Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00279.7z
Resource
win7-20240903-en
General
-
Target
RNSM00279.7z
-
Size
5.4MB
-
MD5
acba2209edbb1f7e0bee57da387ca965
-
SHA1
6b0333d14fe7a7421cf59357843edb6b796f0e84
-
SHA256
a15b04019cc88bc0035e8808c951ad06177d55fa11488131caac90ce1346b6b6
-
SHA512
2888aaaebe2e25f441349ada813fa291b6de0ed09957ebb8b7728ed0ff7f9d85f5e17e9fc01061111c2540100a0562af3c1f79be6b138237f9763d4c59738cbb
-
SSDEEP
98304:legqLR4xsY1BV9z3TKtFUcAVHZh7QDzJJ/4TLLLCMw8mUuN3abv8wxJv:legWY1BV9z3XHP0PjQPubhN3A0OF
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\@[email protected]
http://4kqd3hmqgptupi3p.w3r6a4.bid/F843-3FC2-E5D0-0446-8012
http://4kqd3hmqgptupi3p.wl52rt.bid/F843-3FC2-E5D0-0446-8012
http://4kqd3hmqgptupi3p.b4by4c.bid/F843-3FC2-E5D0-0446-8012
http://4kqd3hmqgptupi3p.fw1bwy.bid/F843-3FC2-E5D0-0446-8012
http://4kqd3hmqgptupi3p.onion.to/F843-3FC2-E5D0-0446-8012
http://4kqd3hmqgptupi3p.onion/F843-3FC2-E5D0-0446-8012
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\@[email protected]
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Luminosity 2 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\14.0\Common 7zFM.exe 3628 schtasks.exe -
Luminosity family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (522) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 22 IoCs
pid Process 2652 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 2024 Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe 2492 Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 1472 Trojan-Ransom.Win32.Locky.bil-2cdd1b0c3cc727315663a07761e2919c4a114f79c3cd9db6e541c44e5afa1453.exe 632 Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe 2332 Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe 2344 Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe 2836 Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe 1820 Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe 3028 Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 4492 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 4604 basicserve.exe 4672 basicserve.exe 4804 basicserve.exe 4920 Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe 5096 Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe 3600 File.exe 3924 Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe 2116 iadpmsccojgu.exe 4236 notepad.exe -
Loads dropped DLL 64 IoCs
pid Process 2332 Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe 2836 Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\FxsTmp\fxs9DA6.tmp splwow64.exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3228.bmp" Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2492 Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe 4416 svchost.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2652 set thread context of 4492 2652 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 53 PID 2344 set thread context of 4920 2344 Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe 58 PID 2836 set thread context of 5096 2836 Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe 60 PID 2024 set thread context of 3924 2024 Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe 77 PID 2332 set thread context of 4236 2332 Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe 84 -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\BasicServe\basicserve.dll basicserve.exe File created C:\Program Files (x86)\BasicServe\basicserve.exe basicserve.exe File created C:\Program Files (x86)\BasicServe\uninstall.exe Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File opened for modification C:\Program Files (x86)\BasicServe\basicserve.dll basicserve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\@[email protected] Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\@[email protected] Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\@[email protected] Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\iadpmsccojgu.exe Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe File opened for modification C:\Windows\iadpmsccojgu.exe Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4624 4492 WerFault.exe 53 4936 2116 WerFault.exe 78 2208 2092 WerFault.exe 89 2636 4068 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language basicserve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language basicserve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iadpmsccojgu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language basicserve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3380 PING.