Analysis
-
max time kernel
289s -
max time network
389s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00269.7z
Resource
win10v2004-20250217-en
General
-
Target
RNSM00269.7z
-
Size
7.5MB
-
MD5
0c0f6046592a1d447586c0898c572f3b
-
SHA1
e818cecc31794640e06d6ec86795d7765e481c7b
-
SHA256
0675087b8e5b5712b65568224783e6b7f27a26b44dc2361ca3b1e6cd2a5cc338
-
SHA512
19784b266ed7cbde7e3a3121c3d37fd6b667b1218a36b671c3ca87f7121a51d95d10f7d7e7237d8ec3b85f592dd32109b4e09be40ae711a0e311f685c5b69336
-
SSDEEP
196608:RL6nz7HFqicmfW9dyVnlIKYHx3TzTucytZeiSAdc9or:Envlz+9Qp5YTzTbS2Ec9or
Malware Config
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.fr2vai.top/3EB0-08AD-8A18-006D-FBB7
http://52uo5k3t73ypjije.n41n1a.top/3EB0-08AD-8A18-006D-FBB7
http://52uo5k3t73ypjije.3odvfb.top/3EB0-08AD-8A18-006D-FBB7
http://52uo5k3t73ypjije.pap44w.top/3EB0-08AD-8A18-006D-FBB7
http://52uo5k3t73ypjije.onion.to/3EB0-08AD-8A18-006D-FBB7
http://52uo5k3t73ypjije.onion/3EB0-08AD-8A18-006D-FBB7
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\# DECRYPT MY FILES #.html
Signatures
-
Cerber 6 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process Mutant created shell.{2AFC0748-6A67-B628-0BEE-C5CFD740156B} GamePanel.exe Mutant opened shell.{2AFC0748-6A67-B628-0BEE-C5CFD740156B} Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Mutant opened shell.{2AFC0748-6A67-B628-0BEE-C5CFD740156B} Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Mutant opened shell.{2AFC0748-6A67-B628-0BEE-C5CFD740156B} Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe 2144 taskkill.exe Mutant opened shell.{2AFC0748-6A67-B628-0BEE-C5CFD740156B} HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe -
Cerber family
-
Gozi family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\LABbiEhO\\OEcPJgeD.exe" Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe -
Njrat family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" tut.exe -
Adds policy Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" GamePanel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\gpresult.exe\"" Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\dccw.exe\"" Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\netbtugc.exe\"" Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Contacts a large (564) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2936 netsh.exe 3672 netsh.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kingoroott.exe -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation tut.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation tut.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation GamePanel.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\gpresult.lnk Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dccw.lnk Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\netbtugc.lnk Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\GamePanel.lnk GamePanel.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1b9b097a364670b9ff84ad7eb144c916.exe Taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1b9b097a364670b9ff84ad7eb144c916.exe Taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\1b9b097a364670b9ff84ad7eb144c916.exe taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\GamePanel.lnk HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe -
Executes dropped EXE 64 IoCs
pid Process 928 HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2672 GamePanel.exe 3460 cmd.exe 444 GamePanel.exe 1424 GamePanel.exe 4088 Trojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exe 3740 Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe 3216 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe 3704 Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe 4756 kingoroott.exe 4900 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe 536 svhost.exe 1224 Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe 4688 Trojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exe 4076 Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe 4644 Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe 4848 Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe 1376 Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe 1064 GamePanel.exe 3940 Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe 3336 Trojan-Ransom.Win32.Zerber.jnu-e5ba39b9b74ad9ac430c915c3fb3b93584f4ad16b03a10a2436b4ce9b66f1da5.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1712 Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe 3236 gpresult.exe 5380 dccw.exe 5336 Taskmgr.exe 520 dccw.exe 5800 tut.sfx.exe 5880 tut.exe 4972 dccw.exe 5908 Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe 5868 dccw.exe 2252 netbtugc.exe 3332 AppRdprt.exe 5768 netbtugc.exe 5136 netbtugc.exe 3236 netbtugc.exe 5544 GamePanel.exe 5192 gpresult.exe 5428 dccw.exe 5380 netbtugc.exe 5916 netbtugc.exe 5324 netbtugc.exe 6856 netbtugc.exe 6772 netbtugc.exe 6208 netbtugc.exe 7688 netbtugc.exe 5996 Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe 6424 netbtugc.exe 7936 netbtugc.exe 5400 netbtugc.exe 8084 netbtugc.exe 6372 netbtugc.exe 7852 AppRdprt.exe 7548 netbtugc.exe 6600 netbtugc.exe 8112 securityscan.exe 6912 netbtugc.exe 7896 netbtugc.exe 7536 Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe 7004 Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe 7848 Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe 7392 Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe -
Loads dropped DLL 13 IoCs
pid Process 4848 Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 1412 Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe 7536 Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gpresult = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\gpresult.exe\"" Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Analspps = "C:\\Users\\Admin\\AppData\\Roaming\\adsnvice\\AppRdprt.exe" Trojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1b9b097a364670b9ff84ad7eb144c916 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Taskmgr.exe\" .." Taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Analspps = "C:\\Users\\Admin\\AppData\\Roaming\\adsnvice\\AppRdprt.exe" Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hjgutnj = "C:\\Users\\Admin\\AppData\\Roaming\\hjgutnj.exe" Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\netbtugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\netbtugc.exe\"" Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\netbtugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\netbtugc.exe\"" Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1b9b097a364670b9ff84ad7eb144c916 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Taskmgr.exe\" .." Taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\securityscan = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\log\\securityscan.exe" securityscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsHosts = "C:\\Users\\Admin\\Desktop\\00269\\Trojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exe" Trojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Media SDK = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PDhiOVIcUC.exe" Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gpresult = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\gpresult.exe\"" Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hjgutnj = "C:\\Users\\Admin\\AppData\\Roaming\\hjgutnj.exe" Taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\securityscan = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\log\\AutoUpdate.exe" tut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\securityscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX2\\tut.exe" tut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hjgutnj = "C:\\Users\\Admin\\AppData\\Roaming\\hjgutnj.exe" Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dccw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\dccw.exe\"" Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dccw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\dccw.exe\"" Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Analspps = "C:\\Users\\Admin\\AppData\\Roaming\\adsnvice\\AppRdprt.exe" Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" GamePanel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" GamePanel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsHosts = "C:\\ProgramData\\svhost.exe" svhost.