6de52026eb5db3f736643b2ce5ff164a9f108ed2584cb01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271e43778151049e0850780e5e2e134c
SHA18e17f915d1b31b783076d5f6537e1384d371b7b3
SHA2566b8226849c1bc165e529355180c509bcb3e1c74aa604eb9200f37eaf66c3ea44
SHA51213efcca2a4c5afc57eaa47067ec29d11d6a3ba15212ba7d6b5deef506cb8b07168605ef2e9a8417cd14fcff1512a0d95c6c477ee48857969dd3eb8bcef4fd575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1ac8aa3d2cec3464ef3ca67968a365
SHA1175afb5e13025c79f293e2357b24031582e479b8
SHA256adaf3a31229ddd0e21d1fc3555890b3978ca8209d6c6303d9977a34f72bb2d72
SHA5125bfaebe3412d0de00a58751b9b2ffc3ce4290827c952e1dbc61572d2b3512222986b22d8557a1afd1ddb7752c0dfb66c29498b6b34c4b42737feb0e71a884a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed35fb6672c8d6dbf336f129bb3246f
SHA1b9fa06e92cf90e3dc7d2c82d5063fdb54b9d02eb
SHA256f52b110da899e06e9d3b9d3fcaea7dd25ee94c6cd66d7bcf0e3788c2cff51ab2
SHA5125cb288018852c9541adb0c00e5579c917fae11f54ff346e5e064d90c1d22e3f069c469765f30d4bd087e8d475ff068d309e24b8e3efe224ef0d2f7e92ba72e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a4e87f92af3103e8eb10b12ce61fc9
SHA14d6b185c5e145ac68f4b637b0249cffb623a563e
SHA256538b67e07601ea8293b878851055673bfbe27546d744e13c0adbb9b9177130a5
SHA5121fd07516070fb0ebd0bde01742d1864d943b95eab2a3ebdea75062caef88ac89680ebdf6bf52209e452669776c33e27adc06b090fc90fcde9bfd96d65b771b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537c469cbff9fc83395b1f352d8168ee
SHA112f1f2697c5b2f0634830c9e988b30ba070ef168
SHA256df8657f5fb3ccd692b5523b232d7664afaee0bc9b5dde717eed3e7db9256df65
SHA51282ee5362db5d23c4cb2b65c69f0f3b0241eccc28c195e73584813925f266a9652a113641fd5ebab66a2b512c59d16d085db3e5f3f113ef8fa1a2cec4dad76ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595da3105cc6f80cb5c7f30d8cfd5328c
SHA1755a9b8e3f0f802e31cbc57c878aeae67b5a6405
SHA256ba6bca5643543d6d97eea2a9d415b31ddbdf68e6362c831e10f93f7e826993aa
SHA5126c41106750d17b44018140ae5f56763ea3fd0b265b1652a31dfdf211b545d37b9c1e5bc55b2568c9b25e38979cac4da9c2d98c02fef4e458b3e136e3efcf2d37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
344B
MD563245217712b0838f01cf5cb8ecdd22f
SHA1a020e319581a75fe0f2f29a7b02918a2a31454da
SHA2568a70ae07d90458a176a03d8a93141b2b1abf8e86319989a12c5fbbe0d5375308
SHA512eac97caf4db43ca46ef844a2211950517f5b401d2caac660400cad4a149da4d22b5bd4d39f517bd46df28ba6ce55660134ad67a9d472790a5c8a07ff54658ad7
-
Filesize
134B
MD544329131e9aa268cdb267566cd7f4d10
SHA13bcee735d90bf8d7cce2f0f4a1595a573af37fca
SHA2568e8808b03939d2b012829de26fda8e7765a5cde3a6713b84b80814f6457407ab
SHA512e55d0a4c8859290d72549627505100c3d27244c371b236a8737267ca48533cb8659b5826266295ccee5515aa64798efd42d12f0d876972297bc6cd5df0f44331
-
Filesize
57KB
MD56c639ef4071d1f57ac5e61fb37b8da47
SHA190c81420ee02e0138568c0ebda50dab1bd77b6b7
SHA25650aa3d61d8cd51460f18fec6787952a84acee24ca2eccf9bb56aff26dec473b7
SHA512672819e1745ebfcf23148d7555a791487f62dfa96a6badd7de4a40140e83b1b386f7a8bfe0ced86847272c486a97e0bbbaf569324bffcbc76563f2bcf80db7b3
-
Filesize
16KB
MD5b525a721c3add3a6940c26b589435af2
SHA1da74c26a04dc62e98bd7aebf236f23f6bc33d708
SHA2560cb52d8574f0e43b58b7de4c8d93a9201239f0787b875e4521b03afe99dd099e