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0007000000015f4c-41.dat nsis_installer_1 behavioral1/files/0x00060000000186c8-45.dat nsis_installer_1 behavioral1/files/0x00060000000186c8-45.dat nsis_installer_2 behavioral1/files/0x000500000001997c-711.dat nsis_installer_1 -
Kills process with taskkill 1 IoCs
pid Process 3340 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d0957ddf8b1c3bbbbafaafc9bbb9c9a41e3516713f14af01adcd983c8a0e1b8c000000000e800000000200002000000011f3c39dfd603b846052b6101d33d9a4964785ed45493355c00fd4f775cba62c20000000e7a1a2160842fa25d9326b03ea4776e87558413c63a00916df85842823ea4e6640000000539fecca5d89c20aa3b05f8d1556ea5523573dc6ce162dc48f0f0b93302449e2611da64758fc2d15840acdbe22538bc92809189989ce070ea5aa4009e458c956 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30B7CA71-A8F2-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback.Save = "http://www.bing.com/search?q={searchTerms}&src=IE-TopResult&FORM=IE11TR" basicserve.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701dcef4fe3cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes basicserve.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} basicserve.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback = "http://www.basicserve.com/?tmp=redir_bho_bing&dist=0&prt=bscsrvgup&sp=bing&keywords={searchTerms}" basicserve.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\{47AE1BA9-0BD1-44F4-88AE-45F8F7B605EF}\DisplayName = "BasicServe" basicserve.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438456231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43D65271-A8F2-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\{47AE1BA9-0BD1-44F4-88AE-45F8F7B605EF}\TopResultURLFallback = "http://www.basicserve.com/?tmp=redir_bho_bing&dist=0&prt=bscsrvgup&sp=bing&keywords={searchTerms}" basicserve.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\{47AE1BA9-0BD1-44F4-88AE-45F8F7B605EF} basicserve.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3380 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3628 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 12 IoCs
pid Process 2652 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2024 Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe 2332 Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe 2492 Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe 2344 Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe 1472 Trojan-Ransom.Win32.Locky.bil-2cdd1b0c3cc727315663a07761e2919c4a114f79c3cd9db6e541c44e5afa1453.exe 2836 Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe 632 Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe 1820 Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe 3028 Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2696 Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 4492 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 4604 basicserve.exe 4672 basicserve.exe 4672 basicserve.exe 4672 basicserve.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 4672 basicserve.exe 4672 basicserve.exe 4672 basicserve.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2796 taskmgr.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 4492 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 4492 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 4492 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2332 Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe 2796 taskmgr.exe 4672 basicserve.