Analysis
-
max time kernel
242s -
max time network
243s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00271.7z
Resource
win7-20240903-en
General
-
Target
RNSM00271.7z
-
Size
5.4MB
-
MD5
8e22341d491446a519f87e7bd45e1890
-
SHA1
0314c9ebc7674b7853007cf70b7133062847d0ec
-
SHA256
2cccaf2d6e94c09a3479d42cb32152a83a007004a1fa87f6fe6f18aac1eb6d1d
-
SHA512
d062ed6fbc280bc9e479abfaf9ef92e40d885bc55274b9ef3382f0b297739cc1065a8b3e6b41ba347ca2ed12354b73522ff27fcbb3f2445ee25997fd3c2234ee
-
SSDEEP
98304:+xiSdzKbFSE3N3bmjiyxWDPNYqrdIP5k6CCRz/ff9oaTk:+xNKJSTqPNbyptRLff9D4
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+vkb.txt
http://rbtc23drs.7hdg13udd.com/722623D89ED7C29C
http://tsbfdsv.extr6mchf.com/722623D89ED7C29C
https://alcov44uvcwkrend.onion.to/722623D89ED7C29C
http://alcov44uvcwkrend.onion/722623D89ED7C29C
Extracted
C:\Users\Public\Pictures\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.onion.to/6221-9649-0738-0063-7196
http://cerberhhyed5frqa.onion.cab/6221-9649-0738-0063-7196
http://cerberhhyed5frqa.onion.nu/6221-9649-0738-0063-7196
http://cerberhhyed5frqa.onion.link/6221-9649-0738-0063-7196
http://cerberhhyed5frqa.tor2web.org/6221-9649-0738-0063-7196
http://cerberhhyed5frqa.onion/6221-9649-0738-0063-7196
Extracted
C:\Users\Public\Pictures\# DECRYPT MY FILES #.html
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Ctblocker family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" osfip.exe -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Contacts a large (16421) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 9 IoCs
pid Process 4084 bcdedit.exe 1992 bcdedit.exe 1704 bcdedit.exe 2092 bcdedit.exe 1640 bcdedit.exe 3452 bcdedit.exe 3564 bcdedit.exe 2120 bcdedit.exe 1256 bcdedit.exe -
Renames multiple (251) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" cacls.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components Explorer.EXE -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\International\Geo\Nation fxfcfub.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\cacls.lnk Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\cacls.lnk cacls.exe -
Executes dropped EXE 38 IoCs
pid Process 2044 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 1036 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2660 Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe 2920 Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe 2444 Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe 680 Trojan-Ransom.Win32.Locky.vy-02b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a.exe 2960 Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe 2992 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 2828 Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe 2956 VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe 1356 Trojan-Ransom.Win32.Locky.bil-6421e8233f7a1a4aa53e6525ecd65db197c68699ec7e930fb3cd7b0bb66d37dc.exe 2900 Trojan-Ransom.Win32.Locky.yr-2c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee.exe 1284 Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe 2976 Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe 3336 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 3652 cacls.exe 3792 mkjtr-a.exe 3856 osfip.exe 4020 FZur6532.exe 1832 ur6532.exe 964 cacls.exe 1560 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 1212 cacls.exe 1456 Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe 888 Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe 2684 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 2840 UrycCnar.exe 3116 osfip.exe 3432 UrycCnar.exe 1728 heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 3836 fxfcfub.exe 3640 Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe 2824 fxfcfub.exe 1340 cacls.exe 1788 cacls.exe 2672 fxfcfub.exe 2792 fxfcfub.exe -
Loads dropped DLL 27 IoCs
pid Process 1036 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 2992 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 2960 Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe 2044 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 2660 Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe 1284 Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe 2976 Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe 2976 Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe 2828 Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 3652 cacls.exe 2960 Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe 2960 Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe 4020 FZur6532.exe 4020 FZur6532.exe 3980 cmd.exe 1036 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 1692 cmd.exe 2044 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 1560 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 2840 UrycCnar.exe 2840 UrycCnar.exe 1560 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 3836 fxfcfub.exe 3940 cmd.exe 2672 fxfcfub.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 55 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.14.29.140 Destination IP 37.187.0.40 Destination IP 95.85.9.86 Destination IP 37.187.0.40 Destination IP 128.199.248.105 Destination IP 178.17.170.133 Destination IP 37.187.0.40 Destination IP 37.187.0.40 Destination IP 178.63.145.236 Destination IP 128.199.248.105 Destination IP 178.17.170.133 Destination IP 178.17.170.133 Destination IP 178.63.145.236 Destination IP 178.17.170.133 Destination IP 178.17.170.133 Destination IP 185.14.29.140 Destination IP 185.14.29.140 Destination IP 185.14.29.140 Destination IP 37.187.0.40 Destination IP 128.199.248.105 Destination IP 128.199.248.105 Destination IP 178.17.170.133 Destination IP 95.85.9.86 Destination IP 95.85.9.86 Destination IP 185.14.29.140 Destination IP 178.63.145.236 Destination IP 178.17.170.133 Destination IP 37.187.0.40 Destination IP 178.17.170.133 Destination IP 128.199.248.105 Destination IP 178.63.145.236 Destination IP 95.85.9.86 Destination IP 95.85.9.86 Destination IP 178.63.145.236 Destination IP 178.63.145.236 Destination IP 95.85.9.86 Destination IP 128.199.248.105 Destination IP 37.187.0.40 Destination IP 178.63.145.236 Destination IP 178.63.145.236 Destination IP 178.63.145.236 Destination IP 178.17.170.133 Destination IP 37.187.0.40 Destination IP 37.187.0.40 Destination IP 185.14.29.140 Destination IP 128.199.248.105 Destination IP 95.85.9.86 Destination IP 95.85.9.86 Destination IP 185.14.29.140 Destination IP 185.14.29.140 Destination IP 178.63.145.236 Destination IP 128.199.248.105 Destination IP 185.14.29.140 Destination IP 185.14.29.140 Destination IP 178.17.170.133 -
