Analysis
-
max time kernel
223s -
max time network
222s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00277.7z
Resource
win7-20240903-en
General
-
Target
RNSM00277.7z
-
Size
4.9MB
-
MD5
7ec43b51a359d15602306e801f8d53e0
-
SHA1
b2488fc63e257f4b71a300605254f1bf2ea3555c
-
SHA256
8e74097ec91b78acbb08f7915388ef1a7e960ee402fe19cbaee76ea3488854bf
-
SHA512
e42ce9e577e56a86fcb5b16c837f7b31cc798060e06fa8954701d05908a5322bb814322bcef812b349f6f283d3b8d94c47fde2d7d69e070b5151d80173d7cc77
-
SSDEEP
98304:Bow/SvMwj39mc/Abt41EKldc3DBnjugrGukzzaPDG/:Bo6SvMwDkcT1Ecc3djjkParG/
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+tjqws.txt
http://t54ndnku456ngkwsudqer.wallymac.com/E2148AFD29CA248
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/E2148AFD29CA248
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/E2148AFD29CA248
http://xlowfznrg4wf7dli.onion/E2148AFD29CA248
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/B82D-7CBA-BE2D-0063-7580
http://cerberhhyed5frqa.xzcfr4.win/B82D-7CBA-BE2D-0063-7580
http://cerberhhyed5frqa.asxce4.win/B82D-7CBA-BE2D-0063-7580
http://cerberhhyed5frqa.45kgok.win/B82D-7CBA-BE2D-0063-7580
http://cerberhhyed5frqa.ad34ft.win/B82D-7CBA-BE2D-0063-7580
http://cerberhhyed5frqa.onion/B82D-7CBA-BE2D-0063-7580
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 316 cmd.exe 81 -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Contacts a large (24102) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1072 bcdedit.exe 1812 bcdedit.exe -
Renames multiple (386) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" verifier.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\eventvwr.exe\"" Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe -
Drops startup file 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verifier.lnk verifier.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\US63A-26XHT-ZTXTX-HTOKT-FYYYY.HTML Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\eventvwr.lnk Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verifier.lnk Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe -
Executes dropped EXE 38 IoCs
pid Process 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 2868 Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe 992 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe 2972 Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe 1488 HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe 1048 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 2948 Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe 1496 Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe 1544 Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe 2804 Trojan-Ransom.Win32.Locky.bil-73770d505e81cffd36121a113c79e3aff7d757f9c1167660ca3a7e216bc6a892.exe 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe 2360 Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe 2668 Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe 1456 Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe 2104 Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe 840 UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe 3040 Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe 2168 Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe 2424 Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe 2724 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe 1528 ebfcabfbdfja.exe 2220 kkwldujgyyru.exe 2368 Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe 1892 verifier.exe 896 Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe 2076 Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe 2272 Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe 2640 HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe 2612 Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe 2480 verifier.exe 1532 verifier.exe 1764 eventvwr.exe 2532 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 1824 eventvwr.exe 1640 eventvwr.exe 2788 eventvwr.exe 2860 eventvwr.exe 584 eventvwr.exe -
Loads dropped DLL 64 IoCs
pid Process 1496 Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe 2868 Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe 840 UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe 840 UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe 840 UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe 1488 HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe 2168 Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe 2424 Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe 1892 verifier.exe 992 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe 2868 Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe 1048 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 1048 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 1048 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\verifier = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" verifier.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\verifier = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NashWall = "c:\\progra~1\\nashsoft\\nashwall\\nashwall.exe" Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\uxmnxuu = "C:\\Windows\\SYSTEM32\\CMD.EXE /C START C:\\Windows\\kkwldujgyyru.exe" kkwldujgyyru.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\verifier = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" verifier.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\verifier = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Reader = "C:\\Users\\Admin\\AppData\\Local\\adobereader_sl.exe" Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\eventvwr = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\eventvwr.exe\"" Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eventvwr = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\eventvwr.exe\"" Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA verifier.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23116 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe -