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1820 Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe 2796 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2492 Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe 2492 Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe 2652 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 2836 Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeRestorePrivilege 2308 7zFM.exe Token: 35 2308 7zFM.exe Token: SeSecurityPrivilege 2308 7zFM.exe Token: SeDebugPrivilege 2796 taskmgr.exe Token: SeDebugPrivilege 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe Token: SeIncreaseQuotaPrivilege 4396 WMIC.exe Token: SeSecurityPrivilege 4396 WMIC.exe Token: SeTakeOwnershipPrivilege 4396 WMIC.exe Token: SeLoadDriverPrivilege 4396 WMIC.exe Token: SeSystemProfilePrivilege 4396 WMIC.exe Token: SeSystemtimePrivilege 4396 WMIC.exe Token: SeProfSingleProcessPrivilege 4396 WMIC.exe Token: SeIncBasePriorityPrivilege 4396 WMIC.exe Token: SeCreatePagefilePrivilege 4396 WMIC.exe Token: SeBackupPrivilege 4396 WMIC.exe Token: SeRestorePrivilege 4396 WMIC.exe Token: SeShutdownPrivilege 4396 WMIC.exe Token: SeDebugPrivilege 4396 WMIC.exe Token: SeSystemEnvironmentPrivilege 4396 WMIC.exe Token: SeRemoteShutdownPrivilege 4396 WMIC.exe Token: SeUndockPrivilege 4396 WMIC.exe Token: SeManageVolumePrivilege 4396 WMIC.exe Token: 33 4396 WMIC.exe Token: 34 4396 WMIC.exe Token: 35 4396 WMIC.exe Token: SeIncreaseQuotaPrivilege 4396 WMIC.exe Token: SeSecurityPrivilege 4396 WMIC.exe Token: SeTakeOwnershipPrivilege 4396 WMIC.exe Token: SeLoadDriverPrivilege 4396 WMIC.exe Token: SeSystemProfilePrivilege 4396 WMIC.exe Token: SeSystemtimePrivilege 4396 WMIC.exe Token: SeProfSingleProcessPrivilege 4396 WMIC.exe Token: SeIncBasePriorityPrivilege 4396 WMIC.exe Token: SeCreatePagefilePrivilege 4396 WMIC.exe Token: SeBackupPrivilege 4396 WMIC.exe Token: SeRestorePrivilege 4396 WMIC.exe Token: SeShutdownPrivilege 4396 WMIC.exe Token: SeDebugPrivilege 4396 WMIC.exe Token: SeSystemEnvironmentPrivilege 4396 WMIC.exe Token: SeRemoteShutdownPrivilege 4396 WMIC.exe Token: SeUndockPrivilege 4396 WMIC.exe Token: SeManageVolumePrivilege 4396 WMIC.exe Token: 33 4396 WMIC.exe Token: 34 4396 WMIC.exe Token: 35 4396 WMIC.exe Token: SeBackupPrivilege 5064 vssvc.exe Token: SeRestorePrivilege 5064 vssvc.exe Token: SeAuditPrivilege 5064 vssvc.exe Token: SeDebugPrivilege 2332 Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe Token: SeDebugPrivilege 3600 File.exe Token: SeDebugPrivilege 3924 Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe Token: SeDebugPrivilege 3340 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2308 7zFM.exe 2308 7zFM.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 3912 iexplore.exe 3956 DllHost.exe 2796 taskmgr.exe 2796 taskmgr.exe 3956 DllHost.exe 2796 taskmgr.exe 2796 taskmgr.exe 3956 DllHost.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 3956 DllHost.exe 2796 taskmgr.exe 2796 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe 2796 taskmgr.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2024 Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe 4804 basicserve.exe 3912 iexplore.exe 3912 iexplore.exe 4008 IEXPLORE.EXE 4008 IEXPLORE.EXE 4748 IEXPLORE.EXE 4748 IEXPLORE.EXE 3600 File.exe 2116 iadpmsccojgu.exe 3912 iexplore.exe 3912 iexplore.exe 4008 IEXPLORE.EXE 4008 IEXPLORE.EXE 3132 iexplore.exe 3132 iexplore.exe 3232 IEXPLORE.EXE 3232 IEXPLORE.EXE 4804 basicserve.