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kingoroott.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 150 ip-api.com 1728 icanhazip.com -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000200000001e941-309.dat autoit_exe behavioral1/memory/5880-809-0x0000000000810000-0x000000000092F000-memory.dmp autoit_exe behavioral1/memory/5880-1017-0x0000000000810000-0x000000000092F000-memory.dmp autoit_exe behavioral1/memory/5880-2389-0x0000000000810000-0x000000000092F000-memory.dmp autoit_exe behavioral1/memory/8112-2502-0x0000000000A50000-0x0000000000B6F000-memory.dmp autoit_exe behavioral1/memory/7576-2635-0x0000000000BF0000-0x0000000000D0F000-memory.dmp autoit_exe behavioral1/memory/7576-2711-0x0000000000BF0000-0x0000000000D0F000-memory.dmp autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3528 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpBAA.bmp" GamePanel.exe -
Suspicious use of SetThreadContext 29 IoCs
description pid Process procid_target PID 3216 set thread context of 4900 3216 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe 158 PID 1712 set thread context of 5908 1712 Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe 218 PID 3332 set thread context of 6200 3332 AppRdprt.exe 263 PID 6200 set thread context of 6140 6200 svchost.exe 229 PID 5768 set thread context of 5916 5768 netbtugc.exe 265 PID 3236 set thread context of 5324 3236 netbtugc.exe 267 PID 2252 set thread context of 6856 2252 netbtugc.exe 269 PID 5380 set thread context of 6772 5380 netbtugc.exe 270 PID 5136 set thread context of 6208 5136 netbtugc.exe 271 PID 4076 set thread context of 5996 4076 Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe 288 PID 7688 set thread context of 7936 7688 netbtugc.exe 306 PID 6424 set thread context of 5400 6424 netbtugc.exe 312 PID 8084 set thread context of 6372 8084 netbtugc.exe 323 PID 7548 set thread context of 6600 7548 netbtugc.exe 332 PID 6912 set thread context of 7896 6912 netbtugc.exe 342 PID 7356 set thread context of 5244 7356 netbtugc.exe 358 PID 7652 set thread context of 5708 7652 netbtugc.exe 369 PID 7852 set thread context of 6240 7852 AppRdprt.exe 375 PID 6240 set thread context of 1944 6240 AppRdprt.exe 376 PID 1944 set thread context of 7180 1944 svchost.exe 305 PID 7180 set thread context of 4212 7180 explorer.exe 87 PID 7180 set thread context of 6092 7180 explorer.exe 200 PID 7180 set thread context of 5960 7180 explorer.exe 244 PID 7180 set thread context of 4624 7180 explorer.exe 249 PID 7180 set thread context of 3856 7180 explorer.exe 377 PID 7180 set thread context of 6596 7180 explorer.exe 380 PID 7848 set thread context of 1664 7848 Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe 382 PID 4100 set thread context of 3692 4100 netbtugc.exe 386 PID 1060 set thread context of 5596 1060 netbtugc.exe 393 -
resource yara_rule behavioral1/memory/4756-332-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-331-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-328-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-333-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-474-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-476-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-485-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-498-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-502-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-529-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-528-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-487-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-488-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-484-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-480-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-475-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-545-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-546-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-622-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-567-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/memory/4756-569-0x00000000021A0000-0x000000000230B000-memory.dmp upx behavioral1/files/0x000b000000023e38-801.dat upx behavioral1/memory/5880-809-0x0000000000810000-0x000000000092F000-memory.dmp upx behavioral1/memory/5880-1017-0x0000000000810000-0x000000000092F000-memory.dmp upx behavioral1/memory/5880-2389-0x0000000000810000-0x000000000092F000-memory.dmp upx behavioral1/memory/8112-2388-0x0000000000A50000-0x0000000000B6F000-memory.dmp upx behavioral1/memory/8112-2502-0x0000000000A50000-0x0000000000B6F000-memory.dmp upx behavioral1/memory/7576-2635-0x0000000000BF0000-0x0000000000D0F000-memory.dmp upx behavioral1/memory/7576-2711-0x0000000000BF0000-0x0000000000D0F000-memory.dmp upx -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html GamePanel.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml GamePanel.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs GamePanel.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt GamePanel.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE GamePanel.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt GamePanel.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini GamePanel.exe File created C:\Program Files (x86)\0E596D85.log kingoroott.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE GamePanel.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url GamePanel.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE GamePanel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 776 3704 WerFault.exe 154 3968 3336 WerFault.exe 172 5640 3856 WerFault.exe 377 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securityscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kingoroott.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpresult.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tut.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppRdprt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tut.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 34 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2908 cmd.exe 5952 PING.EXE 4040 cmd.exe 6072 PING.EXE 8012 cmd.exe 5272 PING.EXE 2336 cmd.exe 6896 PING.EXE 1136 cmd.exe 5792 PING.EXE 3336 cmd.exe 6800 PING.EXE 5992 cmd.exe 7736 cmd.exe 2404 cmd.exe 7556 PING.EXE 5632 PING.EXE 6016 PING.EXE 5952 PING.EXE 8044 cmd.exe 5300 cmd.exe 6160 PING.EXE 3696 PING.EXE 5428 cmd.exe 6344 PING.EXE 7620 cmd.exe 3948 PING.EXE 5784 PING.EXE 8092 cmd.exe 8068 cmd.exe 7220 PING.EXE 5768 PING.EXE 5096 cmd.exe 5356 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName AppRdprt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 AppRdprt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tut.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kingoroott.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kingoroott.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor kingoroott.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor kingoroott.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tut.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer kingoroott.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS tut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct tut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName kingoroott.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer tut.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kingoroott.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3788 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2604 systeminfo.exe -