Sets desktop wallpaper using registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NSd.bmp" Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1544 Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe 3068 svchost.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 1496 set thread context of 896 1496 Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe 59 PID 2104 set thread context of 2076 2104 Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe 68 PID 2168 set thread context of 2272 2168 Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe 72 PID 2868 set thread context of 2612 2868 Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe 76 PID 1488 set thread context of 2640 1488 HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe 77 PID 1048 set thread context of 2532 1048 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 83 PID 1764 set thread context of 1640 1764 eventvwr.exe 115 PID 1824 set thread context of 2788 1824 eventvwr.exe 134 PID 2860 set thread context of 584 2860 eventvwr.exe 156 -
resource yara_rule behavioral1/memory/2272-255-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2272-261-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2272-259-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2272-258-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2272-257-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2640-542-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2640-541-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2640-540-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2272-620-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2640-877-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_divider_left.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_down.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous_partly-cloudy.png kkwldujgyyru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Microsoft Office\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\currency.js kkwldujgyyru.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\alert_obj.png kkwldujgyyru.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\te.pak kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_thunderstorm.png kkwldujgyyru.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_ButtonGraphic.png kkwldujgyyru.exe File opened for modification C:\Program Files\Microsoft Office\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt kkwldujgyyru.exe File opened for modification C:\Program Files\7-Zip\Lang\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport_mask_left.png kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent.png kkwldujgyyru.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_olv.css kkwldujgyyru.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_dot.png kkwldujgyyru.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt kkwldujgyyru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\settings.css kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\icon.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\RSSFeeds.css kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe File opened for modification C:\Program Files\DVD Maker\en-US\_ReCoVeRy_+tjqws.html kkwldujgyyru.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_ReCoVeRy_+tjqws.png kkwldujgyyru.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_ReCoVeRy_+tjqws.txt kkwldujgyyru.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\ eventvwr.exe File opened for modification C:\Windows\ eventvwr.exe File opened for modification C:\Windows\ eventvwr.exe File created C:\Windows\kkwldujgyyru.exe Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe File opened for modification C:\Windows\kkwldujgyyru.exe Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe File opened for modification C:\Windows\ Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2244 1528 WerFault.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eventvwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eventvwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkwldujgyyru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebfcabfbdfja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eventvwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3036 PING.EXE 2604 cmd.exe 956 cmd.exe 3020 cmd.exe 700 cmd.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00070000000170b5-57.dat nsis_installer_1 behavioral1/files/0x00070000000170b5-57.dat nsis_installer_2 behavioral1/files/0x0005000000019c50-98.dat nsis_installer_1 behavioral1/files/0x0005000000019c50-98.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1616 vssadmin.exe 2772 vssadmin.exe 900 vssadmin.exe 2104 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 1920 taskkill.exe 836 taskkill.exe -
Modifies Control Panel 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\eventvwr.exe\"" Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" verifier.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{3948277D-206E-C453-92EF-7A792F7F3E4D}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop verifier.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{347B9E51-A8F4-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000099fbe23ba680801be45173310c173e33759ab2a8241c421813b89871e0f4edb000000000e800000000200002000000056cdb3d2bc7469edad165a4cde60407cde5a1ce0d032248a9eff9130cd6929fc900000003334521cdcd5594d4f655ab78c066e3a71b7c274059f0826ddd50d7f0468c33433169697acb411edcfd6bc8c5656b010d101a6ae6abdb521a8b6d607fbf4c80c7fbf2e57bfc0003f48079d66a6053c81c478fc1c273571b390ecc8d8e582c7366cbe63ce5741149e2c345f4d65438890e1a59c72083f107e50dc143b4eab3cefa79c8aaf27ccf223be48eba33a6da1aa4000000018f1f1d131f055faaceae5384ef315cc2daea60706dbf9672a964416a9078d494ed79f47b66299aea03af54295b1c058acb2914b09c8829b88a90f7f01ca82c2 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff4200000043000000c8040000a8020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a78d2c6a6f821776f66b0c0e8f48eafa770c45eb3d414c529e4f14b63c54394f000000000e8000000002000020000000f6ca9b33c4fe27a1aaed766e985be67cb6c1f928a2efbd509cd2cbcb2c82489f20000000fe0c53c5ea325fd00cff4020fe511263f1148623e6802bc27564148d7758c81f40000000fb74dd3b547a437759c47a8332450f63f2cd02e2c446d7b5afa4f2e3383abdde69fa60257fd1f743bf09a3135ddca92d50c9f58526a817b03c58aa9b5de22fbe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438457142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "4" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Key created \REGISTRY\USER\S-1-5-19 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Key created \REGISTRY\USER\S-1-5-20 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe Key created \REGISTRY\USER\S-1-5-18 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1160 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3036 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2504 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 20 IoCs