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2652 2648 cmd.exe 35 PID 2648 wrote to memory of 2652 2648 cmd.exe 35 PID 2648 wrote to memory of 2652 2648 cmd.exe 35 PID 2648 wrote to memory of 2652 2648 cmd.exe 35 PID 2648 wrote to memory of 2696 2648 cmd.exe 36 PID 2648 wrote to memory of 2696 2648 cmd.exe 36 PID 2648 wrote to memory of 2696 2648 cmd.exe 36 PID 2648 wrote to memory of 2696 2648 cmd.exe 36 PID 2648 wrote to memory of 2024 2648 cmd.exe 37 PID 2648 wrote to memory of 2024 2648 cmd.exe 37 PID 2648 wrote to memory of 2024 2648 cmd.exe 37 PID 2648 wrote to memory of 2024 2648 cmd.exe 37 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2332 2648 cmd.exe 38 PID 2648 wrote to memory of 2492 2648 cmd.exe 39 PID 2648 wrote to memory of 2492 2648 cmd.exe 39 PID 2648 wrote to memory of 2492 2648 cmd.exe 39 PID 2648 wrote to memory of 2492 2648 cmd.exe 39 PID 2648 wrote to memory of 2344 2648 cmd.exe 40 PID 2648 wrote to memory of 2344 2648 cmd.exe 40 PID 2648 wrote to memory of 2344 2648 cmd.exe 40 PID 2648 wrote to memory of 2344 2648 cmd.exe 40 PID 2648 wrote to memory of 1472 2648 cmd.exe 41 PID 2648 wrote to memory of 1472 2648 cmd.exe 41 PID 2648 wrote to memory of 1472 2648 cmd.exe 41 PID 2648 wrote to memory of 1472 2648 cmd.exe 41 PID 2648 wrote to memory of 2836 2648 cmd.exe 42 PID 2648 wrote to memory of 2836 2648 cmd.exe 42 PID 2648 wrote to memory of 2836 2648 cmd.exe 42 PID 2648 wrote to memory of 2836 2648 cmd.exe 42 PID 2648 wrote to memory of 632 2648 cmd.exe 43 PID 2648 wrote to memory of 632 2648 cmd.exe 43 PID 2648 wrote to memory of 632 2648 cmd.exe 43 PID 2648 wrote to memory of 632 2648 cmd.exe 43 PID 2648 wrote to memory of 1820 2648 cmd.exe 44 PID 2648 wrote to memory of 1820 2648 cmd.exe 44 PID 2648 wrote to memory of 1820 2648 cmd.exe 44 PID 2648 wrote to memory of 1820 2648 cmd.exe 44 PID 2648 wrote to memory of 3028 2648 cmd.exe 45 PID 2648 wrote to memory of 3028 2648 cmd.exe 45 PID 2648 wrote to memory of 3028 2648 cmd.exe 45 PID 2648 wrote to memory of 3028 2648 cmd.exe 45 PID 2648 wrote to memory of 2968 2648 cmd.exe 46 PID 2648 wrote to memory of 2968 2648 cmd.exe 46 PID 2648 wrote to memory of 2968 2648 cmd.exe 46 PID 2648 wrote to memory of 2968 2648 cmd.exe 46 PID 632 wrote to memory of 4268 632 Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe 48 PID 632 wrote to memory of 4268 632 Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe 48 PID 632 wrote to memory of 4268 632 Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe 48 PID 632 wrote to memory of 4268 632 Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe 48 PID 2968 wrote to memory of 4352 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 49 PID 2968 wrote to memory of 4352 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 49 PID 2968 wrote to memory of 4352 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 49 PID 2968 wrote to memory of 4352 2968 Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe 49 PID 4352 wrote to memory of 4396 4352 cmd.exe 51 PID 4352 wrote to memory of 4396 4352 cmd.exe 51 PID 4352 wrote to memory of 4396 4352 cmd.exe 51 PID 2652 wrote to memory of 4492 2652 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 53 PID 2652 wrote to memory of 4492 2652 HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe 53 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00279.7z"1⤵
- Luminosity
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2308
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\Desktop\00279\HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exeHEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\Desktop\00279\HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exeHEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 2884⤵
- Program crash
PID:4624
-
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exeTrojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\nsz73DC.tmp\basicserve.exe"C:\Users\Admin\AppData\Local\Temp\nsz73DC.tmp\basicserve.exe" "C:\Users\Admin\AppData\Local\Temp\nsz73DC.tmp\basicserve.dll" "dejumifit" " -p bscsrvgup -i b2a7fcfc9e7e4b7bb1489aec1ad94faa" "mifitiwiqiy"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exeTrojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exeTrojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Windows\iadpmsccojgu.exeC:\Windows\iadpmsccojgu.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 3245⤵