resource yara_rule behavioral1/files/0x0006000000016edb-62.dat vmprotect -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\cacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\cacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\osfip.exe = "C:\\Users\\Admin\\AppData\\Roaming\\aEBAaAxx\\osfip.exe" osfip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe = "C:\\Users\\Admin\\Desktop\\00271\\heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe" HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\cacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" cacls.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSEstl = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Essential\\msestl32.exe" Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\SG = "C:\\Users\\Admin\\AppData\\Roaming\\ur6532.exe" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Important Information = "mshta.exe \"C:\\Users\\Admin\\Important Information.hta\"" ur6532.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\cacls = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" cacls.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cacls.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 myexternalip.com 46 ipinfo.io -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum FZur6532.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 FZur6532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ur6532.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ur6532.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat fxfcfub.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-etzwsxg.bmp" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp1075.bmp" cacls.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 2444 set thread context of 2548 2444 Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe 51 PID 2444 set thread context of 1804 2444 Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe 52 PID 2992 set thread context of 3336 2992 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 53 PID 1036 set thread context of 1560 1036 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 72 PID 1284 set thread context of 1456 1284 Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe 85 PID 2660 set thread context of 888 2660 Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe 87 PID 2044 set thread context of 2684 2044 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 88 PID 3856 set thread context of 3116 3856 osfip.exe 99 PID 2840 set thread context of 3432 2840 UrycCnar.exe 105 PID 1560 set thread context of 1728 1560 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 106 PID 2920 set thread context of 3640 2920 Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe 113 PID 3836 set thread context of 2824 3836 fxfcfub.exe 115 PID 2672 set thread context of 2792 2672 fxfcfub.exe 145 -
resource yara_rule behavioral1/memory/3336-496-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/files/0x0005000000019479-558.dat upx behavioral1/memory/2960-555-0x0000000002A60000-0x0000000002AA9000-memory.dmp upx behavioral1/memory/4020-578-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/4020-577-0x0000000002AF0000-0x0000000002B39000-memory.dmp upx behavioral1/memory/3336-575-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1456-597-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1832-1019-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1456-1044-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1832-1108-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Windows Photo Viewer\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt explorer.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576_91n92.png mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\currency.css mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_hail.png mkjtr-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv mkjtr-a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\he.pak mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png mkjtr-a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png mkjtr-a.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.png mkjtr-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_MATTE2_PAL.wmv mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\how_recover+vkb.txt mkjtr-a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePageScript.JS fxfcfub.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\pt-BR.pak mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\service.js mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-full.png mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\DVD Maker\de-DE\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mouseover.png mkjtr-a.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw120.jpg explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv explorer.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\controllers.js mkjtr-a.exe File opened for modification C:\Program Files\Windows Journal\en-US\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\settings.js mkjtr-a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi explorer.exe File opened for modification C:\Program Files\Windows Portable Devices\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt explorer.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\common.js mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\AUTHORS.txt explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt explorer.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css mkjtr-a.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_right.png mkjtr-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\how_recover+vkb.html mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\how_recover+vkb.txt mkjtr-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\13.png mkjtr-a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1068 1804 WerFault.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 59 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.yr-2c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkjtr-a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osfip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UrycCnar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfcfub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FZur6532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ur6532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfcfub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfcfub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osfip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.vy-02b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfcfub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3828 cmd.exe 1692 cmd.exe 1764 PING.EXE 3204 cmd.exe 3352 cmd.exe 1076 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0006000000016de4-55.dat nsis_installer_1 behavioral1/files/0x0006000000016de4-55.dat nsis_installer_2 -
Office loads VBA resources, possible macro or embedded object present