pid Process 1684 HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe 1488 HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe 2868 Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe 1048 Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe 992 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe 2948 Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe 2972 Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe 1496 Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe 1544 Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe 2804 Trojan-Ransom.Win32.Locky.bil-73770d505e81cffd36121a113c79e3aff7d757f9c1167660ca3a7e216bc6a892.exe 1456 Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe 2360 Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe 3040 Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe 2668 Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe 2168 Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe 2104 Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe 2424 Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe 840 UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe 1532 verifier.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 3040 Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe 3040 Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe 2220 kkwldujgyyru.exe 2220 kkwldujgyyru.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 taskmgr.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1496 Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe 1544 Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe 1544 Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe 2168 Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe 1488 HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 kkwldujgyyru.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1880 7zFM.exe Token: 35 1880 7zFM.exe Token: SeSecurityPrivilege 1880 7zFM.exe Token: SeDebugPrivilege 2748 taskmgr.exe Token: SeDebugPrivilege 2948 Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe Token: SeDebugPrivilege 2424 Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe Token: SeTakeOwnershipPrivilege 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe Token: SeDebugPrivilege 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe Token: SeTakeOwnershipPrivilege 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe Token: SeDebugPrivilege 2220 kkwldujgyyru.exe Token: SeDebugPrivilege 1892 verifier.exe Token: SeIncreaseQuotaPrivilege 2776 WMIC.exe Token: SeSecurityPrivilege 2776 WMIC.exe Token: SeTakeOwnershipPrivilege 2776 WMIC.exe Token: SeLoadDriverPrivilege 2776 WMIC.exe Token: SeSystemProfilePrivilege 2776 WMIC.exe Token: SeSystemtimePrivilege 2776 WMIC.exe Token: SeProfSingleProcessPrivilege 2776 WMIC.exe Token: SeIncBasePriorityPrivilege 2776 WMIC.exe Token: SeCreatePagefilePrivilege 2776 WMIC.exe Token: SeBackupPrivilege 2776 WMIC.exe Token: SeRestorePrivilege 2776 WMIC.exe Token: SeShutdownPrivilege 2776 WMIC.exe Token: SeDebugPrivilege 2776 WMIC.exe Token: SeSystemEnvironmentPrivilege 2776 WMIC.exe Token: SeRemoteShutdownPrivilege 2776 WMIC.exe Token: SeUndockPrivilege 2776 WMIC.exe Token: SeManageVolumePrivilege 2776 WMIC.exe Token: 33 2776 WMIC.exe Token: 34 2776 WMIC.exe Token: 35 2776 WMIC.exe Token: SeIncreaseQuotaPrivilege 2720 wmic.exe Token: SeSecurityPrivilege 2720 wmic.exe Token: SeTakeOwnershipPrivilege 2720 wmic.exe Token: SeLoadDriverPrivilege 2720 wmic.exe Token: SeSystemProfilePrivilege 2720 wmic.exe Token: SeSystemtimePrivilege 2720 wmic.exe Token: SeProfSingleProcessPrivilege 2720 wmic.exe Token: SeIncBasePriorityPrivilege 2720 wmic.exe Token: SeCreatePagefilePrivilege 2720 wmic.exe Token: SeBackupPrivilege 2720 wmic.exe Token: SeRestorePrivilege 2720 wmic.exe Token: SeShutdownPrivilege 2720 wmic.exe Token: SeDebugPrivilege 2720 wmic.exe Token: SeSystemEnvironmentPrivilege 2720 wmic.exe Token: SeRemoteShutdownPrivilege 2720 wmic.exe Token: SeUndockPrivilege 2720 wmic.exe Token: SeManageVolumePrivilege 2720 wmic.exe Token: 33 2720 wmic.exe Token: 34 2720 wmic.exe Token: 35 2720 wmic.exe Token: SeBackupPrivilege 2016 vssvc.exe Token: SeRestorePrivilege 2016 vssvc.exe Token: SeAuditPrivilege 2016 vssvc.exe Token: SeIncreaseQuotaPrivilege 2776 WMIC.exe Token: SeSecurityPrivilege 2776 WMIC.exe Token: SeTakeOwnershipPrivilege 2776 WMIC.exe Token: SeLoadDriverPrivilege 2776 WMIC.exe Token: SeSystemProfilePrivilege 2776 WMIC.exe Token: SeSystemtimePrivilege 2776 WMIC.exe Token: SeProfSingleProcessPrivilege 2776 WMIC.exe Token: SeIncBasePriorityPrivilege 2776 WMIC.exe Token: SeCreatePagefilePrivilege 2776 WMIC.exe Token: SeBackupPrivilege 2776 WMIC.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 1880 7zFM.exe 1880 7zFM.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 1780 iexplore.exe 1780 iexplore.exe 2032 iexplore.exe 2716 DllHost.exe 2716 DllHost.exe 2716 DllHost.exe 2716 DllHost.exe 2716 DllHost.exe 2104 iexplore.exe 2716 DllHost.exe 2716 DllHost.exe 2676 DllHost.exe 1000 iexplore.exe 2676 DllHost.exe 1000 iexplore.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe 2748 taskmgr.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe 2036 Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe 2972 Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe 2972 Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe 1780 iexplore.exe 1780 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2032 iexplore.exe 2032 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2104 iexplore.exe 2104 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 1000 iexplore.exe 1000 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1000 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 1292 IEXPLORE.EXE 1292 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 1000 iexplore.exe 1292 IEXPLORE.EXE 1292 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 8 IoCs