Kills process with taskkill 20 IoCs
pid Process 736 taskkill.exe 1596 taskkill.exe 5628 taskkill.exe 3500 taskkill.exe 5700 taskkill.exe 5304 taskkill.exe 4036 taskkill.exe 4100 taskkill.exe 5540 taskkill.exe 5652 taskkill.exe 5912 taskkill.exe 5248 taskkill.exe 5756 taskkill.exe 6660 taskkill.exe 7508 taskkill.exe 1976 taskkill.exe 5724 taskkill.exe 2144 taskkill.exe 3260 taskkill.exe 5496 taskkill.exe -
Modifies Control Panel 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\gpresult.exe\"" Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\netbtugc.exe\"" Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop GamePanel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\GamePanel.exe\"" GamePanel.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{506B0140-7A04-4F0E-99A9-111E8062B460}\\dccw.exe\"" Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\IESettingSync explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\IESettingSync explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\AI041033" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Speech SW Voice Activation - English (United States)" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\es-ES\\VoiceActivation_es-ES.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{A79020BC-1F7E-4D20-AC2A-51D73012DDD5}" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0\0\0 = 6c00310000000000515ad17910204f5241434c457e310000540009000400efbe515ad179585ae5b42e0000003481010000000f0000000000000000000000000000005853ce002e006f007200610063006c0065005f006a00720065005f0075007300610067006500000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\1\0\0 = 5600310000000000515a357812004170704461746100400009000400efbe515a3578585aaeb42e00000067e101000000010000000000000000000000000000004292da004100700070004400610074006100000016000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Katja - German (Germany)" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "409" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\SniffedFolderType = "Generic" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\1\0\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\de-DE-N\\c1031.fe" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\TTS\\en-US\\M1033David" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\de-DE\\sidubm.table" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\TTS\\es-ES\\M3082Pablo" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Helena - Spanish (Spain)" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\AudioInput\\TokenEnums\\MMAudioIn\\" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "spell=NativeSupported; cardinal=GlobalSupported; ordinal=NativeSupported; date=GlobalSupported; time=GlobalSupported; telephone=NativeSupported; computer=NativeSupported; address=NativeSupported; currency=NativeSupported; message=NativeSupported; url=NativeSupported; alphanumeric=NativeSupported" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Ichiro" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "13146" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{06405088-BC01-4E08-B392-5303E75090C8}" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "HKEY_LOCAL_MACHINE/SOFTWARE\\Microsoft\\Speech_OneCore\\AudioOutput\\TokenEnums\\MMAudioOut\\" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Speech HW Voice Activation - Spanish (Spain)" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{E164F996-FF93-4675-BDD8-6C47AB0B86B1}" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Female" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Speech Recognition Engine - fr-FR Embedded DNN v11.1" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\fr-FR-N\\tn1036.bin" SearchApp.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\RarSFX1\winmgmts:\localhost\root\SecurityCenter2 tut.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 811924.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5656 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 17 IoCs
pid Process 6896 PING.EXE 7220 PING.EXE 6344 PING.EXE 6160 PING.EXE 3948 PING.EXE 6016 PING.EXE 5952 PING.EXE 5768 PING.EXE 3696 PING.EXE 5792 PING.EXE 5952 PING.EXE 6072 PING.EXE 7556 PING.EXE 5632 PING.EXE 6800 PING.EXE 5784 PING.EXE 5272 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 6140 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 2300 msedge.exe 2300 msedge.exe 5072 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
pid Process 772 7zFM.exe 3216 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe 844 explorer.exe 6140 explorer.exe 8040 explorer.exe 7180 explorer.exe 2964 taskmgr.exe 4900 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 3332 AppRdprt.exe 6200 svchost.exe 6240 AppRdprt.exe 1944 svchost.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 772 7zFM.exe Token: 35 772 7zFM.exe Token: SeSecurityPrivilege 772 7zFM.exe Token: SeDebugPrivilege 2144 taskmgr.exe Token: SeSystemProfilePrivilege 2144 taskmgr.exe Token: SeCreateGlobalPrivilege 2144 taskmgr.exe Token: SeDebugPrivilege 3704 taskmgr.exe Token: SeSystemProfilePrivilege 3704 taskmgr.exe Token: SeCreateGlobalPrivilege 3704 taskmgr.exe Token: 33 2144 taskmgr.exe Token: SeIncBasePriorityPrivilege 2144 taskmgr.exe Token: SeDebugPrivilege 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 928 HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe Token: SeDebugPrivilege 4100 taskkill.exe Token: SeDebugPrivilege 3528 tasklist.exe Token: SeDebugPrivilege 2672 GamePanel.exe Token: SeDebugPrivilege 3260 taskkill.exe Token: SeDebugPrivilege 444 GamePanel.exe Token: SeShutdownPrivilege 4756 kingoroott.exe Token: SeCreatePagefilePrivilege 4756 kingoroott.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeDebugPrivilege 4900 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe Token: SeDebugPrivilege 1376 Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe Token: SeDebugPrivilege 3940 Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe Token: SeDebugPrivilege 5380 dccw.exe Token: SeDebugPrivilege 5540 taskkill.exe Token: SeDebugPrivilege 5496 taskkill.exe Token: SeDebugPrivilege 3236 gpresult.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeCreatePagefilePrivilege 844 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 772 7zFM.exe 772 7zFM.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 2144 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe -
Suspicious use of SetWindowsHookEx 60 IoCs
pid Process 1468 cmd.exe 3460 cmd.exe 4756 kingoroott.exe 4756 kingoroott.exe 4900 Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe 1712 Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe 5764 StartMenuExperienceHost.exe 5944 StartMenuExperienceHost.exe 2252 netbtugc.exe 5768 netbtugc.exe 5136 netbtugc.exe 3236 netbtugc.exe 6064 StartMenuExperienceHost.exe 5732 SearchApp.exe 6140 explorer.exe 6140 explorer.exe 5380 netbtugc.exe 6816 StartMenuExperienceHost.exe 7688 netbtugc.exe 6424 netbtugc.exe 6064 StartMenuExperienceHost.exe 4036 SearchApp.exe 8084 netbtugc.exe 3756 StartMenuExperienceHost.exe 6660 SearchApp.exe 7548 netbtugc.exe 6912 netbtugc.exe 8112 securityscan.exe 7180 explorer.exe 7180 explorer.exe 7356 netbtugc.exe 7180 explorer.exe 7652 netbtugc.exe 7576 tut.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 4100 netbtugc.exe 1060 netbtugc.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe 7180 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3704 2144 taskmgr.exe 95 PID 2144 wrote to memory of 3704 2144 taskmgr.exe 95 PID 1468 wrote to memory of 928 1468 cmd.exe 104 PID 1468 wrote to memory of 928 1468 cmd.exe 104 PID 1468 wrote to memory of 928 1468 cmd.exe 104 PID 1468 wrote to memory of 2920 1468 cmd.exe 105 PID 1468 wrote to memory of 2920 1468 cmd.exe 105 PID 1468 wrote to memory of 2920 1468 cmd.exe 105 PID 2920 wrote to memory of 740 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 106 PID 2920 wrote to memory of 740 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 106 PID 2920 wrote to memory of 740 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 106 PID 740 wrote to memory of 2144 740 cmd.exe 108 PID 740 wrote to memory of 2144 740 cmd.exe 108 PID 740 wrote to memory of 2144 740 cmd.exe 108 PID 2920 wrote to memory of 5072 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 109 PID 2920 wrote to memory of 5072 2920 Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe 109 PID 5072 wrote to memory of 3000 5072 msedge.exe 110 PID 5072 wrote to memory of 3000 5072 msedge.exe 110 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 1872 5072 msedge.exe 111 PID 5072 wrote to memory of 2300 5072 msedge.exe 112 PID 5072 wrote to memory of 2300 5072 msedge.exe 112 PID 5072 wrote to memory of 1436 5072 msedge.exe 113 PID 5072 wrote to memory of 1436 5072 msedge.exe 113 PID 5072 wrote to memory of 1436 5072 msedge.exe 113 PID 5072 wrote to memory of 1436 5072 msedge.exe 113 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer tut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\TaskbarNoNotification = "1" tut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" tut.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00269.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:772
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4212
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\Desktop\00269\HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe2⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"3⤵
- Cerber
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html4⤵PID:7044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd975046f8,0x7ffd97504708,0x7ffd975047185⤵PID:7164
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt4⤵PID:7016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.fr2vai.top/3EB0-08AD-8A18-006D-FBB7?auto4⤵PID:7344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd975046f8,0x7ffd97504708,0x7ffd975047185⤵PID:7364
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"4⤵PID:7860
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "GamePanel.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8092 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "GamePanel.exe"5⤵
- Kills process with taskkill
PID:6660
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7556
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2404 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3696
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exeTrojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe4⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.microsoft.com/en-in/3⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd975046f8,0x7ffd97504708,0x7ffd975047184⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:24⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:84⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:14⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:14⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:14⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:14⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:84⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:84⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:14⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:14⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:14⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5820 /prefetch:84⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:14⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:14⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:14⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6044 /prefetch:84⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:84⤵PID:468
-
-
C:\Users\Admin\Downloads\cmd.exe"C:\Users\Admin\Downloads\cmd.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3460 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\system32\taskkill.exetaskkill /pid:29205⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exeTrojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4088 -
C:\ProgramData\svhost.exe"C:\ProgramData\svhost.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:536
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exeTrojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3740 -
C:\Users\Admin\AppData\Roaming\Taskmgr.exe"C:\Users\Admin\AppData\Roaming\Taskmgr.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:5336 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Taskmgr.exe" "Taskmgr.exe" ENABLE7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exeTrojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
PID:3216 -
C:\Users\Admin\AppData\Roaming\kingoroott.exeC:\Users\Admin\AppData\Roaming\kingoroott.exe6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4900
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exeTrojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 5446⤵
- Program crash
PID:776
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exeTrojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.bat" "6⤵PID:4168
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"7⤵
- Executes dropped EXE
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\tut.sfx.exetut.sfx.exe -p123 -dC:\Users\Admin\AppData\Local\Temp7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5800 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\tut.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\tut.exe"8⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- System policy modification
PID:5880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k HOSTNAME9⤵
- System Location Discovery: System Language Discovery