-
Interacts with shadow copies 3 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3968 vssadmin.exe 3528 vssadmin.exe 1868 vssadmin.exe 1384 vssadmin.exe 1496 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 3924 taskkill.exe 2608 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop cacls.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\\cacls.exe\"" cacls.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f910952a3ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1E9B1D1-A91D-11EF-8E45-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1C5FD31-A91D-11EF-8E45-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main fxfcfub.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" fxfcfub.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ee598568653975c683335dc589e2576b88f9457b6568ee4b4e5fd651d12dbfa0000000000e8000000002000020000000c32467679c7a48332335dd1cc98155c4935f70aad4a0bbe1395feddfa84db9db2000000076cb88772a64f02969f5128efb28221a97ea5058f94d2abb76058d7860c2d44740000000deeba9367a73f66f3c461ac8b346ae0cd5b50316305bb99a7565d7c9564c9be81a2c619181c5670a2fe5f58ceb7db374dc8629eebd9e9c107ba5d426eabc0258 iexplore.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c8ac9d44-69ed-11ef-93bf-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00630038006100630039006400340034002d0036003900650064002d0031003100650066002d0039003300620066002d003800300036006500360066003600650036003900360033007d00000030002c007b00320034003400310035003300370065002d0036003900620036002d0031003100650066002d0062003700660030002d006500610037003700340037006400310031003700650036007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c8ac9d44-69ed-11ef-93bf-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2441537e-69b6-11ef-b7f0-ea7747d117e6} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c8ac9d44-69ed-11ef-93bf-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2441537e-69b6-11ef-b7f0-ea7747d117e6}\MaxCapacity = "2047" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2441537e-69b6-11ef-b7f0-ea7747d117e6}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f44471a0359723fa74489c55595fe6b30ee0000 taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 = 56003100000000007659a1b01600614542416141787800003e0008000400efbe76596fb07659a1b02a000000b7a4010000000500000000000000000000000000000061004500420041006100410078007800000018000000 taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\NodeSlot = "2" taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 4c00310000000000765972b01000303032373100380008000400efbe765957b0765972b02a000000a95d010000003400000000000000000000000000000030003000320037003100000014000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 7e0074001c004346534616003100000000007659a1b0122041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe2359ac297659a1b02a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000042000000 taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 mkjtr-a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 mkjtr-a.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Desktop\mshta.exe "C:\Users\Admin\Important Information.hta" ur6532.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1964 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1764 PING.EXE 1076 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3988 WINWORD.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 15 IoCs
pid Process 2044 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 1036 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 2660 Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2920 Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe 2828 Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe 2444 Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe 1356 Trojan-Ransom.Win32.Locky.bil-6421e8233f7a1a4aa53e6525ecd65db197c68699ec7e930fb3cd7b0bb66d37dc.exe 680 Trojan-Ransom.Win32.Locky.vy-02b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a.exe 2900 Trojan-Ransom.Win32.Locky.yr-2c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee.exe 2960 Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe 1284 Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe 2992 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 2976 Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe 2956 VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 2956 VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe 3336 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 3336 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 772 taskmgr.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe 4020 FZur6532.exe 4020 FZur6532.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2252 Explorer.EXE 2728 taskmgr.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2992 Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe 1036 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe 1284 Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe 2660 Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe 2044 HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe 2840 UrycCnar.exe 3836 fxfcfub.exe 2672 fxfcfub.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3792 mkjtr-a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2780 7zFM.exe Token: 35 2780 7zFM.exe Token: SeSecurityPrivilege 2780 7zFM.exe Token: SeDebugPrivilege 772 taskmgr.exe Token: SeDebugPrivilege 2976 Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe Token: SeDebugPrivilege 2888 Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe Token: SeDebugPrivilege 2828 Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe Token: SeDebugPrivilege 3652 cacls.exe Token: SeDebugPrivilege 3792 mkjtr-a.exe Token: SeDebugPrivilege 3924 taskkill.exe Token: SeDebugPrivilege 964 cacls.exe Token: SeDebugPrivilege 1212 cacls.exe Token: SeDebugPrivilege 1560 HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe Token: SeBackupPrivilege 4036 vssvc.exe Token: SeRestorePrivilege 4036 vssvc.exe Token: SeAuditPrivilege 4036 vssvc.exe Token: SeDebugPrivilege 3856 osfip.exe Token: SeDebugPrivilege 3116 osfip.exe Token: SeIncreaseQuotaPrivilege 2992 wmic.exe Token: SeSecurityPrivilege 2992 wmic.exe Token: SeTakeOwnershipPrivilege 2992 wmic.exe Token: SeLoadDriverPrivilege 2992 wmic.exe Token: SeSystemProfilePrivilege 2992 wmic.exe Token: SeSystemtimePrivilege 2992 wmic.exe Token: SeProfSingleProcessPrivilege 2992 wmic.exe Token: SeIncBasePriorityPrivilege 2992 wmic.exe Token: SeCreatePagefilePrivilege 2992 wmic.exe Token: SeBackupPrivilege 2992 wmic.exe Token: SeRestorePrivilege 2992 wmic.exe Token: SeShutdownPrivilege 2992 wmic.exe Token: SeDebugPrivilege 2992 wmic.exe Token: SeSystemEnvironmentPrivilege 2992 wmic.exe Token: SeRemoteShutdownPrivilege 2992 