- Program crash
PID:4936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00279\TROJAN~2.EXE4⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exeTrojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3600 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /NP /sc onlogon /tn "Client Monitor" /rl highest /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /f4⤵
- Luminosity
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3628
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3804
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\tskmgr.exe.lnk " /f4⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\notepad.exe"C:\Users\Admin\AppData\Local\Temp\notepad.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exeTrojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2492
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exeTrojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2344 -
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exeTrojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.bil-2cdd1b0c3cc727315663a07761e2919c4a114f79c3cd9db6e541c44e5afa1453.exeTrojan-Ransom.Win32.Locky.bil-2cdd1b0c3cc727315663a07761e2919c4a114f79c3cd9db6e541c44e5afa1453.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1472
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exeTrojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2836 -
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exeTrojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5096
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exeTrojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
- Drops file in System32 directory
PID:4268
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exeTrojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysCC73.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exeTrojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3028 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:406536 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysC33F.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:4120
-
-
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exeTrojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\@[email protected]3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3132 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3232
-
-
-
C:\Windows\system32\NOTEPAD.EXEPID:3160
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:3284
-
C:\Windows\system32\taskkill.exetaskkill /f /im "Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3380
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4416
-
C:\Program Files (x86)\BasicServe\basicserve.exe"C:\Program Files (x86)\BasicServe\basicserve.exe" "C:\Program Files (x86)\BasicServe\basicserve.dll" uzowesoweh zowanude1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672 -
C:\Program Files (x86)\BasicServe\basicserve.exe"C:\Program Files (x86)\BasicServe\basicserve.exe" "C:\Program Files (x86)\BasicServe\basicserve.dll" cinatayoh apohonecin2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3956
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 3362⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 3602⤵
- Program crash
PID:2636
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD50159493b49b920c1a2c92b6649df6d33
SHA118c312701414914005d7f7866d5ea9a194841daf
SHA25681cd42c8ae46602849c543457e3ac282dd5c4fb3000d09f265e1a4f19829e40a
SHA512acf2d454251fa4c1ff73e4f5ed6e6f1b5e4d74a0c69ac5c40400c4b102357c17927de88e25d43d2d23b9c59e1b65d3db08e07741bb3b3bac813057760a487124
-
Filesize
8KB
MD571bab7344150d3686aa13c969c34475e
SHA1361373b35d3f971eb410dc5956b854e920dc84e4
SHA2565e6331ade91b98726127c67e8c229ef3f0d93c507900847d2b2738223b41896a
SHA512c8ab8e9591d60ff2bfb561e5cc0b550fc5ba5dff96e91eacd96e205ec359e98d3c0f581dd02e4a447765a9dc9674c2c501f113b6f337f543916e31f5a7b84805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b4c98bf4cc873ca590f43c6f49afb5