SHA512b0ddb88a2e4faa6ffbf30d4650876cf180a2a252ea7c68622af78321d421907b1f26bcc3535acf0e71a9b6d8a2540b296a0f1812f33433632cc526326cb261e9
-
Filesize
3B
MD5bc949ea893a9384070c31f083ccefd26
SHA1cbb8391cb65c20e2c05a2f29211e55c49939c3db
SHA2566bdf66b5bf2a44e658bea2ee86695ab150a06e600bf67cd5cce245ad54962c61
SHA512e4288e71070485637ec5825f510a7daa7e75ef6c71a1b755f51e1b0f2e58e5066837f58408ea74d75db42c49372c6027d433a869904fc5efaf4876dfcfde1287
-
Filesize
3.4MB
MD508b150551ff447d17cab0dbf36f90824
SHA12387a5b74eb7e09b1e676b84767c2670d9f8ac70
SHA25609d17655721df6cc8a4c316892adaad14d3734a5ea420e77e8d235d4a375e7a9
SHA512c2a8f96bfa204de01d68e8272c8b38b71da57c6f224ae6384abf57b2d4841bf0d9a96790e19515b389c84fd386d8e455751835c901009e26f6e29a0205057911
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-5024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540.exe
Filesize282KB
MD57738a0f27bded4517bcc25882e5768b4
SHA1e5bd85329a7f0c521fde2a1bf9c18aef1f1504ac
SHA2565024dccc1cb6e30978d587ad4c3ee3154113b27663983d8bbdb706e976229540
SHA5127421838973e31e7534d91596a19e8975275f470302bc3033dfcf8c29b81fe9430aa323a29b120bc5a939ccddbf4ae5250e7529750786c0a151df8f6d81653d0c
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240.exe
Filesize283KB
MD5dadbfe5f8e4a4a1c6067f9c91fa6d016
SHA178c3d9f5a5d9dfd1b77792d5fe2463c2a83553a5
SHA256c4fb056a9eb12109f7a377213c32902ca108798719defd4bd295bdefa9fbc240
SHA512877b6b593f01acbb806baac95f395b713d51b2e37f7f6259e914b75f62443f92fb3e5fe27a0cf59fbc5f75c5c9b6a484ef4b52df179dc7f398250a357dda6a42
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Agent.gen-ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d.exe
Filesize915KB
MD5db0a7570b2a2207a4c6d029bc05d8db8
SHA1524a4634b20b47d6b73cc113e22d3100d3364f0f
SHA256ee2f6223a0b46ad565d4c9b3ca225ce83fc8e1a46d475d95311a183805c1414d
SHA512d2e1c34d5ed8fac01f8ec56dcac7989b8cb05c8b372934559494635a562b496ff25d64cf077cb2e73db176aaa094dd51c237104c371a5a57262bf4c4aee9920b
-
C:\Users\Admin\Desktop\00274\HEUR-Trojan-Ransom.Win32.Shade.gen-c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b.exe
Filesize901KB
MD572874c5e59c3cd643aae40345fbca151
SHA1bd4522426dc27e2ddbd03d030576495843c6f2c6
SHA256c7262483539c3e42d273411e1b94503d8503d35a66807064c5fddf1a7fe7be3b
SHA5123a0195567f4ce8d3aeca43910abdefc3dd7406561526ab741c4eed02d0272f39bf3e48d87e1d808609c504c557f0a8aebac0bba9716c8092fde6cc11be0d8366
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.NSIS.Agent.q-11a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641.exe
Filesize455KB
MD5cdba63494872f3879e507148e73d320e
SHA1265fbe4d18fc90f091202a9f5dc4c719f31b5275
SHA25611a151b4e7670bfaa8db4c28c3f9b4a3f1f779797f73b0f26add6119ff861641
SHA512bb458d4e592206dc446b0fad2b51e1e1017072a2d9ed5233c47bc49e861d5369d536bc55418ee18f64553439834d14dfb5ec7cc7fa1c932654628f5a984940d8
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.dvjn-6b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8.exe
Filesize1.3MB
MD52265683f75834da25862068cae6aa71a
SHA136ba88ee12bc9038488c0dc12d9d9bf806250fc3
SHA2566b8a26e7aa11204cf98ce438b6f49ea6cf201317335541ba2ac6af694154c3f8
SHA512f38e43739228ccdbeaae30008fde2bf68beb207d7b874cd9587bfeb7cdcbaef135ac5f7aae80b61dcd7cc71eb65d6aa18832858acf090f80bb79ad82254af379