wmic.exe Token: SeUndockPrivilege 2992 wmic.exe Token: SeManageVolumePrivilege 2992 wmic.exe Token: 33 2992 wmic.exe Token: 34 2992 wmic.exe Token: 35 2992 wmic.exe Token: SeIncreaseQuotaPrivilege 2992 wmic.exe Token: SeSecurityPrivilege 2992 wmic.exe Token: SeTakeOwnershipPrivilege 2992 wmic.exe Token: SeLoadDriverPrivilege 2992 wmic.exe Token: SeSystemProfilePrivilege 2992 wmic.exe Token: SeSystemtimePrivilege 2992 wmic.exe Token: SeProfSingleProcessPrivilege 2992 wmic.exe Token: SeIncBasePriorityPrivilege 2992 wmic.exe Token: SeCreatePagefilePrivilege 2992 wmic.exe Token: SeBackupPrivilege 2992 wmic.exe Token: SeRestorePrivilege 2992 wmic.exe Token: SeShutdownPrivilege 2992 wmic.exe Token: SeDebugPrivilege 2992 wmic.exe Token: SeSystemEnvironmentPrivilege 2992 wmic.exe Token: SeRemoteShutdownPrivilege 2992 wmic.exe Token: SeUndockPrivilege 2992 wmic.exe Token: SeManageVolumePrivilege 2992 wmic.exe Token: 33 2992 wmic.exe Token: 34 2992 wmic.exe Token: 35 2992 wmic.exe Token: SeDebugPrivilege 1728 heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe Token: SeDebugPrivilege 3432 UrycCnar.exe Token: SeDebugPrivilege 2824 fxfcfub.exe Token: SeDebugPrivilege 1340 cacls.exe Token: SeShutdownPrivilege 2252 Explorer.EXE Token: SeDebugPrivilege 2824 fxfcfub.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2780 7zFM.exe 2780 7zFM.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 3988 WINWORD.EXE 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 772 taskmgr.exe 2252 Explorer.EXE 2252 Explorer.EXE 2252 Explorer.EXE 2252 Explorer.EXE -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 3988 WINWORD.EXE 3988 WINWORD.EXE 3988 WINWORD.EXE 3092 mshta.exe 3676 iexplore.exe 3676 iexplore.exe 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 2792 fxfcfub.exe 2792 fxfcfub.exe 2792 fxfcfub.exe 1040 iexplore.exe 1040 iexplore.exe 1040 iexplore.exe 1040 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 3896 iexplore.exe 3896 iexplore.exe 3720 IEXPLORE.EXE 3720 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 2252 Explorer.EXE 2252 Explorer.EXE 2252 Explorer.EXE 2252 Explorer.EXE -
Suspicious use of UnmapMainImage 8 IoCs
pid Process 2956 VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 2044 2024 cmd.exe 36 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 1036 2024 cmd.exe 37 PID 2024 wrote to memory of 2660 2024 cmd.exe 38 PID 2024 wrote to memory of 2660 2024 cmd.exe 38 PID 2024 wrote to memory of 2660 2024 cmd.exe 38 PID 2024 wrote to memory of 2660 2024 cmd.exe 38 PID 2024 wrote to memory of 2888 2024 cmd.exe 39 PID 2024 wrote to memory of 2888 2024 cmd.exe 39 PID 2024 wrote to memory of 2888 2024 cmd.exe 39 PID 2024 wrote to memory of 2888 2024 cmd.exe 39 PID 2024 wrote to memory of 2920 2024 cmd.exe 40 PID 2024 wrote to memory of 2920 2024 cmd.exe 40 PID 2024 wrote to memory of 2920 2024 cmd.exe 40 PID 2024 wrote to memory of 2920 2024 cmd.exe 40 PID 2024 wrote to memory of 2828 2024 cmd.exe 41 PID 2024 wrote to memory of 2828 2024 cmd.exe 41 PID 2024 wrote to memory of 2828 2024 cmd.exe 41 PID 2024 wrote to memory of 2828 2024 cmd.exe 41 PID 2024 wrote to memory of 2444 2024 cmd.exe 42 PID 2024 wrote to memory of 2444 2024 cmd.exe 42 PID 2024 wrote to memory of 2444 2024 cmd.exe 42 PID 2024 wrote to memory of 2444 2024 cmd.exe 42 PID 2024 wrote to memory of 1356 2024 cmd.exe 43 PID 2024 wrote to memory of 1356 2024 cmd.exe 43 PID 2024 wrote to memory of 1356 2024 cmd.exe 43 PID 2024 wrote to memory of 1356 2024 cmd.exe 43 PID 2024 wrote to memory of 680 2024 cmd.exe 44 PID 2024 wrote to memory of 680 2024 cmd.exe 44 PID 2024 wrote to memory of 680 2024 cmd.exe 44 PID 2024 wrote to memory of 680 2024 cmd.exe 44 PID 2024 wrote to memory of 2900 2024 cmd.exe 45 PID 2024 wrote to memory of 2900 2024 cmd.exe 45 PID 2024 wrote to memory of 2900 2024 cmd.exe 45 PID 2024 wrote to memory of 2900 2024 cmd.exe 45 PID 2024 wrote to memory of 2960 2024 cmd.exe 46 PID 2024 wrote to memory of 2960 2024 cmd.exe 46 PID 2024 wrote to memory of 2960 2024 cmd.exe 46 PID 2024 wrote to memory of 2960 2024 cmd.exe 46 PID 2024 wrote to memory of 1284 2024 cmd.exe 47 PID 2024 wrote to memory of 1284 2024 cmd.exe 47 PID 2024 wrote to memory of 1284 2024 cmd.exe 47 PID 2024 wrote to memory of 1284 2024 cmd.exe 47 PID 2024 wrote to memory of 2992 2024 cmd.exe 48 PID 2024 wrote to memory of 2992 2024 cmd.exe 48 PID 2024 wrote to memory of 2992 2024 cmd.exe 48 PID 2024 wrote to memory of 2992 2024 cmd.exe 48 PID 2024 wrote to memory of 2976 2024 cmd.exe 49 PID 2024 wrote to memory of 2976 2024 cmd.exe 49 PID 2024 wrote to memory of 2976 2024 cmd.exe 49 PID 2024 wrote to memory of 2976 2024 cmd.exe 49 PID 2024 wrote to memory of 2956 2024 cmd.exe 50 PID 2024 wrote to memory of 2956 2024 cmd.exe 50 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mkjtr-a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mkjtr-a.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies data under HKEY_USERS
- Suspicious use of UnmapMainImage
PID:608 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:3868
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}2⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1416
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}2⤵PID:2164
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3896 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}2⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:4084
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:3628
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1936
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1060
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00271.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2780
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:772
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\Desktop\00271\HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exeHEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2044 -
C:\Users\Admin\Desktop\00271\HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exeHEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Users\Admin\Desktop\00271\HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exeHEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1036 -
C:\Users\Admin\Desktop\00271\HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exeHEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Roaming\VFFeWltV\UrycCnar.exeC:\Users\Admin\AppData\Roaming\VFFeWltV\UrycCnar.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2840 -
C:\Users\Admin\AppData\Roaming\VFFeWltV\UrycCnar.exeC:\Users\Admin\AppData\Roaming\VFFeWltV\UrycCnar.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.exe/a /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\Desktop\00271\HEUR-T~2.EXE"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3204