SHA113f1adee31d56dbf7bdb0554964d364729409d61
SHA256fcb01b05c74b7553ceae54583b51aace81d9ad415d88ee584c0bf752fa2457b7
SHA5125af85f6ded4ce077e83f812880e1b11bc19b693b5505d065afc9d4a7a4d56c55cd84e5dad108f4eaf5fd4cf317fe3915ce20cf84eebb1b1c8db9cabec1e4c7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625a85f01081e5216362d60d5f815327
SHA1df7d47abaaa31ac949f4b6962e7af965a15e0d33
SHA256bb5b0dd9c0df904ea12af3dcf56b4e41d765a5e575e5eb092d7bc2a153dd5ef7
SHA512f45479693c43929bddcbdc156303e55641413807b5aed717603f20465fa38e971446194eb552ec886174ee42736b7a95fa36eea73e1752241298b4e8508cd47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d1b2c3276117e1ee0faa3446a58840
SHA1f6d4fef2858a222575dcc4b9b0dad62650a9d22a
SHA256754c804091438e082801c1d29bfb4dd8fa97ef636bf7ceb30d345b2fdd5ad2f5
SHA512998b902137fe6df4ad02dd384084dd0d5935735cfb9254dd8e0ee654fe5974fe430c029e854b816d4afee825c1944a681753a84e8c93c4f88f48222b451e7870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5376d88b7657129784c083079c040688b
SHA16c725bf66e637e36a6658ce413d9a07e0a514f4f
SHA256175e5a21a61df4e543893fef92979240e7691e95c4ca6a46da2b6050f8215139
SHA512930980a50efebc0c9a32594bd1b8fb6bceb825c6a751b9ced1f997ff00f71d9fd7dca3ea8c220126227957d4aff4760768e4c6f19469b33f71882c96fc8537b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64e4154850bf9753e0861f05010c1ff
SHA12e34846cd94b826cb99d1908b03b6a37ecb4f296
SHA256771fb07fdb50d42f1a102d51646cefcd47c9e5137d918629ac49bab19c5b3b2c
SHA512a147fc94df893c3e18cebe8fcd9d130ee00a6630ac2b8c4272d3ad19d30f7e4bc5cdab56f853bd9e0a1835aa176c0a638f4483e1dce44bd773bb05bf91e1e7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e006aa40d0b9c745b799a07ff004ed4
SHA1df216246b54a8957e2014ccb325eb53b27b5b967
SHA256b47be15909c4389d762e85d0ea0d88ea5ea74c85bdc0d6bdbe48eb7e32919a60
SHA5120189b288bea9259e16a40e04b40f963da24075d4db4bc90c57538b02454d81261d8d7a57ce5e1c93db19e71392c05fbbe10eb5dbb5eaf41390956922f2b972b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ecc31a42705fffa4d3ff701cf997da
SHA1432e9548fa4d70d68dc12f69b40e0661eafeca19
SHA25635a2329e7c236f68e6cb84543a670f31acfe3b4148c42003f36a34fa9175bd04
SHA512c2a41318fb4ea179abfa079e27bc1e24e009daff8549cdbf3033f1d3beb3cb676f289a52f897793d2b9747cb33a1ebec2b490b6d550b7d1d84b59aca80bf7e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ceea0a10c21eb6aa6a981e875052830
SHA1c82982299a262404a93447202afaa35e53cd1a85
SHA256bb5c2ff806af619ddf91121f9ad45988b60bc171328e61ea97ea13438ae7a3f0
SHA51257452dcf6965c67d09d72781866ab3ea16f0a805aeed03a87d2e6658132f572d9dc8caff6b544f849a81880f6d50b612919caf4ae5d0e52186d7b727762e5daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8221213925416d5dec5f6cb6d181a8
SHA1c6271ca21c43d09ca646b6403a629d62dde93af6
SHA256bb9b79b042d890c1dcccc9d36820b448723cc593ba30041f4e61854b6ff6e93c
SHA5121bbff8b63700adf78daf32e4828b51050c9c9a270cfff41fea8d9f303882284bac026d3eb484c0abb2d17d53feb6b60953b9c1550e111bfe221583fe26f43ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bbd49f3752c7856cf9bab52f44224a
SHA1aa74824543bf9a455605ed848dc97e11c52ace71
SHA2566486dd0d6f9be0e116dfc4ce08b22e5eec090dd7d67ba0feb8f59c02f650f996
SHA512e5ff280293a25f55d064782ed1bc7756fcad37939306bbdc3ff07bc205f09a210e3aff6a3397b6a57727d66a1e220cb2a993429b4d12387b0bee1590978719a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518146d8b3c72522e3be208cad8a13116
SHA175f4fd34d08ac33915b342de6c9eb937e28c70d3
SHA2567ae034ed0f284b8a3a0920be67aa826f0eef4236cb22fde92652dbc63fcd013b
SHA512c30cdcaa86c826cca8ba40047450df4f71d1484d37e027d5be43cc00b04cc4c981ac6bb5df5aea65faca337839b53ae8f5b3418296bc6c64a9433bedade71479
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
857KB
MD5bc6529f2a93dd5eb328963e0b41a855a
SHA10d3fe448baa8a886fd33541f17e893a8a550640f
SHA256b98c711a375f39574672d49fdb798e70dab73b56c5a605c2cfd55a82d8d1b528