pid Process 992 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe 2424 Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe 2668 Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe 1892 verifier.exe 2724 Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe 2368 Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe 2480 verifier.exe 1532 verifier.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1684 2628 cmd.exe 35 PID 2628 wrote to memory of 1684 2628 cmd.exe 35 PID 2628 wrote to memory of 1684 2628 cmd.exe 35 PID 2628 wrote to memory of 1684 2628 cmd.exe 35 PID 2628 wrote to memory of 1488 2628 cmd.exe 36 PID 2628 wrote to memory of 1488 2628 cmd.exe 36 PID 2628 wrote to memory of 1488 2628 cmd.exe 36 PID 2628 wrote to memory of 1488 2628 cmd.exe 36 PID 2628 wrote to memory of 2868 2628 cmd.exe 37 PID 2628 wrote to memory of 2868 2628 cmd.exe 37 PID 2628 wrote to memory of 2868 2628 cmd.exe 37 PID 2628 wrote to memory of 2868 2628 cmd.exe 37 PID 2628 wrote to memory of 1048 2628 cmd.exe 38 PID 2628 wrote to memory of 1048 2628 cmd.exe 38 PID 2628 wrote to memory of 1048 2628 cmd.exe 38 PID 2628 wrote to memory of 1048 2628 cmd.exe 38 PID 2628 wrote to memory of 992 2628 cmd.exe 39 PID 2628 wrote to memory of 992 2628 cmd.exe 39 PID 2628 wrote to memory of 992 2628 cmd.exe 39 PID 2628 wrote to memory of 992 2628 cmd.exe 39 PID 2628 wrote to memory of 2948 2628 cmd.exe 40 PID 2628 wrote to memory of 2948 2628 cmd.exe 40 PID 2628 wrote to memory of 2948 2628 cmd.exe 40 PID 2628 wrote to memory of 2948 2628 cmd.exe 40 PID 2628 wrote to memory of 2972 2628 cmd.exe 41 PID 2628 wrote to memory of 2972 2628 cmd.exe 41 PID 2628 wrote to memory of 2972 2628 cmd.exe 41 PID 2628 wrote to memory of 2972 2628 cmd.exe 41 PID 2628 wrote to memory of 1496 2628 cmd.exe 42 PID 2628 wrote to memory of 1496 2628 cmd.exe 42 PID 2628 wrote to memory of 1496 2628 cmd.exe 42 PID 2628 wrote to memory of 1496 2628 cmd.exe 42 PID 2628 wrote to memory of 1544 2628 cmd.exe 43 PID 2628 wrote to memory of 1544 2628 cmd.exe 43 PID 2628 wrote to memory of 1544 2628 cmd.exe 43 PID 2628 wrote to memory of 1544 2628 cmd.exe 43 PID 2628 wrote to memory of 2036 2628 cmd.exe 44 PID 2628 wrote to memory of 2036 2628 cmd.exe 44 PID 2628 wrote to memory of 2036 2628 cmd.exe 44 PID 2628 wrote to memory of 2036 2628 cmd.exe 44 PID 2628 wrote to memory of 2804 2628 cmd.exe 45 PID 2628 wrote to memory of 2804 2628 cmd.exe 45 PID 2628 wrote to memory of 2804 2628 cmd.exe 45 PID 2628 wrote to memory of 2804 2628 cmd.exe 45 PID 2628 wrote to memory of 1456 2628 cmd.exe 46 PID 2628 wrote to memory of 1456 2628 cmd.exe 46 PID 2628 wrote to memory of 1456 2628 cmd.exe 46 PID 2628 wrote to memory of 1456 2628 cmd.exe 46 PID 2628 wrote to memory of 2360 2628 cmd.exe 47 PID 2628 wrote to memory of 2360 2628 cmd.exe 47 PID 2628 wrote to memory of 2360 2628 cmd.exe 47 PID 2628 wrote to memory of 2360 2628 cmd.exe 47 PID 2628 wrote to memory of 3040 2628 cmd.exe 48 PID 2628 wrote to memory of 3040 2628 cmd.exe 48 PID 2628 wrote to memory of 3040 2628 cmd.exe 48 PID 2628 wrote to memory of 3040 2628 cmd.exe 48 PID 2628 wrote to memory of 2668 2628 cmd.exe 49 PID 2628 wrote to memory of 2668 2628 cmd.exe 49 PID 2628 wrote to memory of 2668 2628 cmd.exe 49 PID 2628 wrote to memory of 2668 2628 cmd.exe 49 PID 2628 wrote to memory of 2168 2628 cmd.exe 50 PID 2628 wrote to memory of 2168 2628 cmd.exe 50 PID 2628 wrote to memory of 2168 2628 cmd.exe 50 PID 2628 wrote to memory of 2168 2628 cmd.exe 50 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System kkwldujgyyru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" kkwldujgyyru.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00277.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1880
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\Desktop\00277\HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "Update\cd482369-09b5-4f6f-929d-87c40c6be1bc" /F3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\cd482369-09b5-4f6f-929d-87c40c6be1bc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp514587445.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2504
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "Update\cd482369-09b5-4f6f-929d-87c40c6be1bc" /F3⤵
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K "C:\Users\Admin\AppData\Roaming\oougw.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"5⤵
- Executes dropped EXE
PID:2788
-
-
-
-
-
C:\Users\Admin\Desktop\00277\HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1488 -
C:\Users\Admin\Desktop\00277\HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows4⤵
- Interacts with shadow copies
PID:1616
-
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exeTrojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2868 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exeTrojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe3⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:2612 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:956
-
-
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"5⤵
- Executes dropped EXE
PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe" > NUL4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3020 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe"5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1920
-
-
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exeTrojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1048 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exeTrojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exeTrojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:992 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe"C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2724
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:900
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2104