-
-
C:\Users\Admin\Desktop\00271\heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe"C:\Users\Admin\Desktop\00271\heur-trojan-ransom.win32.shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exeTrojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2660 -
C:\Users\Admin\Desktop\00271\Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exeTrojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exeTrojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Users\Admin\AppData\Roaming\aEBAaAxx\osfip.exeC:\Users\Admin\AppData\Roaming\aEBAaAxx\osfip.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SysWOW64\cmd.exe/a /c netsh advfirewall firewall add rule name="aEBAaAxx" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\aEBAaAxx\osfip.exe"4⤵PID:2044
-
-
C:\Users\Admin\AppData\Roaming\aEBAaAxx\osfip.exe"C:\Users\Admin\AppData\Roaming\aEBAaAxx\osfip.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exe/a /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\Desktop\00271\TROJAN~2.EXE"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1692 -
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1764
-
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exeTrojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2920 -
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe"C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exeTrojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Users\Admin\AppData\Roaming\mkjtr-a.exeC:\Users\Admin\AppData\Roaming\mkjtr-a.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3792 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootems off4⤵
- Modifies boot configuration data using bcdedit
PID:4084
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} advancedoptions off4⤵
- Modifies boot configuration data using bcdedit
PID:1992
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} optionsedit off4⤵
- Modifies boot configuration data using bcdedit
PID:1704
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures4⤵
- Modifies boot configuration data using bcdedit
PID:2092
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} recoveryenabled off4⤵
- Modifies boot configuration data using bcdedit
PID:1640
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet4⤵
- Interacts with shadow copies
PID:3528
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txt4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.html4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3676 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3676 -s 20325⤵PID:1296
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet4⤵
- Interacts with shadow copies
PID:1868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\mkjtr-a.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00271\TROJAN~4.EXE3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3980 -
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exeTrojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2444 -
C:\Windows\SysWOW64\dllhost.exeC:\Windows\SysWOW64\dllhost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1496
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:2120
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1256
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 3284⤵
- Program crash
PID:1068
-
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Locky.bil-6421e8233f7a1a4aa53e6525ecd65db197c68699ec7e930fb3cd7b0bb66d37dc.exeTrojan-Ransom.Win32.Locky.bil-6421e8233f7a1a4aa53e6525ecd65db197c68699ec7e930fb3cd7b0bb66d37dc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1356
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Locky.vy-02b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a.exeTrojan-Ransom.Win32.Locky.vy-02b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:680
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Locky.yr-2c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee.exeTrojan-Ransom.Win32.Locky.yr-2c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2900
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exeTrojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2960 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\1337\Ñðîêè ñäà ÷è îò÷åòÃîñòè çà 2016.docx"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3988
-
-
C:\Users\Admin\AppData\Roaming\1337\FZur6532.exe"C:\Users\Admin\AppData\Roaming\1337\FZur6532.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4020 -
C:\Users\Admin\AppData\Roaming\ur6532.exe"C:\Users\Admin\AppData\Roaming\ur6532.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1832 -
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('WScript.Shell');setInterval(function(){try{o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\SG','C:\\Users\\Admin\\AppData\\Roaming\\ur6532.exe');}catch(e){}},10);"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2080
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "C:\Users\Admin\Important Information.hta"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3092
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Roaming\\ur6532.exe');close()}catch(e){}},10);"5⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Roaming\\1337\\FZur6532.exe');close()}catch(e){}},10);"4⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exeTrojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1284 -
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exeTrojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exeTrojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2992 -
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exeTrojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exeTrojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"3⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3968
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:3452
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:3564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:406530 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3720
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt4⤵PID:2108
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"4⤵PID:1540
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "cacls.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3352 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "cacls.exe"5⤵
- Kills process with taskkill
PID:2608
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1076
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3828 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
-
-
C:\Users\Admin\Desktop\00271\VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exeVHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2956
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
