Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27-12-2024 23:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/orangegrouptech/Biohazards-from-orangegrouptech/raw/refs/heads/master/Ransomware/NoMoreRansom/NoMoreRansom.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
https://github.com/orangegrouptech/Biohazards-from-orangegrouptech/raw/refs/heads/master/Ransomware/NoMoreRansom/NoMoreRansom.exe
Malware Config
Signatures
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 5800 NoMoreRansom.exe 5884 NoMoreRansom.exe 6024 NoMoreRansom.exe 6044 NoMoreRansom.exe 6104 NoMoreRansom.exe 6124 NoMoreRansom.exe 5152 NoMoreRansom.exe 2728 NoMoreRansom.exe 2352 NoMoreRansom.exe 1300 NoMoreRansom.exe 5704 NoMoreRansom.exe 4968 NoMoreRansom.exe 5140 NoMoreRansom.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3506525125-3566313221-3651816328-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" NoMoreRansom.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 raw.githubusercontent.com 26 raw.githubusercontent.com -
resource yara_rule behavioral1/memory/5800-217-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-218-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-219-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5800-223-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-222-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-220-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6024-229-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6044-231-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6104-235-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5800-236-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6124-240-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5152-252-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2728-256-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2352-260-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1300-262-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6024-263-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6044-266-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-269-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6104-270-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/6124-273-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5152-276-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2728-280-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5704-284-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2352-286-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1300-288-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4968-293-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5704-297-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-299-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4968-300-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-303-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5140-315-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\82815e9b-ee93-46f4-95eb-7b714fc5f2c5.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241227230054.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3506525125-3566313221-3651816328-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 3100 msedge.exe 3100 msedge.exe 2200 identity_helper.exe 2200 identity_helper.exe 5624 msedge.exe 5624 msedge.exe 5884 NoMoreRansom.exe 5884 NoMoreRansom.exe 5800 NoMoreRansom.exe 5800 NoMoreRansom.exe 5884 NoMoreRansom.exe 5884 NoMoreRansom.exe 5800 NoMoreRansom.exe 5800 NoMoreRansom.exe 6024 NoMoreRansom.exe 6024 NoMoreRansom.exe 6024 NoMoreRansom.exe 6024 NoMoreRansom.exe 6044 NoMoreRansom.exe 6044 NoMoreRansom.exe 6044 NoMoreRansom.exe 6044 NoMoreRansom.exe 6104 NoMoreRansom.exe 6104 NoMoreRansom.exe 6104 NoMoreRansom.exe 6104 NoMoreRansom.exe 6124 NoMoreRansom.exe 6124 NoMoreRansom.exe 6124 NoMoreRansom.exe 6124 NoMoreRansom.exe 5152 NoMoreRansom.exe 5152 NoMoreRansom.exe 5152 NoMoreRansom.exe 5152 NoMoreRansom.exe 2728 NoMoreRansom.exe 2728 NoMoreRansom.exe 2728 NoMoreRansom.exe 2728 NoMoreRansom.exe 2352 NoMoreRansom.exe 2352 NoMoreRansom.exe 2352 NoMoreRansom.exe 2352 NoMoreRansom.exe 1300 NoMoreRansom.exe 1300 NoMoreRansom.exe 1300 NoMoreRansom.exe 1300 NoMoreRansom.exe 5704 NoMoreRansom.exe 5704 NoMoreRansom.exe 5704 NoMoreRansom.exe 5704 NoMoreRansom.exe 4968 NoMoreRansom.exe 4968 NoMoreRansom.exe 4968 NoMoreRansom.exe 4968 NoMoreRansom.exe 5140 NoMoreRansom.exe 5140 NoMoreRansom.exe 5140 NoMoreRansom.exe 5140 NoMoreRansom.