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exeTrojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Windows\kkwldujgyyru.exeC:\Windows\kkwldujgyyru.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2220 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275468 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275491 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:2503706 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\KKWLDU~1.EXE4⤵
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\eventvwr.exe"6⤵
- Executes dropped EXE
PID:584
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00277\TROJAN~4.EXE3⤵PID:2676
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exeTrojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exeTrojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1496 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exeTrojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exeTrojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1544
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exeTrojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.bil-73770d505e81cffd36121a113c79e3aff7d757f9c1167660ca3a7e216bc6a892.exeTrojan-Ransom.Win32.Locky.bil-73770d505e81cffd36121a113c79e3aff7d757f9c1167660ca3a7e216bc6a892.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2804
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exeTrojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1456 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys3B3C.tmp"3⤵PID:2524
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exeTrojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2360 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2184
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:209928 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys1FC0.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exeTrojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys27EB.tmp"3⤵PID:2132
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exeTrojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:2668 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe"C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2368
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exeTrojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2168 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exeTrojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exeTrojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2104 -
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe"C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" process call create "cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"4⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\US63A-26XHT-ZTXTX-HTOKT-FYYYY.HTML4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
-
-
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exeTrojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2424 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe"3⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1892 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2772
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵PID:2808
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:1072
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1812
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt4⤵PID:1952
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"4⤵PID:2388
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "verifier.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:700 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "verifier.exe"5⤵
- Kills process with taskkill
PID:836
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2604
-
-
-
C:\Users\Admin\Desktop\00277\UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exeUDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:840 -
C:\Users\Admin\AppData\Local\Temp\ebfcabfbdfja.exeC:\Users\Admin\AppData\Local\Temp\ebfcabfbdfja.exe 8#2#0#0#4#9#2#0#1#6#3 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3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732295203.txt bios get serialnumber4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732295203.txt bios get version4⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732295203.txt bios get version4⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732295203.txt bios get version4⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81732295203.txt bios get version4⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 3684⤵
- Loads dropped DLL
- Program crash
PID:2244
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2748
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3068
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Windows\system32\cmd.execmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
PID:2264 -
C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe"C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\verifier.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:1532
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2716
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:2760
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2676
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1796
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵PID:272
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD511d0daa62fb3cc8f2663d4f1b24fc611
SHA11abd540eeb22b121ba206ae1dbc4e256d77aa97c
SHA256d25140050e792a8a84f696a15ee55d17c15b08b32e8fca87267735648aa53c53
SHA512b0caaa24e722b1fe90d69f203678caecf06db3c69764efd90b5daa31612efee02fadec09d92c89ea1fb26446fba7debeaa0367181099fe37c2c88382f6079723
-
Filesize
64KB
MD506859260a4a1508a5305de550888ca4e
SHA1763e8877e5a4889bbf70de0f9b4aecfafcbcf03d
SHA2569e610cfe1e47e7149a886fb782195393ab8bf9c31d1ff628b703d55b32543cea
SHA5124696df969bb23739380554624ca8823a6beeef3921d9d789aede6cb14183f4bb358e9d0e236b2846ddee2b5510db57aef11ed3a2fe67d5e2eb7316ea888b7140
-
Filesize
1KB
MD553e3663834dbbfb72c973f61ccafc06b
SHA10495155c571a25a114763d24de07d2d415577305
SHA256a744f1800bb8f173f30e2e07baf2eea4da1412d200d743c70c59ae1a5eb90799