C:\Windows\system32\taskeng.exetaskeng.exe {AF5A9090-2025-49F0-BD16-787484546D95} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\fxfcfub.exeC:\Users\Admin\AppData\Local\Temp\fxfcfub.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\fxfcfub.exeC:\Users\Admin\AppData\Local\Temp\fxfcfub.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\fxfcfub.exe"C:\Users\Admin\AppData\Local\Temp\fxfcfub.exe" -u4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\fxfcfub.exe"C:\Users\Admin\AppData\Local\Temp\fxfcfub.exe" -u5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
-
-
-
C:\Windows\Explorer.EXE"C:\Windows\Explorer.EXE"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\cacls.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2728
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\Important Information.hta"2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2908
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\aEBAaAxx\# DECRYPT MY FILES #.txt2⤵PID:568
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5c41⤵PID:3880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
3File Deletion
3Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
5Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5fe21b6a3ca7fff53b894ed9b771d3a33
SHA1aeafd9ccffce589aeb3e285ee1bc7557ff48f685
SHA2567e2dd188421544c6ccf1c6c18ebd3f84e97c5b5a76db0e83a64c9a8a61422111
SHA5121010856c42ce447c9611db15718e7b7a5f462df80bdab5ff106584600d4727e9305e99b4fc8dd5a4d140400e2d685467916192a94da1506c838a1cc303f3d96b
-
Filesize
2KB
MD54654626574ee739c79f12b5331fef5c7
SHA1f943f250be3c06d5ca2b8f5827a49d47f2ec9ee3
SHA25644d65cb9275e21926d0228da16cd76c0d011e2e81a0f22ee1136daa5481fa6ba
SHA5126d1b36fc3f7632695c4d3087d5fb188fd56c249dc68381dfbebc1e05ce8565c1c4a28cc15f374f55619acbf8d01299f3f0fc18e1c678ee97d7ef46a264ecf2b0
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5898577c608e05c2f95a3d18b7ef2e917
SHA14a56541d181aafc1a2cd82e53a8491e7b5861a4c
SHA25634e8011a8f480513b3d582cbc63515e97dc63478b9b0ecefbdb51c5461f07446
SHA51297c90db6ac0d6d8cc418ab55a70c7d5856954e1ad4ed7e535ae3e9486e6adbe5d37d1f7adbdda5c68400b1ed35111faa2ababb7e8eff0c941b53b91198d5d413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a5bb1c6232dcb3bfb72db977004b98
SHA16c93afb034e384217c084af3484cc7aca068cf9e
SHA2569b5b07d081f598ee7a6c4e82bf9907def1d10189a82a94f2cb853ce7b65b5b47
SHA512693c561582ead232d2d3966d354333eebd8aa15bdeb9bc609b435cb3e26a7bc9449d9f799138d15732e025d8fa7782abbec00df39c9286d12c39943d8fa8f264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a950b17509049027dc3f888f8dc6da
SHA13c5f960ec93c2b2c646d2ff77161cc3ea2590a9b
SHA2563b50fc0c68860c9e7493a82a5b0f19a5f9edb35a635c5b9ef83075f545381233
SHA512d7ffec84f9a7f159f290c80cc7e390b595fa63a31402e536d29b8ae75837b6ed08560c3c97a5e3c132f17a07dae3a7a5001a066809fde2f9b0dcf6cb1179b731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a850394a4bafd63849ef58642bda951
SHA18881c1128c8cca42d0ca994bbd808d123e8787ea
SHA256d3c1f734be33564503e53e812897702578657a4e3a488c2b7beb994183801f5b
SHA512d99dcdcaeb70ae2c47aca9ed85df5f51103d5b2bb812f5377818caa3edc9b47c1a9d522b7c05255391cb3c8214b40990607da33ef311264de6315f5ab8c3f2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dacfa6fd9723fc4a1538646137b2192
SHA16712a28273c6a569d36001b05e6c5e40756bcfdf
SHA2564d478eba7c9e6f50907e28f709beaafd45383616c3b4f4ec420b11eeb0b817f2
SHA512c3d9bb72c2feabfc3484b326abb0b9f371bc3a705753fb181a85fce450db2a1e0f18ddd7bf65a58df5021998a6ad6306fef4279ebe994808d7effe09b2bc2179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba884eb4b60d1df8a4cc7a41e0dccba
SHA1912c3668548367955bd723982debe814c7c09f78
SHA256fcc51326e7cdaa33663321189e875f127992e7f5773ba71dedd6e2d9f68adf9a
SHA51298f7d7190c5250c7567ac991469e6085e9cf8927406ddc5d83b572b82740a65e76e5fb1883680fdcc520b1e16e253f66448fd280977b0b661052134ccd9b2eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd02ce0f4725089aadede0336dd0760
SHA146fca5a4e64d66028b16b890958c98c438838700
SHA25604131d398454d15a55b863f88b1577ed1dc2c17c306ea216d51c167049e23155
SHA512ab2a61f253965bfd2862cfb64037e7d876b495f0de0c5a2c6869cbdb9afbd7822fd398e3ebc22c6429054486e52e4f372f09300cb29e10be84a07918d6c532e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdffb9f521c909e95d3cb7c942f57fa
SHA13e13ec855d144dbc83ced3b85a12072673a189e1
SHA256d290b6249b242e473679f6a5abaf14c6d356fab4317e69224b414fe59d693c91
SHA512a47be15f6d34513fba2b6b4a9ee5a42ac6dbc23d09a3a332338e5481ef179dfec5c33c2464ef0e1d3ecaf2e35af2770960f484810897125362d19e69ef830724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57baa64edf15f6c47bdf9dc760180f5fa
SHA19c74a70a43a10e35e945dc8bbd7a3c13f43667d0
SHA256e074023feb9c5f57287905bd12f44154dbf3106547bf3390686207518e086c61
SHA5127a917821ef42f84c61eace7b1bad7d207fc10d72e93164905ed48ff55c98ad8a6d4bd92b82bc69f2723e984b5430c53207d852741561fd09c78535bc7728ea8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d45ff319f640312a0e82e1a3090856
SHA12a86ff15cf58e54289d1817141b24b4fe3de6ba0
SHA256d91fb97c9237b83ba9d561a669b0c80928986bfc618eada38e0d56bd54fb47fa
SHA5125f9e6c56c857246f4a94208e1fcf57c76f96a0cda7ef57d53d2176fdddedb3ffad16375931f565113bdfa427bcdcbb80814f5ca9745365a787af583a3727a9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d6892c7248532015a924633591d42e
SHA122e00cac6c2478d08f7cc91da1b57f1e154bb888
SHA2562d5dacdbdd99c89aa0fddf2c1f6439eb9f701d97e4947c26b7504eb031d227c6
SHA512bee3c6acae759956aaeb006a40e6207683a046868ad19bc87fc39dd3072a31a21658a50df8403bb70e4929707a169b1dc02cd52739d449ce086f1deda942121a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d394858f3c4b1e67cce6a4396549f9a
SHA1b842e48e3c3f327c29a2f461a2efc1081507c622
SHA256b9298f84774dcfc9fc23c04fe395fcc9efaf5b6b5344d2aa71a9f52cb3e135e5
SHA512259dc7d839c5563e0c1bcac9d1ee70080d818e01b55d99433f0d7e107759a14612d1f0ada61804c15e903e869e546447bca86dd4ab8217889c81b414d355c316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58babd01fe00fddda077a4ff7d00d2375
SHA1972315a60b4cce86bc7ef58bc3041ed38e276a18
SHA256e7c548647ff8d0e18a6584295143f4c3e17c32cfc293894046caccf359399fde
SHA512b79d76dcf9e62fba76dd7a9616da74ce685fbc4e45105a754a15eb7b80cf5e5b0cac9c25fa63cb636b20713e83c0ed99a0548e47d74a39bec844ad28f369b467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a70990546322cf04a4a7e6fcb7a3b9e7
SHA1d3a667104e2adfff5a4a6c87a7964ac7a20717c2
SHA256ba905384ced0c1d1d2ede73ed4348d1f4760960102988fb8aa116e3150797f03
SHA512e5f8ccda90dde640625fdd165331aac57011bdbcd03526be28357601081a35bdafb90799f30f443b525e9e9e8e0e487fece50c23ea25a5023c06a175ba198317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501374a2aaa9dea2532f05a77b63b97ba
SHA1214f03410a8233b9c5957a0e5e142f1937e7ebd4
SHA25608489d4ead8b343851350476e4587d0c1045ae5def0cd2d05f6f5edfe89da091