PID:5316 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"10⤵
- Executes dropped EXE
PID:4972
-
-
C:\Windows\SysWOW64\HOSTNAME.EXEHOSTNAME10⤵PID:5780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall add allowedprogram program = STcONaURjstoJeQ(uMqeEfSfaGeNmho("yJmAEIBBXdvRXSFRGegUiJnA")) name = STcONaURjstoJeQ(uMqeEfSfaGeNmho("XQ0V1bwVGZ0FQZ==")) mode = ENABLE9⤵PID:3592
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5768 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"11⤵
- Executes dropped EXE
PID:5916
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram program = STcONaURjstoJeQ(uMqeEfSfaGeNmho("yJmAEIBBXdvRXSFRGegUiJnA")) name = STcONaURjstoJeQ(uMqeEfSfaGeNmho("XQ0V1bwVGZ0FQZ==")) mode = ENABLE10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im chrome.exe9⤵PID:180
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3236 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5324
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\log\pass.exe all9⤵
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5136 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"11⤵
- Executes dropped EXE
PID:6208
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k systeminfo9⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7688 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7936 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""13⤵
- Kills process with taskkill
PID:5248
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.113⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5632
-
-
-
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo10⤵
- Gathers system information
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k ipconfig9⤵
- System Location Discovery: System Language Discovery
PID:6188 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7548 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"11⤵
- Executes dropped EXE
PID:6600 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2336 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""13⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1976
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.113⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6896
-
-
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig10⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3788
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\log\securityscan.exeC:\Users\Admin\AppData\Roaming\Microsoft\log\securityscan.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:8112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k HOSTNAME10⤵
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6912 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"12⤵
- Executes dropped EXE
PID:7896 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:8068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""14⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5304
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.114⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7220
-
-
-
-
-
C:\Windows\SysWOW64\HOSTNAME.EXEHOSTNAME11⤵PID:6336
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exeTrojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\334C\99A6.bat" "C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR3C54~1.EXE""6⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:520
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR3C54~1.EXE""7⤵PID:5440
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"8⤵
- Executes dropped EXE
PID:5868
-
-
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR3C54~1.EXE"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3332 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe9⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6200
-
-
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exeTrojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4076 -
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5E7E\2F3F.bat" "C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR959A~1.EXE""7⤵
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6424 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5400 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL10⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5300 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1596
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.111⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6800
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR959A~1.EXE""8⤵PID:1652
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:8084 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6372 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL11⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8012 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""12⤵
- Kills process with taskkill
PID:7508
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.112⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6344
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR959A~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7852 -
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"10⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6240 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1944
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exeTrojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exeTrojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exeTrojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe5⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe" > NUL6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5096 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe"7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5496
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5784
-
-
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\gpresult.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\gpresult.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe" > NUL6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1136 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe"7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5540
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5792
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exeTrojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe5⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:3940 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe" > NUL6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe"7⤵
- Kills process with taskkill
PID:5652
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5952
-
-
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe" > NUL6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5428 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe"7⤵
- Kills process with taskkill
PID:5700
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.17⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6016
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.jnu-e5ba39b9b74ad9ac430c915c3fb3b93584f4ad16b03a10a2436b4ce9b66f1da5.exeTrojan-Ransom.Win32.Zerber.jnu-e5ba39b9b74ad9ac430c915c3fb3b93584f4ad16b03a10a2436b4ce9b66f1da5.exe5⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 2966⤵
- Program crash
PID:3968