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.jumk-f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db.exe
Filesize2.0MB
MD5af7b1fcc316f52cc6bf9cb7402993d6a
SHA15982d36b1ab8cc4f18f9cecc771a932b91bd0dd4
SHA256f361657dd1de5938387fd4da2b6141424f156609b658a61dc335267d3f3ed1db
SHA512aa9aeb7a9392ea8fdc269e4b91db24293a3024d2162b680e609c51c3762f292baff3ad06a4cc504412ee3f5ab600d87b4405e7081b0ba376a50d029e136f2650
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.juvg-a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b.exe
Filesize418KB
MD5de42251a1c948c6b718b07df66489814
SHA17446d7d3955143a58549eb52482ee75ccd0a94e0
SHA256a8d7884b1d96480b1c287722e519810bf50bc98df55ae015b2bb41453c97bb4b
SHA5124598dab7b414edeece308dc237315274df0a253f5f8f4e09e96024c3697b289457edb7090e76e1a411f5bde04e2420bc942c4de3434ea7701ceb9283f1abbc8a
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.jvgh-3bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac.exe
Filesize498KB
MD5e55a49272d877d411d0e20f5de6e8e85
SHA1364f5d0592742fc28a2ca0f49280fed77403cf5a
SHA2563bc76450f1a88747fafd55f9b7c9c2751deba8c5c45b36c796844d5562c512ac
SHA51222ca9933c2dc0b76b87c43cfbfbf4b53814ef0575315547feae323185ad454f3a4683379a132a80004a737afb219d0d064faa8260771a208bbdd73829337a234
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Blocker.jvig-eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600.exe
Filesize851KB
MD54e0a12ef1d6cf2f33e10a92d29c5c6fd
SHA1d205a7ddd5b861b88a114daf262ef69bb74b9878
SHA256eef6492ad91611a19d9d06b7daed99465d66cfbcdd7fd7fc3b8b617cfa545600
SHA51254e68e7d0b61a04c68ffb419ce51d2b6bb81ed7d718af8a5faf9c30d5207e10095414a8f1786adfae02ac7a2ab0c050a95f6d3d9b197c3df0d1183b430304f9c
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Foreign.nfhk-2339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1.exe
Filesize64KB
MD5488dba548544699549a7fab427578b17
SHA1bded95cd275ac0a3ad7413f4989520fe75b3f2d6
SHA2562339ef9524f93c7ef81bc4ea418870b24c9a7f4a9b864018086d910d691b3af1
SHA5121993b3b27cf4cce5a7a51154fe2ad9a40eb3d3a866f33c8259bde6c37e11e560d927b767df4ee35e3674c4262739d671c0a9f48a52aaaf030f167221f40d2f77
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Foreign.njar-406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894.exe
Filesize964KB
MD561ba6a925ae416f540b653833c489f1a
SHA1aca571e3cdb8074364cb42bb055e5019600cbb91
SHA256406fa10854c4b3ffde28943cb675c42483f085fdd7c4b57df38912daa6edb894
SHA51205d476cf1ccf783ea8efdba8af7431c9bac4a69ac6a3233251c231305a9f693b24463c2d8bbe26f348dbab4a36128fb0b5a64ea09acc4a8893a36972a7abd3ee
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.adyn-a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603.exe
Filesize171KB
MD584ec2e599c08163b086efc5c7eafc1dd
SHA192fb1e6afdbe4939ff50c9a09413b380a417283c
SHA256a971c1a0330a4946b8608f1f4ee8aab6b525578713f4114c215ed7df43e3c603
SHA512f606b656c49707a674b38d7e9e4d46e9e921947bf680b6ea0a3ece532022f153130e952dc4d09c5a25ce1255310aaff910d17399352be993b7c8f498d024d2f9
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.afku-0c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e.exe
Filesize207KB
MD52b29e228383b9f36c6b105e55d17150f
SHA15e1deeef29a0f84ec729b387d237d3c82ad37677
SHA2560c033099ab0236e2c7802c6c4c6b898ab54a1a71d61ab8a0764b8b05130e0f7e