SHA51246d6f9702b8ae8d18846224937f9cec03e34ea9f2e7cd0eeb3aff1f2a19554ce012dd86e9b39d68d5d743ec8da27920548069c1a8844e1f8ab0b0f6e3281cdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d0fc690aea0849ce8ddc08a30537a2
SHA11071a99728b34c4a3c7be088bd8870f62a12f82d
SHA256615978a5387612aa4fcf0cfc985d6c0f38226b4b611814567a64bb552c9f49d4
SHA51295a84146292f7dd055c5474f96a65c1f155825a32131b391e453e3ba69f7f6ab84f40650768348eeaafda861344b1678fb28e69b7c9f4693131ce64f685a10cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527cae550a7a52ad9abc35329a8db6863
SHA12a5f085bd334d37f9685092890fad83f030093ec
SHA256cafbcf19b6eb29d082aebb27c98d0144b975d5cf68e6b840c4b130d5a5d6eebf
SHA512711f210b25b12c3471fbf6dd5fda6ebfed8194a2828007bbc0244458a4b116bfc3dec7b55b9b0615f3279cf36264714d9cc09a101c53b443e045d201f543fdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c93607cbe11b6323180791037c885d
SHA1d18e5e1599ccdb9484cd70237f58dbb499ab2cbb
SHA256f168cb4f0d9a1802000e132b0af867966b2becbe7dae71d7ce3b1eddb3b680a0
SHA5121a85a94e1f134f63241545cd5e6ad88b7bb3eef7c0a30cca0df4936b903d15ffe181a0dc433fd9e4e69aaf32b0017ccd619b848a71942950f3df122b2334e7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3175f5315b1a17cde45c829c8c41e3
SHA1c48750a44dd4cc11d561e16a94c76b8af7d02ee8
SHA256ac27c77d72412626706c74c1e4fdc7ae8a9b58f425b25cb036dc68130e7cfe3d
SHA5128ce722d6cf7b075e1abf2a3232d39099e83d745cb6e301840635fada569c79d2eeed61bd8f33d32785f74cc37e8daf73009fab7645ff0826083eeb4f755d8900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17174f1e97a71d84f366992a87be9e0
SHA1ecca74f03ca910bf88c4feaaa20f01ca8d697efb
SHA256d7cf9594ed4384bab19ebee531f33c55d99882af72c9b0018d6d21dafc831b9a
SHA5124e44cc74568da23a73a382a41b45ddcfaf9edd7e689a678b86a7bcfc8cad810e4f9064d71575ceb33f9630695963bc984f4a717a08376821b6b47e57cf07cc2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c141469d1c2d5658e5022a95533f0d
SHA15d69853da0d8dd82b393ab3d906626113df63ff6
SHA25644a02806ccee2c52e8158c44b3590175c3fdb3efb7751665e6cb9f717c80eb8d
SHA512e47133856ce43fa249f4a68801f00c5d7ecf887ee47e5a6b03c27a07cbbfe89deb3e00b63a00840e75604c28b3e3e03440072f10fefe0194a3728332b4fd211b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d900b1b9d011434671516b76cf662ff3
SHA12c5152730fa63ad36dc2629e83e69646abaceaac
SHA25699436e6612967c5d207712f7e1755d9bd772d25f543c9dc70436e206f974c020
SHA51248da124f9e7f88032deace66287e5ef78052ef098a93fe46084663c4c41cc4111f4120c09d2b5723c5401844132358855dca1e6867d396945b6fd4589d6a338a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d66d020060dc81f7523479fd13beb4c
SHA1b9b6a3cf9b344271a8be0732e1a349a8b6331c39
SHA25667740e742de9956994969ea3101b3883adc66990b5c38659d64486380a434ab2
SHA512824e1de07a1b0f92dd8b7f42eaeeab2114c34b1ffd7bee9a0e342d85fd2bf779e220e95b6e300d5eb93b971e339ab403d4d2ecfe7f43ee7251493b03f5ffac8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d42dfe1f006e79897e0d3a261721b70
SHA1e80fb825e4b120d5e64fda61b2d53ab1a7441be0
SHA256c933a06160b8814e686d3df4f14d686c073ca2b0f6a9d9b613ecf2755ebca095
SHA51232734a57bdf95f53aec7dcf48ace3c3920d16a9c9b974ae61cb94c400bae33be38f135d618aed3addd849033bd164c564a1ae66acaa10a82cd74a9d56b249fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56ea904cca157f163e4ea18258061b3b1
SHA1199e47b8782de00c0750f3fe3eb6f31ea064acf8
SHA256ca722d6c3fd51abb590fb4c057c8bd2eee7a9a84006ac7dd7b0f1d40b640decc
SHA5128087f06cb74671e57bfd22105887ea406127247fd91efbfe90ff9354e633a110a83657426e4b9572aa2e5a35221fdec28c48860d62521477b10d777f7ed1bd76
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
114KB
MD56c8a1b23bf5eb35318153da762d9021d
SHA1038dd5f01e9172988e4a4a7cac49f763ee117635
SHA2568b791242e24a292d9b3d038ce37ac27f865d6d3ed9a2a70c366b42da2df7e0ef
SHA512c442715f124fcd1f8c4d455c7d5c5fa9a063d76b929f8a7395b8597f2071d64db9ca1efb283ba5570c44da69ef37edfca592b84eb30909265102307834317360
-
Filesize
20KB
MD5709145b92ccce15d0b6d92e62046c235
SHA1e8413da827e6919376dadccad32ec695fe232cba
SHA256af7a6f85fd1a47a478c3d1a02125d7229abc803b1f8cf37aa402ee750211ab8f
SHA51251de9a370b482bb5c39fe81841ac348642703db22cd2b7056d29b3c691ef44de16a6504d822d0f6ba77a6389a51613baa546f71c9ba2c2e1113efbf5f9f02218
-
Filesize
46KB
MD59c4ce119f43fa4a8f3613e17b8141a90
SHA153c1ccb476a6908dae6ac4b9843ab0227759526c
SHA256844a259a700609ac5b711726db9dc90e18e374c07eaabad115a093f6743051a1
SHA5123d1e96d41ff6cff53b2a8d50f94e42a4b5c454b8b4e740c87d69ad693430eaf1f651f808d1c75258392bededf2114caa7f03a170eb5e6877cc055ebdb21aa0d1
-
Filesize
17KB
MD5094fd5646b9a684d99ccaa2f1002991f
SHA17977cf42cd684069b243108945c4d366bd009ede
SHA256eadf473a0d325d00d7ea76a4c098d93fd46f2aff42f246e37c26cb1e5b748654
SHA512b6938812a33ddc3a241522c80d15ad46cdad459f80713d7f0018af3f7c0b56e5d9afa3b0a915b1dce4742badff8e1ef1b9c5ab9b78794cf472f6b35eee1ab784
-
Filesize
19KB
MD56e4fbef155811c2a352d033bb4dbae5b
SHA1d03b9bee290ccee25a4ff09b49643426d0e0d46a
SHA2565f8547bc470ddc7da393af0605c89573ee387fa280625bf9ac26f72cbf1b6f8b
SHA5123fa79c91f51e776090b348842cc1ff6ac9c6372cb9adea2970e540f439943bc8ef581f0549a33f29e45b2e414fb1085995be22833038e474d86897f548b3ae69
-
C:\Users\Admin\Desktop\00271\HEUR-Trojan-Ransom.Win32.Locky.gen-8b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c.exe
Filesize147KB
MD5800ef41fc73ec73eb5f9715c90fdf247
SHA16c20394de56e31b75844accbf9e317823dab1a95
SHA2568b884f7d28d6041a42b5daf927d494a39763828d59f43c74cc363558ecffbe9c
SHA5127345d4eabfce95b1e8b38d63d80b9c91ac07ad3b510af70a653f9e5fdcd30bbcfdb87ef606d5df862460cc046448cf1552d8477ec476accccf411c1921527233
-
C:\Users\Admin\Desktop\00271\HEUR-Trojan-Ransom.Win32.Shade.gen-99fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01.exe
Filesize193KB
MD5f78ceb841082d0c3f6ed13f78c144f04
SHA1d4d0bd28beb492fb184556a91e0659c1145d2f2b
SHA25699fb57bf53f127f880a795d1903505ee06ea7a49f39fb06f579c5379715b2b01
SHA51259cc18ea7f692e56cc25edcf33ca11ac00d3f2d36a01b1fdb9efe4d398cf25fce4346cc4421dbb512034055a5d985df57f253b13959deaa364465e14ab6e4923
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.NSIS.Agent.n-6916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371.exe
Filesize783KB
MD59f2605603823db9b57aff4129d631bae
SHA13c59f5b027e6bc009f94d7ec6b9bf27504694e52
SHA2566916a119de914b05fd4313da5f002585586c00c55fffd19d550101e08a45f371
SHA512b3cd9c204b894042fa0616be948badf021fffb6a5ff40d720967f9dffea46552fe359d3423e979315ac0d68107012eade5ed1e2671d3baa5b466c649e97c7bd7
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Blocker.jrza-3d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9.exe
Filesize593KB
MD561fa70eaa61d55cbbf8a4f2381f8af42
SHA1bf15ee1b3e73f13534b83c884716cd05c01d99eb
SHA2563d38f79934074b902feb4a599785d07899bcac602461310d2410193a22717ad9
SHA5120da8ca98df16ab3861c53f88f471222b94753bf1aff4dc0c5cfae482ad6f6ac804034fc2a4cad979b31d1f42d7222a60d37e72802eb70d6a5b72d660e229f375
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Crusis.dq-2b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f.exe