SHA512f344c624fa115d7b6411779901b04af2508472ea8f18a194b1d2cdf053fa8a6290abb19e2560d7ef60a39ca4414251980e9202c148fd95a97390f7010338bfe5
-
Filesize
8KB
MD5ef861e8a98c7c9e2f588fbc918b9efd1
SHA171a28e36360fa6f64a884fa678a6f37a4f391d0f
SHA25625eb729918d863393727f612807a1532e4a469586c14d8fead5d24831acd73b8
SHA512ff42e0d25998f55fe6f85b77f0b35572b5d3c15682488d4839eea2273718ab2d594b8823bbb30668e86272d35195c8d9705cc69d339327628c28b6b8b8969f04
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5223ef280e938c6c7d1aa534055a70bc6
SHA12643bfe24a8519d6dfaa341ad661c0712c2e76e2
SHA256866c0bb24b8a9147852c6a8390605a04e9c3d2b9c126284b3224d1324aa9957a
SHA5124fcbdd8c27eb608a2d1ffa9694be8c4c318f7a1b7cbfeddefda8c4c30ed4eb258fe242127012e1344ab21110a686d6112657d2acb1038a170fee3c1d305301ad
-
Filesize
109KB
MD580fbcb02925e0dc9ef635fca2f2ad659
SHA1dd571c46238d9f907be1f03b1e6fe3577af13e74
SHA256462e59ffd7dbc3e2f0e3a5803c9a8addcd2c7f743bc95d8dcaff6412d35b2775
SHA5121537bd723911cfc53e499a129eea71debff2e60395888b809e99670802ea4133df643c59f59ad4a3913a428c304728330616f97b7cdcca0baf8c2869a78b0c31
-
Filesize
173KB
MD5a0fabdfff26a7fc639720cad5645609f
SHA12affe318d0727d527f6df3e7814e1cb97d415d9f
SHA25673b1256bb061515af283de072ee48ce43ba32e4ce051c4fdaa7d069817c0357c
SHA512bd59a345c06aa6d2cdd407f2645dc67bfd47e84fe55024e7667e3fd164350da38756714dc277ec30e42d60488d286d054b03d13e43e5a2f82e170c64cf0b9ee7
-
Filesize
8KB
MD5fe428b8a7011b03fe2fdc16482ea094b
SHA1d5d84aad977e312cbc5fd1d4f8d1825a62eb2b8b
SHA256c29255f38ce2dcd5ad700eaa341bdc829627181b90ccabe738f5cb7941674933
SHA51271753a3ee19ce5d61841bf7876b14219eca8db3f17fa83e8e161241734d9770258c37dde9f6a885a31ed7ee92e7c6d9b0fe5071c8d68a03be7e2f0fc13b7cbc6
-
Filesize
8KB
MD55e8b19d4ae7688491aa911744b199cc5
SHA1c632049b2e3fb8d8afd1cca261443b0d31acd53e
SHA256d2fec4770bb8c91285e6b2a46535f4a3cea025754be32a074f00f3e3b8eae3be
SHA512df2d297d11678c6a3070bd8e40871bfafd5a7441616f6ad8700312c27fe0d0f70f26e6a06349c2cb8e01c8d18e8319b98fb662393db00b234f1930fd1cfac91b
-
Filesize
46KB
MD50fbba348b5f84ff69648a6840f11c43d
SHA1701edaa92c119c292fba97607e8d1d63e989ea70
SHA2563a4f8c8bac9fdd2287ec6de741b20ca8e660a01b22a2c402b746d03fa69ca569
SHA51236fb75d4a91e7e442cac7c58053934d577783312afe393f297ca429338f920566d74a7aa1fa6566016a548c3592fa5761e09a23fe443c3383b2055538f5613a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340aed020afe70528b69afaf9f1e5d01
SHA1ad24c3530f2d3ef49646f9144bc917dae85f5bf9
SHA25690216a6d896eed0e66ea93da1703570d8524f54cb2970ab15f99d2296a579f0f
SHA512799f001350078686a629833abfd70973f45d3e406a1ed64b431c12c9ea9e2930eb35049427c118f16deac6954e01c2c29a47c55732e83418a79194d90ba6e169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588cca59b409b1af4c38b0e37fc2de904
SHA1e043b08657ad7689bc2dd3ee472f3652d569035b
SHA25640e19894ce870edd741f9853dee521724cc71481415d52f84e2b76d7225cabc4
SHA5124fc8cfc2b491c608524920be15beefd9049b2762c20bfd33c173e6ed1d1cf8a9b780faa0fa6caddca7ce07ce6334b144814e44601e581835ac5ad3078305683d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d71ff6f53a19e9fcce0ceaf13d8a9b7
SHA1f285aa00ae8f2d2d46401618853d0e94533ac84f
SHA2563c04807614df0788394cfc24101b2e5c0f61227de0b6f983520b11ec30241352
SHA5124523827201036df0bb89fc041c94bb01191331c514d0cfe5ff1b3202e7cca4ea12b9e191fde22eae98074cc1a8d938789053f5271317a01b18edd234a12f99e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597edbcd1501c549b435d4a555946e307
SHA17b66d0b31cc6a203d7fe54dfe3f4baa32afddd80
SHA256b2fe5b80dd9c71996d866534a52cb74e1a28fbf394b36be5ceb92db13762217f
SHA51279ce84d0bdd7d38aca7b8c8c32ac6f8cfb00273418f80d4f79054e300e0315ce1a1500b908cde4e533d3a7db215aec96f767605a720dc926d73270a39fd894b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593050cdd5ed7209598ba08bf9f196be5
SHA1136eba45edbabf7bdc3f804e9c8b743c2514498b
SHA2560d03c437c255dadf1120977e6ca071d8dea68b7898b90c315eae0e8062ce8b71
SHA5126808b51884f37d2c08443b08ef2e292f40028dbaa9439ebfb804c8cb61054d5ff0829d831d6d91a1c32ef4274b5fceb150303c11ad73c20908980fd3effd2545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4efb4250d555fc990fa09b2b425aea1
SHA187b0a309677a3ae079e544fb2de74019c448a2ef
SHA2565d46e4112b44e1d0050cc39090d2c8e505400ffc6b86397c37ecde884aad7def
SHA512d0a9543b8990a00b0adc93fe87b82b0dbae15016552b29cc198ecbeed1b08e19bbc1412c6d4b90982bfc6922ed065a8459f2ce3d26322dbfd9db3ae64ba452a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a42262a0f146b9ba3f77c51f585e505
SHA1a33d95b594948c436845f2463786ec1246f2a804
SHA256bfa29a8abd11e97f4d122ef9974c47acb6f7489809da39ca78c52c265525b52d
SHA5122979984130432613f636b56bf3bd5e598853e3a4a197868653659cd40881941e1a4ca3c73cfcf8c0ea2a627640093c0ce3c0d16ad8478ec565e85e686cd57d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7becc3931abb5242072ca3f1b7b146
SHA1cd3d87cb63473306f2b890094d6c54883ddd13b0
SHA256560473f1b7fefc45cc9fb310debe9ac793210d578ce43f67c636c20a39b60fa7
SHA512776f5843e0732b0c9bccc0ce1a31c7f9dc4952c5755d763e1297314e1eae87407197c28a3710f02856b1cee1959b306cc081a1615ff679018e92eb27d1ba2b43
-
Filesize
58B
MD5f8e2f71e123c5a848f2a83d2a7aef11e
SHA15e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA25679dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA5128d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
120KB
MD57af0795840b6c47bca838f6781035606
SHA1967e6b0965c2bac5267dbfa3f34840a199af7a1a
SHA2568e0dff8751a24f3da65e110955a29118737100c6324f07aff5dd8a4a0390e818
SHA5120b3e0f8e13c2776943f23e5be532b3e166a645a9480cb329182a269ba138a977d6f042f9e02e404ef0aa6dc6bb8da0119466e3d0f509c01d575d428f2b84f028
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
20KB
MD5f33ae9add6b4c281a34b4169ae644d51
SHA1c0d7ea92038c2554e088436a0d1444614dcfafc6
SHA2568c96f36a9e70e21a87c06006754b9ca2416bc37afe90850346947c781d634292
SHA512f5912e7c5bccf25da2562ce18414493b144db78f1c1fcd3d4d076195ef06753a7764865e89867a23c6b5d5c844a931fa516c5dbfb73a40c56eaf3ce2042bab0f
-
Filesize
70KB
MD5d9fb0839c496f06e824e3a5c41572462
SHA17978f5ac7ec69d8e33751f8009b37279db50e455
SHA25655d7dac32b8533e26549f776bd3ca7c87b359fa7de9bfeee1222dec381a8d98c
SHA512038c604625d6e08922b9befb412f0922de15c0e9cb5118b91419c03b10f727e91c06a0149a80e5acc5f3b976c3f807264d1e5bdfe5fe947962623d0256d731e4
-
Filesize
1KB
MD5447d9d393978e3527a3fd0f5ea79fb00
SHA11068eb5eb9754069928d5e1d5d3c14c7150ee69b