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exeTrojan-Ransom.Win32.Zerber.svc-085087c7776992c63052994a24afe8aaed428112d03f1a4e0f476e9889cd7a7a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exeTrojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exeTrojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe6⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Modifies Control Panel
PID:5908 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe" > NUL7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3336 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe"8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5756
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6072
-
-
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6856
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe" > NUL7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.vu-f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a.exe"8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5912
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.18⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5952
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:14⤵PID:6200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:14⤵PID:7824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:14⤵PID:6496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:14⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4020 /prefetch:24⤵PID:7500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:14⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:14⤵PID:6764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15625070387048996173,14938352891612962076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1276 /prefetch:14⤵PID:4832
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:612
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exeC:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe1⤵
- Executes dropped EXE
PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3704 -ip 37041⤵PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3336 -ip 33361⤵PID:4040
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5732
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5764
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:6092
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:5144
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5944
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\d99e8d4a1a45456b8b590b1b6e3d76dc /t 1060 /p 47561⤵PID:6052
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6140 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\GamePanel.exe"2⤵
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\gpresult.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\gpresult.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5192
-
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\dccw.exe"2⤵
- Executes dropped EXE
PID:5428
-
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5380 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"3⤵
- Executes dropped EXE
PID:6772
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6064
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5960
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1584
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
PID:8040
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6816
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:7196
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x4981⤵PID:3964
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:8076
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6064
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4036
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7180 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Drops startup file
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2964
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7536
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe"2⤵
- Executes dropped EXE
PID:7004
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7848 -
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BDAC\5ED6.bat" "C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR959A~1.EXE""4⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4100 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7620 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""8⤵
- Kills process with taskkill
PID:5724
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.18⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3948
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR959A~1.EXE""5⤵PID:6984
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"7⤵PID:5596
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL8⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:7736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.19⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5272
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe" "C:\Users\Admin\Desktop\00269\TR959A~1.EXE"6⤵PID:7540
-
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"7⤵PID:4348
-
-
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"7⤵PID:6076
-
-
C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"C:\Users\Admin\AppData\Roaming\adsnvice\AppRdprt.exe"7⤵PID:6232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵PID:6260
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:7392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.bat" "3⤵PID:7836
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7356 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5244 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""7⤵
- Kills process with taskkill
PID:5628
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5768
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\tut.sfx.exetut.sfx.exe -p123 -dC:\Users\Admin\AppData\Local\Temp4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\tut.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\tut.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k HOSTNAME6⤵PID:4884
-
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7652 -
C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{506B0140-7A04-4F0E-99A9-111E8062B460}\netbtugc.exe"8⤵
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL9⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2908 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""10⤵
- Kills process with taskkill
PID:3500
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6160
-
-
-
-
-
C:\Windows\SysWOW64\HOSTNAME.EXEHOSTNAME7⤵PID:4832
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 6283⤵
- Program crash
PID:5640
-
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe"2⤵PID:6596
-
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe"C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\ProgramData\setting.ini2⤵
- Opens file in notepad (likely ransom note)
PID:5656
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3756
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6660
-
C:\Windows\sysWOW64\wbem\wmiprvse.exeC:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding1⤵PID:7636
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:7520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3856 -ip 38561⤵PID:7012
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4176
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3300
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3572
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2856
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:884