SHA5124b50bc0de71bdbdbe76622d498d70b940e11a5c34b6d58b43765eacb2447d3106da3ac80f3a20e7eed67598bf9875cda9646694724b8fae6d91a7ed97b0bad73
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
22KB
MD574a5404b477ff0328829aa9d8889c3a3
SHA1dad102f34d74e614668f91c2de287cf4f63b1aac
SHA25649c095451a1203a82004c294fcd418621fd0649ec3eaa6f8a6a96c193cd4e270
SHA512f953401617e0c5560297d72f3bba24c74d6c5d1ec500226e198799c56fb0aa38642246e0cb0d111dee9be31b7c771d13e59e16b590c98d290eb230fd4d5559d8
-
Filesize
78KB
MD52e1c0769beff93993d98eaa6c537acdf
SHA1459f3a41027bb6d74023d4f4f094a7165301e4a6
SHA256f3479f5877dec3810598bb3b707660bfcd0cbe4791cee939a305b8261ba972ac
SHA5126d61a5286964874b8e36ef713808bfc363d7d05560270a3d1616b15c547755e87f5e174ee1dca8a1248c89a58667221a5bf22ba91b6e2614c6b29b0926931295
-
Filesize
16KB
MD5fc2a3b136df9ed2642e3366f94f5ee48
SHA1ae124ba9b05fb8aa3144697286675c674d9f9b34
SHA2560995f0a43be3425f3fd3bae770a9cf0c6ebb33b9cab54e868e50553d4dce9575
SHA5125222c59878963f41c92e1d399f16e54ee77f1771da358090d822e1a15b9211ff48d79f320b139ccf3666446fdc5b1aa254460a9401e107578fbb2ae8846bad4a
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\@[email protected]
Filesize19KB
MD58ebc0e807a744b926c88591b48dad8c3
SHA1cae1fbaa33efe2b960b2a874191861e29485e597
SHA2569db7be0b55732fff9e0766245cd7c96b7ec9c395367fc16f336b73b189c997f5
SHA51263f7c9c888aac2ceb2dac49d0d4dc7270b4c6f93f591a2073c72777e3556edf6b771e666ce01d19546897b231e9fae09eb31a71c8ffe882b391e51e3a1c42432
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\@[email protected]
Filesize10KB
MD5292dfaf6e70809046cb3f21e1fb6c8aa
SHA14da7be42a5fd0dddde68b246f26dbece2de9ec78
SHA256d54479ba731bc66ccf5f0317bab3c93e041642b9802c0c590829df674ac26433
SHA512dbc46772c1940ea8eb16cfe92b1844b5e146b656e10df1866ad6efc665b0e4e4461408ca7638b5876889549a66bc790d4d16cc1408749f480929bd2abe8e3e93
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\@[email protected]
Filesize90B
MD5bc1bb4b1ee1df9946f6bc7e849aff5e1
SHA18ab20e0068bf05aa4d72d764a5aef578005e6ad7
SHA25682d2415b9de91ce3abb20ee114ad129eab06882270ffd9f33d79898811914676
SHA51229c4ca0c4bee8eccd7fe592f10a5f028a9e54354c7fa8a1a9e314d188a245c1cc4f32860f5c86a5d5d294d3c21b8a8745414183f4d18fd3c73b6652e36b0a830
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_574FCEB3833242FBAF079F7169BF5F0D.dat
Filesize940B
MD5764b285dff272a359649a6f186fb5564
SHA1cce9eedfac5b0b33587787ee3e3a88d49059fb10
SHA256aae9d778d4f1aab839bd6db3ac3a732f3a3496d91127f667f8177a0d9f1c36de
SHA51256773b067b831850aa056c9c185047cc62e19062c5b9ffb55c985876ee57793108bdb5faef513b8e3d6d51ed34b765a3f826c821155c138ba919f67ac56caa1c
-
C:\Users\Admin\Desktop\00279\HEUR-Trojan-Ransom.Win32.Agent.gen-14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf.exe
Filesize195KB
MD53a93542ef653c9211885999f6be603df
SHA135d36643555790d859653c60fd6712035a1ec806
SHA25614f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf
SHA5122039bed38fd2586898af38d5bcba3549cf58e3e3e71ae6256d191a60ee80d8cd448fc242d3ae9b939d5531288b680fcb21b045568c624073f5d8243c30a01b3a
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.NSIS.Xamyh.iop-154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01.exe
Filesize1.9MB
MD521c1d06c5e5a3c2a4234d4cbf729ccfd
SHA149c3464b8e863dcbe571dca4d3872f16012f32fd
SHA256154fefcc43ac75f06c1a0b35a292531e41e5977d38b8b23feda15f6ac7410b01
SHA5126708dda48790a45a55dc2eba485cdfc3d65d5606059a86010002dcc66698621d08ca85f87770e69225c0c3cc947729cac287429c93efbad686c609aa03f5e064
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Bitman.jyv-63cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157.exe
Filesize376KB
MD5f5002d397908a598439660b936f713b9
SHA1372ac77e8fd7ed0919b0b66a55514d6437093a43
SHA25663cc0459c04c6da01fea3e947ae7356ed23469ff4fc082705a6547b7b0c9a157
SHA512b4f1ab6d3614c02869b67c4181e981d40690bd3ebc39b5b1036f8ad8918139083b17d9fc5b93033cb1872e8b42a6d4d4288b36cf7acc5d5497bd5abed4da6010
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Blocker.dvjn-8c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75.exe