SHA2567b52d3f1fd7af8251ed8318326a9b660972144e2f936d1d8f17c3ea5add49398
SHA5122211acdbd8a48eaa42cbda819ef529defe5839d9a865d746adbac2925daaa0dc1b6e1a4dd398c3b1b4f3498243326361e085a3e6653062af1dd8113b0bfebb1b
-
Filesize
822KB
MD5d8c6e1768c5cc4414591ed040ce533dc
SHA1e51c96f29ade1fc79635706bedafaa1e301c992b
SHA256312a521d60cd54cc6d419d1b1dcc3e325d64003805fbd4bce68f9f54878d509e
SHA5128fc7a77b9da4980629fb63df014e3928d6398e9deae3c159f862d37588796dff8f420ebc347716017042e1ae6eb8ae8fdddd110ebc34f118b0d5abfc9f64dbcd
-
Filesize
12KB
MD56a1bbc0f07191c4f250f6320c1e3d807
SHA180e4ca200384779f5086baccc69f41380a0372e1
SHA25690238e1b3a1dd9bed97871e1328c57c6c691b6ace5cf763a2861223ae633d8f2
SHA5122694f300e2d01584d843d07dad7de7268c75b770fcf821e73d6388b791859771bb3e311a20c931114681571c9f790705c52dc19b6eb74e35cc4427fcf4245932
-
Filesize
10KB
MD5425b049e2542218c7ec0b13868796a7b
SHA174d1cf978af3f06ba5dead81d5a7175cc85720a0
SHA25650552400af8cc246e507e92437527fcce55c6058c32a5cdad3198721a46c2c92
SHA5120645a34984118e64eb6283bfa8f6295adc82b3a1e73c364aa38abc87ee442237822c972971122db30b8eb2f714bda4b1379b5211efadecbf6117f8d2202d02bf
-
Filesize
85B
MD50d6c1cf91ceb2e7ceaa3696363a7114f
SHA1477abf7b6abd97c2afa9a1acb1d414c5f799e607
SHA2562f7fa231bc5988d50952da83c72e745adc984fe0af0528608265b6faa7d97ddb
SHA5122bd31fe7b95a8de9ffb9cf86a9d7e91b53d93198341c2cd521c59fd64034498fbe021d201c2ade7d786af9e3b2266143273eafa8626c1eaf5f0c59949a96a26f
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
C:\Users\Admin\Desktop\00277\HEUR-Trojan-Ransom.MSIL.Blocker.gen-24edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee.exe
Filesize822KB
MD519927de468f347a363e4870c20550b7a
SHA1e35db8d3990e5cf21664e3769679b0c082d04886
SHA25624edb45b9af68ec237eef33dff1f9253e1e3e3232f56a6d0c4336c0e4e816cee
SHA512af6f7f2a66d63f2e85f2448bdd4f6691a1dc0ae1f28520cec308dc622c59f6e07d3527d0f5db08a829888089f7a809ed4b49c994176f979dce907b0a549358a7
-
C:\Users\Admin\Desktop\00277\HEUR-Trojan-Ransom.Win32.Zerber.gen-39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba.exe
Filesize901KB
MD5b7938b29a73c948e483937740e10f679
SHA12d755deff735ba94063d486f2786c2481610e2f7
SHA25639a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba
SHA512bf5d9c0dc1d5d1579f103bb7cb2460a1498c78f61ac09b330aaa94da83ace54947b47f7db7455f25cef53b238f7626fab16b96e32162a576be8c59bd77bbb64c
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Onion.aftx-2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75.exe
Filesize280KB
MD5541364a81cb365be420373fce3d1f19b
SHA1fffb124ed79715769e61f793cd3b47458ab74293
SHA2562a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75
SHA512c19e4d702ea3656b1f73ff263574459fc572f955dd7b492efe7f360659d93739334d669edaeeb15a0589490d67092087f7349bb964d426bc86ee412480a08732
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.NSIS.Xamyh.dua-4fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e.exe
Filesize120KB
MD52d4cf97c8a7cc2189f684223793b209f
SHA159411aebce8a2153a072d8f7c9d0de56955d6e09
SHA2564fa6bce79ebda38216d10a674bb7c1a091b8cace3bb6659f6813478b0e400c0e
SHA512d8c40ad260bc89e4ee92d0f344a4e6047fde9f6a0e15be5390fcbcbb9604d4a7c8d5e96c7f510511eda47de1e66c72bcefef3ca4ced74bcd17cc00c01ea868d7
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Agent.ivn-26e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071.exe
Filesize324KB
MD54a6e3d45e11bae69b64fc879400fcdb6
SHA1bac9617738d21da4c3902d98b070bb1b3e0f13b9
SHA25626e30e2bc99883e065cda7b0c1ce3bbf73a09010e63e028a7b246a995aaa1071
SHA512b5c5d3010c69422a7bf85db7888f71a864d627e6b6a470cd15e4be2e51e5360f7cec7bcc1f644358590b94bf1d5cc5af866ba2e1bd6590cd771c4531d5310720
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Bitman.qmf-f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66.exe
Filesize395KB
MD5768b7c67279b8150af55964fdafea7f3
SHA1ddafb6631617bb73b9de8c5aaa0354e973f60d78
SHA256f3a753f279d913d3b5712da9697c859d547cbb7c90e110cc73d150b0af751f66
SHA5121ab6824e7ddf1ec494882afbcc8d21872915165a9d3a6f0673ea588da53f812f64927576d8a7fc30025e5f97605565fcfdb4e545468c3541d4e110579fa555b9
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Blocker.aimw-c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119.exe
Filesize66KB
MD52d71958e815ec87ced9f101335e6d7ce
SHA159c9cbe7a0b220288f79c5e15185537cdfe3a7ce
SHA256c3fa3aef6c645c4f490d2ad76d227d4dfc9ddc4987d1186caaf454f4e7a4a119
SHA5126d9a013e2f83388c3e0f591a9e4478ac36b71276a8c061cc3c5fd15fc84c26d96fb8fe1407cd893be08e3ba848cbe1e2a90cd2e3027304a11581ffcbd7d282bc
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Crypmod.yef-5538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a.exe
Filesize186KB
MD5a499e8b3f700654697859e4830f26892
SHA11f529c31229d18515e38a7a76a14e70d27fd7d8d
SHA2565538363b2539e01e0799ae6d51646dbaf18be461b65213ba66f423b5f4c5e62a
SHA51297929bdacd513c09eb27e945d64fcf6a3391fb0c95f2d18ea8b8460cfcf15c62afcecb911c1bc31207dbb6f20fbd9ed70e7ca2891e0bc075513081a77b58ac6a
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Foreign.cklf-abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c.exe
Filesize125KB
MD5e5daff8de9c6cce065b48df0e331f3f8
SHA1242120453e137c918255844d60b3a041fcc6e619
SHA256abce23a6929ac4ff694debfd6f25780020f0b4381f83feca6b10dd84f63aa05c
SHA512f0d7774b47c4901a6047ca573bdabb223569f0a373a4cb5e4af09af9d969f9347e64fdf6cc2a78664db17908af32388dc30900338a2e17f70d11ce89236cce67
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Foreign.nipz-03940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473.exe
Filesize276KB
MD535346d1dd0e42f7d627b931af9b782dd
SHA1793bbeda1753b214545372130bdfe0519c354ce1
SHA25603940eab794fd3ed646504ac1ffe2fbf5b73e73ed2f8c2269a7765cd23257473
SHA512456d55811f0162b94ee48d89202b7616b19b768dcfef6bb420ad32d2da1502d5026c1f3b7d80dc69db46890c2abc7760966001b916518e199c9c226499d05749
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.bil-73770d505e81cffd36121a113c79e3aff7d757f9c1167660ca3a7e216bc6a892.exe
Filesize244KB
MD52eaaf55025557ec654e05ce2e849f7b4
SHA14c4ae369cf7ece53e612da08db4cddd9989a327c
SHA25673770d505e81cffd36121a113c79e3aff7d757f9c1167660ca3a7e216bc6a892
SHA51244f00ff06420d2cc1b4a76ed74fdad2d1c27fbd477760a05b5558b738d3b84ec9b5e8f1a5824a384b9a32a8742081fa5b0f268f068ccb0d185b6b440a914247f