SHA512b2b28ddcc0695dbf37331703d1d298d8f6ae5fd34bf072ff08817aa6ff34bbaec8c2f5f329efbe8b61d64c7eea78f2cf4aa36a17088f4d4518d5a8d680e2dc88
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.bil-05732ede48f8437b96291442446d5fd3972768a0f642c7626248c60ff92abd82.exe
Filesize244KB
MD559e33a1cadc5641b816d7efd74463bfa
SHA1f8c632314b74882419a7cfbbf45e2c7bc25eac33
SHA25605732ede48f8437b96291442446d5fd3972768a0f642c7626248c60ff92abd82
SHA512b8d353450c6773486f266d80e831c9964c0c2e425ab3fc622d4de44ea314d48e6efaca1c1fda5bba6626b46fa83d5e5c4705af28d66692c42d12169670662ba0
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.wts-3fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde.exe
Filesize443KB
MD5140ad81e232f2558bae64955668c6b64
SHA1c04b0406826f4d24b64cca686ec0e5f995eaf1ca
SHA2563fef7ab5964148ebca15a989fbe9988f8ec64a20274881a09345a620ac6eafde
SHA512a773f6cddcd5e904f3a609da3cd4367c710a9a972317fa95fa066634a51030f3e5d5d81effcc9c629dd2d3560007d6241d7844c299a1cbe7630cff64030f6fd7
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Locky.wwn-ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab.exe
Filesize366KB
MD53dd4ec867f9edb62fa4d223f24fa5a1a
SHA1af0e2b4c14e995d8eaea86a9bdc68baff3f84ec4
SHA256ec3712490cc9323c587af1a61bf5e20a395b7d048cd15dee008a14008ec34aab
SHA512bc9c9ea7c43f60d34bbddde1e273fbc8fb0699a3547487a1df9a5e58766592fb2272254c5799e20d129cf66d3430ff662a82495715adaf1174549dcc9bef0392
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Scatter.no-3c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b.exe
Filesize339KB
MD5baedfa6c150263fd8159ad10b692b8ac
SHA14dec05529698237148ef735f1894881e6065a1f8
SHA2563c53541ce7b68f2d0d5d05c5012655b6d6991a6b0837b643f9766b0b4bdb833b
SHA5129aa7c43a6f2b1977e740acaefb1250cbd60df642b8bc16bf36009ffaf7e3f32c094c42c46cc2cfd19b4e6802937e9f4c0f6cf153d2f00e38347bb0523f4d738d
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Scatter.oz-b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0.exe
Filesize241KB
MD52ca0a34a5d7d8474727032339c629bd7
SHA1c0f3f722a27f46c8cdf267cbeedcc7d1656cd19e
SHA256b1a6e3e0a665862d2bb0944ef36718502b9cf75c140a40895f7909df279870a0
SHA512ad35da9f0636258000cd51791f3730643d127c28740bc9a63751308e3e6e7326da16f037df1d4f8012944aa915d6725d86a59f3a0e9ca204a5ecc4f784eca6c2
-
C:\Users\Admin\Desktop\00274\Trojan-Ransom.Win32.Zerber.uzf-e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295.exe
Filesize343KB
MD516834f3fd826dbb5d134ce3bab29b62e
SHA1e1c5cbdcffa79ee3e39c2dbdd1c78a36f818df43
SHA256e1b93f0504948cb3bc5fb35e11476d0ec2062923c3121d142305485d67a81295
SHA5128b0b30c42360960d5a6e0edb2644ed9f271f4176e7ad1b51a82403ebea36df0130777f364afb920e0d39a2b41a196f106d013c18aa75abe0b9504a4f85b5fde3
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5fc3772787eb239ef4d0399680dcc4343
SHA1db2fa99ec967178cd8057a14a428a8439a961a73
SHA2569b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
SHA51279e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89
-
Filesize
112KB
MD53ba723c0e62d907e3026f9beb33bbdf6
SHA14c2a399eda56fce6e0f19b6e8eaeac3693ef9d15
SHA25641926648a91428b45b1e9f669476287f6cf05bdb74a773646c8fddb3de153b91
SHA5121a735ef2aac15f3bd75b501462cdfd13a4d717e3a532ab288a7c475f505c9819f71a53c57e8fcc72fb42092a00dede745b99764e1b5ff3c54f790957d57e3802