Filesize1.8MB
MD54cccaa5cfb192851d364230d184a0472
SHA16453801f53aabd336417b5b2d3d9bad1a5df4527
SHA2568c561bd369af161f42dc9e98346ee039fced680e82666887f6dcd7ffaf84ab75
SHA512fc01eb8dbceecc31a7ea193ec44417e5648b4efc3d5583d851a6c7e3bb814acac6d82be922cb1e5775429cc07d4c20768a539312539c9bf5f50605ff71c8ad65
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Foreign.gxrd-811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24.exe
Filesize115KB
MD5fed3dbb724d8364ef12976526447f8aa
SHA19c92a66492675ff7c593eae74813e6e53b73c881
SHA256811539a46838f499beaebb935d3c771e4e31201530fd455cba97da656e16cc24
SHA512986a5011d7a298016e9f78cc40d4837ba2e9123e05e15b8b630c63a0e5cb136ac822885c15ec16d1d3ad6b0d36c7887bf0e4d17e6a61f4dc810f53c60d40d407
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.GenericCryptor.iax-f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51.exe
Filesize277KB
MD582f0133b4c752cf1ff4c4be7aad4e7fc
SHA1d9a5aba99d0e5a253ed8d31fc703097348723d02
SHA256f274c20ab5d564b45c6fd923728fb109c1eff9b6522504f3540e2232b1c4fb51
SHA5123132794da90f0e7542a87119a11a73ba405020c09db9eb06f25e6f1fc93e6b87ec51b4d4ca243f247686b1cfe7af30de3c2a992ffda9a11b4151e66ab64ae5f9
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.bil-2cdd1b0c3cc727315663a07761e2919c4a114f79c3cd9db6e541c44e5afa1453.exe
Filesize244KB
MD5bd5f6a6a82a3bbb0004a0f3a312dde96
SHA18e4c593bd985dab4777d4a6b0c40a1b2a45c5db7
SHA2562cdd1b0c3cc727315663a07761e2919c4a114f79c3cd9db6e541c44e5afa1453
SHA512083a0b1c664ac99686bbc8143dae1972ceedddb97fa0fe732fc94252270674cc997c9634c99e160100be17eb519ee96d333f5b418fd677d54e3109b425ebb129
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.cio-284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355.exe
Filesize281KB
MD56cdd9d7e0300fdf9ec878d83f8b064d9
SHA10ddb718c9c49339f37090976604e21d263f7f242
SHA256284fc767e7ee38c1c0c01c56be0448fb83cdcf4b32098429735ff04ff08b4355
SHA512ad2ac4671c807144ba9db2831b5beeb6fa5e0e231420e8c4d6b3cdc209f6f35dbe8927351d6659687c260907b0f3735dc04cac6b149b304f17c1f7d34f6c6ef6
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.dma-f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e.exe
Filesize340KB
MD5273c23e73735fd3d0db438edafe52287
SHA10c660ed417994b1630edc3a73599e30ce69a5d65
SHA256f22703a8d709be91614e6f71a0bfc683f13b44b8dcb8c5b6cabff70b59fda39e
SHA512980f30ceca8d4b729f3d85726935ffabbdea2149970fb677f92ca6e6eb0edc64389358aab729318c5d99d6da9009728c6b5d203efe08a2e14c36ed367680c99d
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.xgw-49ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6.exe
Filesize411KB
MD5dff0940a39675fe15fdf0dfbf6fa1549
SHA1e85713e8074d02a21cfa9b8ace7723e9540774cb
SHA25649ffc90ff02fb02e0d9401bcee07583533aef33f84eb028a8ff0e996f1a1e1a6
SHA512d9b7307f0ea3abbb5bbd2e01e55060c5623ff279a33746e79d98606163dc5172912c2718d6aec0aadd61e75712116f06ba65c80b70f1f97574d442765205da39
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Locky.xhg-47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0.exe
Filesize392KB
MD54a2592bc635987fa01678a5eff79cdde
SHA1f7554f1f50e31080f6dd6946fc3755984ab4993e
SHA25647f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0
SHA512807fbeb38bf285780a1cdb4dee569a077123fbeb28861738f001334171d6d89b7d30e53546f878cd3eff2e8e0763b92ed0331e59397a013150df13860e7e9d52
-
C:\Users\Admin\Desktop\00279\Trojan-Ransom.Win32.Zerber.ohr-612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de.exe
Filesize352KB
MD5a0edcf1f6d3dac996ca1eb09bd7a0d87
SHA1a436b32c9218281767a291a5b0fab164b49b24e6
SHA256612a87e3d0a3009decaea23c246d86fa6f6f9fc116595ea09636be24728362de
SHA512a26f9ec662feb6d033e69b897d2112078fd00b9a474ab68fa5746c64d89874b3ce572f78eedf5f326db70ef550f6bd48a0430dc683aa3ed7319d447a9622b114
-
Filesize
10KB
MD5fe24766ba314f620d57d0cf7339103c0
SHA18641545f03f03ff07485d6ec4d7b41cbb898c269
SHA256802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd
SHA51260d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706