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.xbq-d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f.exe
Filesize348KB
MD5bc4a269ef127d108659149b6058ac7d8
SHA16e92d9c37f2325a6937a3416b1084fa6cbbfa0b9
SHA256d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f
SHA5122baf73f8860247a6ac352742e4abed159c20ccde2cdabf5dcbe509843b821e90c149fcf9f841e35d67113561a74729239a896c546ab238f497d193dfc98ed995
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.xdt-13302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537.exe
Filesize524KB
MD54be3deb2244ef733b4cc0acb71137481
SHA16b82b0f3dba275ea3b104bed6c4a35372cb7fb32
SHA25613302b92d75ad29f88d8a0330c153ed0c5156c659a129e852251a3e3552f8537
SHA512543cd968bceb879e2b3ee66373900d0cda9d5934b1deee9c18c6408070574c193b96429ddbcda0b876e994551eb2d03c009d3ba81d0412d1fc2ec39b10bed77c
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Locky.xem-b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517.exe
Filesize313KB
MD58ab71e1a19ad7cb1e79fb8b1bc3cab97
SHA1711473b4cfa62d4d0243c598ef47ce4c481c274d
SHA256b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517
SHA5125cda8dd5de270e3400f21e903b4031d33bcc095b7ace742b7b48cb183692986968022e9cd32463f2390b10c6facca9ae74d16b965b28741a7933930ca343cafb
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.SageCrypt.k-10aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea.exe
Filesize300KB
MD50479f04f439101d0e21187a633afe7eb
SHA13d235c9708cbabaf47e2c663c131acb91bd5e645
SHA25610aa206bffbda3959773554bd14447100719e07a6002ff6ffe5697b00697beea
SHA512bbeb8cdfa9c4e6aea6ecb4055ed81d68a893c3fc7d155bce2e15b3134eb0b566774974cd7b42dcc036a53958a993cb941afab0db44d1e4c1a2f3c3a46ddc3e4d
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Shade.opq-ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8.exe
Filesize904KB
MD5e7843fdfa17a9fb7600832f383185c3f
SHA1dfe099d2d4c38ff39c822a16338e0e788d73396d
SHA256ca4727bd4e0147e0218ade8603dd6dca3c2d71dd800d4b65457528e944fc74b8
SHA512f6b02eea25c69f1cdc31972dc809d280288e5dcf7e979f2495895cd3e65b51ef46162a9232722ef4c46a9542eac58149665bed0cea43f7de786f58425d301b8e
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Spora.j-175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911.exe
Filesize72KB
MD5b66210f925b50bf531c0ec042f12889a
SHA1a6dd8fabc0a42c81cd34bace88112fe40e5e0435
SHA256175a8c92c16d6104dab04fb9e93c2ab3245d2888773abc903f013f4530f61911
SHA512d2b09294429668320bd8352427a878ccbc22d198a129126b9e3a83e6282892fbf3faccac78dc555136d3f4cd560a2a79918e9b3e817227f91d18ebfe0f236a18
-
C:\Users\Admin\Desktop\00277\Trojan-Ransom.Win32.Zerber.dsw-d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe.exe
Filesize710KB
MD5046c31b39dfd7efa5529d967d9da0cd2
SHA1a8dcf135677807e411fe238ca3cdb161904f0615
SHA256d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe
SHA512c11c66492e6d20c589bfd41d904782c9a7c9fcd38461e5c7f053cb3d9f4eacacf386eeef1c6b914307c5ef630db5e3a3e8c4ba44bf9711549fbc388334fccc5b
-
C:\Users\Admin\Desktop\00277\UDS-Trojan-Ransom.Win32.CryptXXX.sb-50c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a.exe
Filesize556KB
MD5667343b1465c9bc97c13969100ca260f
SHA166a7abb707dec859ba532d536fe1c7042dbbc852
SHA25650c9e2e7c86b4a56bad74486f02a92a5a1b2c8976e597078988a70774d1e610a
SHA512bcdf36e1cce4b554ce5f8cd482f29b3835c3acb0e56098387cf60439c37ec5bff1c760219385a663b0ee14d445c2cf49f27ca6223832dad19105b6051d65b76c
-
Filesize
702KB
MD5047cd91f3411d82578e2929b695d2adb
SHA10c195899ecb4c31ce72f5d01a2be818aa288eb40
SHA256ed58e3a30403b4615d533020843d2a9d21bcfaa32f027e9e5e6b4a6f74213b13
SHA512ca82e5daa54d839b70d728264930e335e9f94494766541362cec265cfddba3a4554bbf1a98798d0e89814bf6f99da8216cced1a9ed07a28673e7957ceaaae744
-
Filesize
749KB
MD599eb6b87871ef1fe89a1245c4fe816ed
SHA1c3bd6e576acf7cbc5976a7ae2e6f12323a2def19
SHA2560dafce314e66d2a2d5ae6a309031727cd63f29aa0b66a23a9804aae5d298f713
SHA512c4459f3105c186aef3532f9cb1a8f6b15a7823ee9c82ac46ffacabf6f964069f377aff31eec919deee8fc8f01287dc57a0da51ced855580c8a613947eea03018
-
Filesize
9KB
MD593b49b4df8ec320c729d2ca40cb2daf8
SHA14182846dafaa46d9215d6705a6ac9ffda702d997
SHA256a0310d94c76598c5c8ae42536718cc230f5096815e2d7c158be522da632fe1d2
SHA512cb2ac69ff946f66bd19ec7b71c656b0dd6ce3e1d35719688c0f8b490475e5e96804c09d1bd036d4d1e96de578adb9c2170b699793f0b5e7db192f8c360b2ac73
-
Filesize
255KB
MD5c4ac9ec2785defaa98a53a09c6050535
SHA1c36a8612d96c327a7cc3f59d60acd19765cc591f
SHA256f59ed1c5442d3727d0762f76e41c68656c3b298216fd045546bf35cfaa321f60
SHA5124259696dce109ca124840f367fbeed0f3b608dfc4f048a384e2b3e210bf3d541771554e68c416059dfade81eaf9092a07c053d8ff3af40ad276746800031c9d9
-
Filesize
1.1MB
MD5f2107fb299791e6e3c7638ad3d6b52d7
SHA12f550c0c4a07d83577bf40205fc4eb03333b4ff9
SHA2569796ec8134b7bf1789239957ccc0b9ae57d455b53d80f0b2e8d22e55e39a4d41
SHA512b761396b7ed88f1f4887ec30e889fc4e5c932a6f75c5b9801cfc5cf632637e3167ec374ea5b4f3cd624fc8cf9049b5bbfbe79dde966f14fd1f517066f88bdc8c
-
Filesize
8KB
MD5a7a583de9757b5d7257c45a93ba7c0c5
SHA1b72e79a4dd401c3f12633c55a29d8d65cbb8f438
SHA2565ddc32d68e8c72325b7cc9ae7dac86b5de91987f4c998061cafa8f09fcd985a8
SHA512b91d1f6215a539a0a72272259f59639875748c48574935bd59aa21a83cd331f45bde3086ab4b3be73bb121f95a9621226c97e3f4c7b8f7f337a14b82939791a3
-
Filesize
14KB
MD570ab28da110abd633a304eea28808bc9
SHA1f603d5fa31363e07d909222b76da8fcb2c640324
SHA256b9f8a1af8f9b4771d8ebcd8aa604704c2126d89a2b4cc6183153c169a3b1213f
SHA51221bf5238621373b413eb534c5b2f850ad210384784e710245f4b38649f942415399cd47ed3b78520b25092f25c32b4633fc047451ea240010ec8171d7dcf13d9
-
Filesize
5KB
MD534d0d153c7a85da24665d31e88cc0ee9
SHA19390d19a5acfafb08f4d830a1e78e018a1ab84d7
SHA2569ede9190d7a54ccc59cb3a98b190528f673814f80ee93f3bc8a51bd4f2154755
SHA512e76eaf6cfbccfb2cede7061cbc17072d9a39d7fc32625a46ef9f8c158807e83b6b4c221890e84a5b0ba9412d052633aef42e282495a1ad4a6d8ac2f7cf541560
-
Filesize
764KB
MD5bac0e870bbef72352500bb3c0e457c5c
SHA187667f6d54a20c1f6d94feff060ff50c4c23f9da
SHA256ce240c731a475b319852b0ce48127bbfbcdc75412eeff3b670bf5fcda6034aa1
SHA512aa5a9adc91efda6af7644a3a154623d5ce11058d2d748f2ffe16690e4aad714873ccc6c152d97fcd83d2f7215712c8fd01cd8fb74dcbdde398c62bb0a796d722
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a