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3784 3100 msedge.exe 82 PID 3100 wrote to memory of 3784 3100 msedge.exe 82 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 1876 3100 msedge.exe 83 PID 3100 wrote to memory of 5088 3100 msedge.exe 84 PID 3100 wrote to memory of 5088 3100 msedge.exe 84 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 PID 3100 wrote to memory of 4124 3100 msedge.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/orangegrouptech/Biohazards-from-orangegrouptech/raw/refs/heads/master/Ransomware/NoMoreRansom/NoMoreRansom.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffafd4146f8,0x7ffafd414708,0x7ffafd4147182⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6368 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:952 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x158,0x24c,0x250,0x128,0x254,0x7ff704fe5460,0x7ff704fe5470,0x7ff704fe54803⤵PID:2844
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,15849645940959991010,3015564579412279600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5624
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6024
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6124
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5152
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5420
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5704
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
C:\Users\Admin\Downloads\NoMoreRansom.exe"C:\Users\Admin\Downloads\NoMoreRansom.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD524dada8956438ead89d9727022bac03a
SHA109b4fb1dba48ec8e47350131ae6113edd0fdecf0
SHA256bf1e5c7828e4672982b16451b5a201e65e812e98a97b87c9f2f7c22677cb4ec1
SHA51203f092a4b20a4d8cc111220b35fbf5470878b7723faeddee65b1d9cf327167053792c77864103b4530b9b9f819e32a5721b44189291dfdb5832769835ea5dd94
-
Filesize
152B
MD58b712a4c83dfb3c522d032cf900e863a
SHA14f5bec4be6f4ebfa959e899ceafc62309bb1f141
SHA25631da2a41a051db11559c47feb923d4baad32a384f530013a435fa884dad64493
SHA51203b24d9307623b3a341230805f3ea662b0107c314650a51ae7e89d901cb3ad212d4219bab4d763d0aa8d50831aa0e6d4e3379573cc2f724873804578e8642898
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
5KB
MD54f8f552a518cdf1b6bd50c41c67d8d91
SHA19db439642c1978c4e99299a599ac41d6e15e3f65
SHA25634be430613f8138b4ac08af1e2db1a156f56c4c412792158422ff24624c9053e
SHA5128bc155b49c962a29bc13b95f67e36e51c9c39a1d6dedd132b72a4331900ebbef0c4b6db66fff25003f9205d6e6d33efb72287c4ee2a784ffb15c057da37fd720
-
Filesize
5KB
MD5e1e5c9639341cdd4db93e8c766ff8a82
SHA19106e8f756d17ef7925c9426433634fa5b3a3626
SHA256722cded73e25313091376f85d0c75d3d87623842a3eb178812b20b4f845d6aa3
SHA51279a4a6c53e17bfd8ae3eb14de9041ceb1a30188d461c30d6a41779652f77d6d35a3c086f9ad01afa60767bb0f7101e9794751921fc021cff0e0410612a2e0840
-
Filesize
24KB
MD585eca930a791cbcb1373f5fdaf17857b
SHA1ffea7d54e9803374a484f1e4c124766e80024efc
SHA256fbc990061790350f00dc28f2dda277aac81bb8385a6e92e90a20101436c3312c
SHA5122ffe0de3f80ac60f2ffa55f334026979e6be328b7c69f4603aa3c5d1bfa6c3b3744d86ac2a34ecf904d0a41b36bc485392ece58f6cc89d7ffca293d02efe5bed
-
Filesize
24KB
MD599a7edf9124dba808b6d025b14aea278
SHA1f1de2fdd81ea87ee78e8afdc1a7cdffcf62a92ef
SHA2569d38a8d193a503b9be7b39be5d150bcf22038c84fbf3d53979e2f075a35b9089
SHA512fc371b7ad5606a9948ba4a315e40a0a93592f57103be4a3712020977b43e4277d95d74ff35e490239dbce1cc475fe1d1746764f5970d2e9f04483c985268f5c7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD514fb43c237d8ba774d0b7145f697082d
SHA1ab53902d35242134b189ac49d2ac573c799b180d
SHA25690eeda045fab23de7091c5f5ad4d5d7e80cd91aaf97d581d9a5a582d1ea18a80
SHA5120a8a62a32c7b8e6ff0feec38613002f1d769841c9d921c842e3e8287438182a5487c25caa42457c3037ca4b2e60cabbd5046c445f360f79d4e141f2370a58cad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD57ba4708ac09979236953569d523db88b
SHA112df90cefea3f2a8ecead62cae4ba9184199c7bb
SHA256c34a132f5c6cc36de00d99266b569146b09d78fc71b04ed01d1ccb44d55320f3
SHA512928688991c367edb803d0855498177283d8462df427b3c32a92eeb88c1c2ed8553b4c240c5b53aa43e62db99be77ff80ed8164f169ca3ebe9b5bfb8ccea46be5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5e3dc79eefad89dcada68d26ef927a043
SHA1fb0a51008d563c34fa38da898008cdbda0177224
SHA256c80e88970b609bf6b3bf206e756ecc55144f0a255b25b3a05273845b54a32523
SHA5128afc60af47217213b918cc412e7dcbc3c2466fece83ff354c6bbee4d6e2b6ad5f1566b5736686866b3056e29050ef0f0ac73919c9752716bcfe56195f4f757b5
-
Filesize
1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11