Filesize243KB
MD5e8932e011d6d8285f99b581715f17f46
SHA188d318cae7066cc8d27156d25935b98069d7c154
SHA2562b7c4c4370000b258932ffe871e3cd9ec613c223ea129fd164d32070544ee53f
SHA51233615b7b54cdf3106aeb669567479c6dac8a286222244af92960130953c3141e5c8259712d75cb708cb5c41baca002c35525b26747933eeafd49f603fe2655f3
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Crypmod.aagm-a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6.exe
Filesize403KB
MD5667802f02270c1226b3caf2f07bb7dd4
SHA1018f3ca4cf43251954ab6cc78f352e5457afd7f0
SHA256a83edc82b76dbfe858ed9fd208e8384ff097d10afb92a571398806e5e9db11e6
SHA512d7eb1d476192135437f9a139cda9e8b0c73f14f794a436cafbaa71119e50801a844888e7a0863a3ff97659c9b90df21481cc53bf3560dadd9f8ddb0111e1cb1b
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Foreign.nfve-0ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc.exe
Filesize249KB
MD540c3e1207db30cbbadacafd66f215443
SHA1381151aede4db5f0f17a922a6b6772f713c6d6c6
SHA2560ecacf4dd6cb576dbecde849c434ac97bfacbfd64690e35cbd4d738ed08a43cc
SHA512c9be37975ddd109464850ffe00da4c5f7d415121f58166823d81290fc6c0c70faf9cfd73a238b929019ecc802f15334c8f4f1bdd77db5a656f04bfa40993ae74
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Locky.bil-6421e8233f7a1a4aa53e6525ecd65db197c68699ec7e930fb3cd7b0bb66d37dc.exe
Filesize244KB
MD58958cb75191d894721a3f9b84e6d9607
SHA1f0227ecc327522954505625f86fb82ea24a5260d
SHA2566421e8233f7a1a4aa53e6525ecd65db197c68699ec7e930fb3cd7b0bb66d37dc
SHA51266e09c4310d79ad724573186f3c8477b9e0bec76c44946e4a5118240c24ab8310b847efced133d321fec8f8378747a28ff19685bb0115573a59ac463bd152799
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Locky.vy-02b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a.exe
Filesize193KB
MD57266144328364e7a813780f6db1233b5
SHA10441deeafdda044246d3a396e8bcc23c3ff7bff1
SHA25602b76b1e4ec5de4b02cd58efa079744ffde46573bb6c4049f8cdddc69452b32a
SHA5129f2e65c50c827a59cc4e9b27d2380055db199aa82f66efd4bf824ff3ea0aae31e144732212b910e94572028ca3c3a64375032c49718e81713239280381dbba68
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Locky.yr-2c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee.exe
Filesize114KB
MD50ce07339e9fb4822d4a167383bf6507b
SHA1cf2da0f9eec16c913567ffd60de35fe78b404c8c
SHA2562c9633c0a2560bfe6afd16bd2a98a3c9280e6561d72e7c2ad905c3de6f9c11ee
SHA51259a26314be15f62aa24eb865a5d5b78c8588255b3379873de59398d8c2545e044b3b2487094f64f84f27d67e1c5089674fa11ea64fef59aab2abcb2ee05ba507
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Purga.h-d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855.exe
Filesize113KB
MD5d266ff1044c75bceeee0af47a67d31da
SHA18a42b5e3c3d1216e3426bab100ce586342062d2c
SHA256d8978e93ac4bea3b104da71542fbde5c9c7397e6c298f42c3a5fe8b6cac21855
SHA512011b94885ef44b7636c242029463705b7a9be287db3192dea4a51c375f61fbc75244cc743d170b2e3862ac24d73c4b7352f3b0be0548da9eb32d7f37245a9455
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Shade.kyt-a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6.exe
Filesize884KB
MD5ee0a9d8b1161f9d286f1bfd3c48e1cda
SHA1fa6edb3521664f01314cff629d5accbc570e2499
SHA256a0173b49137f1ebe3911dd8dbd565d8e6e6a6e8fe06aee9819cd664d835341a6
SHA512814293e9f366a8a447648eb2e36355135a59d68d3c8884a4336d48a4a12121f9013809dc693c5618e039e79baaed8ca7b9e2461d3afebe9a1b834d276ff95a63
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Shade.lcm-88a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1.exe
Filesize923KB
MD590293bec8160276d18b58aeb35cdbf79
SHA19155de5b46d0595ab418ebab17a4fa1de10425d7
SHA25688a15cf25bd3f541e41c911dd45e667a7a6b45e844a3f9f690dd9ff8c5566ba1
SHA512a55dedb29334f7eb5103fde98bff0c5f7ed0df3e8d79f83ff4f4dfc7dfe9e67e3188f2d2a86177f6825f56a2f233e60450fe8e8cbe35067e57c28ea6d1aaefd9
-
C:\Users\Admin\Desktop\00271\Trojan-Ransom.Win32.Zerber.gqd-0ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06.exe
Filesize358KB
MD58dd7aaba9b06fc405a85f8bfe851cdcc
SHA1ed2512715303b97fcd20678981667fd1b78424ed
SHA2560ac405db120a8f54b15f0711941c31e64720b1d779fc254338846304d8073c06
SHA512f5f03285c1f478837becade505ddc478e3f718cba0f4afe48b75893e90f5d25d51ef271cc7f7c50c15c16c781c98b715f71466699dd17aabdabf2def3c0e476b
-
C:\Users\Admin\Desktop\00271\VHO-Trojan-Ransom.Win32.Rack.gen-8a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b.exe
Filesize2.1MB
MD5d43fb2d224dfde0c8896efd2a45080aa
SHA11ec8ff5296278948ae79490c2e0883cd981b0e34
SHA2568a695887010a5b63787b92eec20992a2f5e1a1a3f48eb4b4bd7711313e24d13b
SHA512ad7aa5bbc0ce79725bebc13adffba8fc49bbb7240ffae93729741a4805cba4223851b5fd3701d9d8094d4538c64bc90f2ede6367215a5b9b69772cbc7c4a0e89
-
Filesize
4KB
MD53e8740ee49a32f25e5f09393006f567f
SHA1d92cd85d517db8a3d30485309a5d508274f7ed29
SHA2569092d56110596f1df2cf42c78ea9d8563743fb72363fd889deaa5aeab3d29880
SHA512d050ddb6aa1667484b55a9f0104a2806e3c75f38d8e1a0567603bd24fe3c83948d63e848b981cee49a466ce5244bd24302743758d698ca8de733547a04ba1bbf
-
Filesize
12KB
MD5c21877c689e53a1e15e3e53e738fdbe1
SHA16f0fb499ab8a754621fdacec8fc5a75ce8a9eb23
SHA2563d78f36278b3a094a8626bc29c806184e3530fde954dadc908b4fc5d6149d12d
SHA51253628340d2fd3ea98932c76b607b0867a80b2d966d12e4a04b171a3347fcc8e801866dc8378a7c43d768fd9c235479e265e87f83e325804d54ac81b74062879f
-
Filesize
10KB
MD5a21f19db967fa04c0bee7a5db48caa53
SHA10f604af3925270eb00c7710ab479b21436e12668
SHA256dc7d8c6294b742996948df0daa54107f044a8116e8b2aac86114e4d3f9d0ce68
SHA5122265f8d8ca8005143add85e376f4aedc2834e92063e5fc95e2529cacd73514fd2d2ffdbc4c574dbb7cd279bb383b6b9e16c549846d8bd88030547d95f4ce9bc1
-
Filesize
83B
MD5c7a871593dfb5577de0ebc3ae0283b73
SHA1292553643766ae9fc30f742a087dfd873e430925
SHA2565dde0f178d0ad4c041aa5617a83b39f1ce5eb893777790f70e2e395e01932658
SHA512f470ca2198920e148560c18de5f5cbec7320dcc44c8bbc450ed37347b4d740c99bdc1833963854fea93af026044970e280a9765af619d3514ee5dc43c10bfb62
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
676KB
MD5f44127ace6c92e713e161165e2cf6264
SHA1f904f871fbfb026a253ce7447d4b571f3016f482
SHA25602a608dc609df9882763b6d2c5d2eca0914a84097f4dce6fc70d6032e3692cb3
SHA512857a8fb453924366e09de742efb79acab82903f59e06fe045d965ec1fd026cef1b55f4d1faf0d82bbf19a3b09b16ff8c8e11f37eef29eb5a12a65a56a37019d3
-
Filesize
81KB
MD5e42cf5e1f4237fdb9809f247b87db990
SHA1eaa41e5ba2b61c15ada1bcd398d4c1cf02c36fe9
SHA256522875ffc9dbdb74b45f46e8074259a6645c63967092e5a85d45d94b380de6a0
SHA512ca73605987aad69f9668f3359e5cfde58dd341cc0fd06df2f393e18d2e658e7a54415f05b2dee04b4b2485194a25f685f802dff4ebd8a797a292a7c78ccd4f2c
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
10KB
MD5bdfea57dac99a598e5f72ce5e6da274d
SHA101d68d9ae4df9eb8ebb4b61eb77b5777e628242f
SHA25607b7bc1a60719d7e68778b1b5843b0505503f3ecba57fc526517daf990f0713c
SHA512e84294f062033869d78739a81a9b84a82c2f5d9783a042dd943dfd5cae073d2603d22c838d02b273b1ec856b0b2a36221a248d47878286a0ac7824e34c9d13b0