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2172
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6152
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4100
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5488
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6380
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6544
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6908
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5552
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1348
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7920
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4760
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1784
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4084
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6684
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7352
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2560
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5068
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3296
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
8Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
10System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD54802584d684cf48646fbd3264a3a8d35
SHA170213a5335ceec0042fd8eb144a65c4698170f85
SHA2569248925017cfc66884c03c48554874f0a9ff70fda4bfcad53fc534a7cc5bf51e
SHA512e10039c09713d44d341366c5b8a76d747b9dd522fbd82e4a45c7f6ac13528ae243d48934726e4fce2ee30d7342512d763249fad5fbdfb45473b8725cc3409df2
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
152B
MD5f2b08db3d95297f259f5aabbc4c36579
SHA1f5160d14e7046d541aee0c51c310b671e199f634
SHA256a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869
SHA5123256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75
-
Filesize
152B
MD56cdd2d2aae57f38e1f6033a490d08b79
SHA1a54cb1af38c825e74602b18fb1280371c8865871
SHA25656e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff
SHA5126cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD528064333f9b5b29fece1eccae4e8db1a
SHA1eda97e217cb6f9410b77a3900e2f9c8c9bd1cb3b
SHA256643890a79c3ff8da72330fa763c0e4e8bf14fe540571edac0fe9752496142026
SHA5124e4d1c3a1bfe9fca267ed762ef2bedbac4f5cfd5706204f0f41bd444401852f2cd7e0e732a91fc25c649480c5b6db51f58cb8cbb1fb93b5ea6e3d3938efa4dc4
-
Filesize
971B
MD538e8cd506841f2437ff5877199f18f7f
SHA13687f0f6018632fe86ac1fc97a555f34e0cdbcac
SHA25613e96532602d5fead5cecadecadc33feac5088c2a470bba07c0454fcb67f0623
SHA5126d312bc727bb93497736246fa80617b7ff79048f57f76c116cbf69f42699a02a8ed11f82c6a809edd7c6c5244fd2e8efc8368e164d098c22e651543d34d2060f
-
Filesize
1KB
MD509b5084b5a3f15b586236b08e28e4d08
SHA172d29fdda398d6e8e4a1ae0cc33437afa9f5fd13
SHA2564cd6f52be33ec578976927f4b8d8338866c1786924ecae3ba7e7571fdb2cdbab
SHA5123349b000ed76617f31b4443ca452a7d31ad06a3e892b4029b801908e60719dee37b1f575657b341972e1bbbdc90a6988e4459c8650046ed919360951ab8a55ac
-
Filesize
7KB
MD58db3a0808129ed53894b39fa701e8294
SHA123744c65d07ee446e3f3eb991a030cdea53e371f
SHA2568914de7684a690797b676f6670c14a13354469af3e701ec4009621d9878f0026
SHA5121bb5e355d8d048689efce7512107d4ded89287ea6a5e1b32406241ed42ef5cb30fc5b8153cb3524bad0c93882990e2673b7d7e59dd0bac6dc0f0376362d79ba8
-
Filesize
7KB
MD5096a651603cea2cf6f7f95dcdd1378c6
SHA1da35096c4e0862068fb8548a2608d89c17851b55
SHA256e6d4bd1a2483a74e66909fe70e1b5711e898fac5719662652164a6b6787d32d9
SHA51292db14312c7f3c9a473c7e3b46b015cf21617cfa1557f9d7395aebfbf15b21b6f10003202acbf7e3568c85587b00779617b8dbcb585d036f3a85fe9947cacac7
-
Filesize
7KB
MD54d7478cdda84259b47a6b9c93e01cad0
SHA1ce8a92ab1b0e4eb5313c121f58de9e748c17a9e1
SHA256b90b054b52c7cf3bedb4705bb7efca2336c07440de6358d8e4be4553005b5737
SHA51239052f519a78ebfce71b693092ae1bcad62136a5daace247b18b607db478e00b3cb4252e82a403d73f50d8d6a75e6360603c06d390e39fb51e00743057c8a832
-
Filesize
7KB
MD54b0b6b5876313f46328b7873cc9c3075
SHA1a41089b662f634e0c7e34951c40c519576eab313
SHA25694f8b4f3876e778731477a530a40880527167792538e208e6e8cd84103406fe9
SHA5129f40e3fd55fce1a1cd55e14d86515f0ccc9897ccab6c79176354b33c1e7b24910afce38f36026abd298f7a248ab95e8bf6e5a474e48d0dc5cd50644284a4578d
-
Filesize
6KB
MD5902b14958c59e45355e4b68dff2d2084
SHA14d5478da10dd5769b9d62209deeeb13e0f824059
SHA256b0921534c8aa00c24eb66fbb507dac9f50278eff62240fc9467c54854879dc55
SHA5123880c5f3dc477fa88da67b01bbabe3a71e7149f407bbc1ea4f6b61077810b4ea4f9de382f35e51ea60d7bb172dec5bdc922c5af25e47ecce1c040949155c091d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d633af31-b200-478c-8951-968f520088eb.tmp
Filesize7KB
MD56a828c970b5a202ea57ebe25bf71f36a
SHA1028b6579264c05e011e109bc8d35c432cb7ead04
SHA2562f39df94c2733b95dac5d6b1a6a7ca6d610d1b366c6b0a81eceb234e35a28fee
SHA51280d15ba57488cedae048b59662686271d11d6f90b8660a4c6c507e51b0703719f405a07695d73f3143b31652a26c51353dcde7dec8b2e869de63e3ab7da61e4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5cc6a57a9189ad105d99a7e8ade7a5b9b
SHA1c67b6463d948c4f6e5f78ecd602c9c27207641cd
SHA25668f61be8ddb672e14748b50afbdc90b8e96b3438354d0bc7acb2bde91f5970d1
SHA512f599bc631a5f615ed531d0b1c3e0d56c601a80d4e94b0295d5c088a24eb9c84cfeff5f9b7f8f619ecfb7d7067c235ec2b54d71d8a4db2729f53a96ca1ba94e09
-
Filesize
11KB
MD57228c397384f2724fa94e364159162f6
SHA1593d1e9e15c9d49e575a917b0da815fa20edf995
SHA256aeb2e4ebd3341d6116afe67658fddffc260441a4baafe3e1d582a84a38bc221d
SHA512b82bdbae09f483faa90d7bfd9669186832a5492715f2d0aab79cd2b42ce9de2c8a10090d602cd166ecebe719e0ccd556bcbfcf861047dbaad788ffe86efe372d
-
Filesize
11KB
MD517d2ebfd2539def1994ce217351ef7d7
SHA119353e270e00d94270292b4f3609244c3a09bc84
SHA256f6d58224b18c91bb5957841cca0a21c7be9c27a5d3a2f37a8de75f359cc54fd0
SHA512e699c95da466a4e038b76725485b7cb96c1c90a955423af8794d2994cd9919879eab352d18a6ea35bbe8df50900cc64624686a7be852926c6db083d91289b253
-
Filesize
11KB
MD504c6d8cb35a8b13147d4ef8584620e41
SHA145f4dc06f0ab55b848c54067547203102441dcab
SHA25643d61dfacd444c2f952761e47d73b2d221ed2a3adfdf879adb0d3459af4553df
SHA512bf41e7c4d455db2c71e7e84633897b08b08954628c4f200c8f3027e6adf2720989400707322bbbda9b3b42ebf046e2222964e08be7199fecf8a46b2e18823a0c
-
Filesize
12KB
MD57ea90263324f2cc749ad9886fd4a50ee
SHA1544cd279ab0eba833c7bd38e7a814001917e9d4e
SHA256ca24106f4d386cc4b4230dd9d89d1cc650202e65d0ebcaeb0c35fe6f0c91ccb2
SHA5126606928b894abda7d0245d1ae7beb3e6d4bce92a74a621e13a5149e31e6a02248274903e89d2fb40fbd2712920636728b53e65890ba1c38f75a09aa5cbb9ff3e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\MYYZTTZG\microsoft.windows[1].xml
Filesize97B
MD5b89387c272ea641caf67d5ad0ecffc95
SHA1fb4359da9114895b5f245749637248d72d3911a6
SHA2562617f712a03e2d115b7173bda3ad71e82ce2961d9a11603797600a866274b076
SHA51223b592658e6786ddd6046e099b7ba8a2efbe28fac9b0de39c387a1ed53b9b68a435fa7c0667694f5e4a0d39f089809d5a6f7f04b972e60c65d5472451424f53c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133849104054959312.txt
Filesize74KB
MD56c17480e36d01f0643a04043149c2dee
SHA1f8738c159cc4b03429520a9d2ef4eb0ec6dee8a0
SHA2563f06b6161d4705888c90d41c3203535c8cd248e4b7cdd6d9bb8fb3999b311b33
SHA51200a29717312d9496f3a7b2a6fd9e7bc8068daf1bbab9755c63325a10b1caff025209773718f7b8a8baee8fef0c77e681a594a6b193eed5c4583ede7df04ebb3c
-
Filesize
14KB
MD5b0ab1dea9b0f968618bae9c9db013ff4
SHA19a32a48ff06a47733c517099be25c328eb481e61
SHA2561325a298955026c4478d7044b0218b17d82f628eb5098a9a017edd70f3b6272a
SHA5125e6a76f3223969e801e9c6f6c24e85c49ad5c31e92311971a262bd93342a5de756a674aa8081437e3e5feac20774dedb2232cec85051b12d451fe1fba07b527a
-
Filesize
26B
MD51d03706c479e10dd9ec86260c724b88d
SHA1dd2a56a2a7468f1e5b75868f61e760544d931666
SHA2565bbbb7150f12b9872892b80adf72172dab27f75af23dc2d929041888024264b7
SHA51207419330d7b59ddd5d9cb53cbc0769ab7b8f9d7928829f5221171b701c7250ce21f1405a8911b2a8bf9faefcea3d1825d0863302518217194be3e573157fb0e2
-
Filesize
705KB
MD54b7a31cb77852c4cb74ca95d211b59b9
SHA12099431d1eaae3f3201155978e9b9be32e87a7f6
SHA256decc6aaa47e3638274d36ddba487668100573e3726d31de9c0fb3cf6db52c635
SHA5128f27d35a0fd5d5706bba24be346f845faaa542662d4f902f54e11c4b2885b7f236aa7a57a5a5dc4d3e995ae0a238c1cda2a67e1f73332f1fe16dca1c19c7e512
-
Filesize
476KB
MD5e228dee6ac4f93bbcb8decf510366eba
SHA1045bd9fb34213ba828fab91e13886c358ada4733
SHA2567bc781400b97b7cf3db9c75676293611943213e31ee613cd5df678a2146e531e
SHA512a5a7cd20926355ae3c49f06cef12b7e2a5d8fdeca1e2fc7c3c9faf9a5f04b99486c72c30b55f08c3e48c2336f1ea58a1982d2701064160d03fbc0e7856532a95
-
Filesize
11KB
MD517ee76fbff0baa5611662cc742511a54
SHA104b443d53f46404035320e409f97738038a743ca
SHA2569059aa33e22e6370550b1fe12d04d25130329f6bd2f91e3174729607d0e6a314
SHA51207ce162f95be28d5e3be8820dde1a23ef73718316c4a1f011504257cc993a03b9387fa76f995f21188d3bff39b492469e25032440226d3a4fa610dce6e7ca30c
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
6KB
MD52a05cbe58bdf3ec425d2a6570d4cc94e
SHA10584c7c0aa4ab366d372f2209e11c1d2059344ef
SHA2569ea590935f274f7fa2d5bc4bb7f6c49df28029bd1770ae821ba003eabe422d74
SHA512159b15aa42203a817c4e4a377693542abfa6adb3702315376fe5c5dc93753dc38a153e49c7a57d3833f3b992fa11c8d97ed716207ea97eb79e4008b9c9b64309
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
29KB
MD5f1fafe62ce42fe8d8a017cc6c32a967f
SHA17c822973ce0aba5ea5432e2ca53d5ca33a85b595
SHA25687488e0a7e27d0f46e61bb7d1b5302f1c02ebefa15105ae42daaf9c9573f41b1
SHA512376c50e552e141d6bce3cc5fad7d9d7bd84dacffaf4ebcf1b52d91f1c01dcf9446a83a1513b95147ff85ea081ae2e17a4d0a1f56c87a6f2a1be61742370f1837
-
Filesize
14KB
MD5a03e33899b59d68d748aa83ed057218c
SHA196aba0923ec32b0f38e0f5db69d1af89182125ae
SHA25637044c9bb7002b22ab671cc5e5f1c605c8bdbedeb1e76c0199dd08960eba6989
SHA51260b734ebcc9dddfc0b7155dba90848a1f31b07b47a6fa4cc5adc1b6c48ff0ee0228553560464b87a3800d8a8ae31809ca15d561f78476764962b30a23801c5dd
-
Filesize
617B
MD5b9939289baf40d3c517865f25284beab
SHA1e2bd82c8c9984621f3cb7c6b2eccb36ca31ac1b5
SHA25618b9457accd6eae454ef5a1722e453c5cecb634eb3d31e7726b35ca38ad0602a
SHA5129262052702c235bec1e6c52a2283a7b109e76e80a2abde303b1f478269d99212b3d0f5e6ed51ceb3fa520731f4c1f28773b8856b116e07f853788fe92ec89f39
-
Filesize
330B
MD5ccf0f5b76f9bfde3a0a3f135631309b2
SHA1079b1bb6e15ccc6f7db5ed85fa538a4b376e570b
SHA256ed7f434e52910bef93f040dba887a0acaa670cc71473899b7a18080f34f2dd78
SHA51262abc106db0e9abf533dc39c936ebf5e182dc1c75eebc8bc607f34bac6c70e9656cb711f48b5697b873de4570cb62d87b9eefbbdf77e9a1c567faf90ae039713
-
Filesize
16KB
MD5d9441b065d9b0993d621e5dc5d710b61
SHA16edd6737cf0ec53f284b0f082be7320dade56485
SHA256c47e4864d1bfcd4b6dea8d7c8986edf9a01e8b17ed2bc9a64c051ad6080f170c
SHA5121ce4a8bb396fff94c1337dafb7962c0bd7773bb4430638d5709d9263050f6de9d235bcaccb922d7152efd0821e2f351a904cc22987885aff5f9a1dab7f756563
-
Filesize
331B
MD51bcf608232da7626775c4aa9df58e77d
SHA1fa5b6adabd3803dec06602243c2a3d5a6cb55d6f
SHA2561f51a0e776031a689733ffc64dc744855ecf334b40f1591edfdb866febb9f74d
SHA512f07bfd1052ca51bf42c934a802a00a876787cf6ab4bf6ff42ce16952245b7b790a17036947a7d0979978c434d0073840e8055734950e9f37b38c7fc4c177c676
-
Filesize
15KB
MD59cbfe21598e22b7e292489d01f29da38
SHA1f5c706a973d9acada9e181f2d7e7404cadad66c7
SHA2560cd05b6abd82fa0e127817630d9ef21aa1ddc1e96ca5949ce171b03059bb8594
SHA512493dc343883dee2800cf0f409c5c2f87cc2a70daee19544c0361e6f9ed3577d33c67069cee0c05b7dc0f0ee91f75b5b70af90609d22d5dd86b6f892d9f43f167
-
Filesize
9KB
MD5afc685139a108e33bd945d5a3ff64122
SHA10a8010919ce9b60896e23d0db54fc7473b350ecc
SHA2564d70f45a9c69d8ce2e630214c1b2871454d631ccf9d88976470170d0e106acbc
SHA51262cf2171cc4a8e0a2e19608571c465ec3c038dcbe0f9a054a3c14a809a434b89868fb080bc15f94a5e4caebf987eabec966cce12cab14d4ce05858a65058534f
-
Filesize
160B
MD5043c0216d54611ad90d2375463332679
SHA12ecf7f437ab576377578362fbdca3d4a87be0fcf
SHA25673e025fcd36fe9e1688aa3be0bbc654372e69e65426aae076323a091641640d9
SHA5129f199073456db9e012cdef7473cd92be3eaeced6d0e27a2f7d2da506b94b6ae20b5ce58d560b89e2db3cd2ae50dd7bb09cfbc77deff585cec05db4189bcc2995
-
Filesize
946B
MD53afc187f68a37975b9dd49b5988a11ed
SHA1bd4ad670558604a428028f48ff339b409e8c13e9
SHA256867d3788800f55a14d1bfeb3f10f7b12ab1ba47329a98e2a89546e822a64fc82
SHA512ac31f118646b6221d3cd181eadf712b64d4905c936c1687d37bb9118a1ef908c76f6c832adb0ba772a8b705e63ce9a6986c0622df5e1113ce9473ea34f76ff3b
-
Filesize
2KB
MD5e3758d529f93fee4807f5ea95fbc1a6c
SHA13a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA2568d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407
-
Filesize
15KB
MD5f8d9d9418e6e1827ed2b53dd930e48fb
SHA1c78b0e5b274dbbfd032a0f3ed795d82d5ea617c8
SHA2562a2878b54550178144665d4c5f67309f71f1089679ae0f84fa419b8a309a88e4
SHA512510ac31f9e330ec2e6133c1cbe775a955b79b94dc5a84d94b2c59d9b513c35f3786ff8a7f706d04ec2503a4ffc16535624a34e0dcc53e91eedd2321691b617fc
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
1KB
MD56af9e1a9d14c0089d06085e7df97e71b
SHA1b0c184442ffe7e1ce6f5703041cacfa47408155b
SHA256b61d94398d7e8df6a41a662521f00c39b0e3ff50097832253e4b33a58833bcbf
SHA512e263f6fa6aba24e61d99dcf4f6660f173004402a540c84aeb07ed1d7534f57b19825ba58e32063ff433628b80d83fa010e122be78aad93b4d00c7db081cff0ec
-
Filesize
38KB
MD55e468b1bc6e76ea6171abc12a1878e0e
SHA1e7c44921b8efd0ae866f5d8c28e225ee18cfb746
SHA2562b5ec022a7116f72171e69279d749f2030b0eb337c2da9d7a4fc142da365ab3a
SHA512b238ae9ab704cff72b1eb0b21ce1e7730373e0606cf20efc95f2384776102bb401487e119c77e5afffbcd2ee6fb6371c900745f560db0837d294f63abd4b9cbe
-
Filesize
1KB
MD55b3128ac8ce2fb40679c175bd46da358
SHA1204042d3e0db05225969a2bbf2e997f7da0b1b0b
SHA25672744370532ef969e737f0a3ba50b2b3392506ad9dc02d546c1b5274c774f89e
SHA512df0f3e523f23089f70112d1b7a30a7be330b35ad807c16a118f670fcc219e978787ad27ba702ab3eb9ce6a2aaf57e278daf053de4fdad39e7f634ed0eb491547
-
Filesize
1.0MB
MD56dbf7073d2ce8faf2961cd7e7a3b1cb8
SHA199304026fa839916a7c26d038b0e9b768a236b1f
SHA256189f666752a4622b9e9d29deea7cc2be3a0e97586b8c83591f5889c79cad9c16
SHA5122ff26ddd706b8c407512b88ff9e1c5a644c01963b335e576719a266d75bf94d7e5278f35c5705fef933c5fd33fd6e6d8b61d65901ed85de5d7f3b26e7bafcc57
-
Filesize
204KB
MD5154c72ff9cfbb34a58d6e581478240dd
SHA120718ebd0c2439d424d81f5214b56e3eb75a894d
SHA256f23b33e9204ea79c3dd5a54fa57f2b97709ba30a06fb01f869e1ab06919a0a9a
SHA5125cbd652a4286215a63d915d39c8a7dc881c510fdb868ef992ebe21576f6aab2964f10a9f8d386ede9fb289c4fffd02e5faad644a3576dd56f00a2e442f13e793
-
C:\Users\Admin\Desktop\00269\HEUR-Trojan-Ransom.Win32.Zerber.gen-98c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a.exe
Filesize296KB
MD543195c18da026cb407ca885e8c6859d1
SHA10a8da444102be058a8df1f2d36ce17d39f987ff7
SHA25698c411c2132a1b75e6a597bde86b9006260585dcde632cdaf60f33886519dd4a
SHA51221346561088351738c548ed8a860d45653128cde69c04dabd9be2a82e8681e7baa48b043b0fab43777712dcd2bbc7311885bb0743861e8d6e4186504854d9fc9
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.MSIL.Agent.ghg-27182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3.exe
Filesize532KB
MD55b40982769552e5767f95b72a9d33899
SHA1942fbe4cc7fd4fe18b5bcd04031acb25e6e29d55
SHA25627182f0ac7425531461affe696f276a11dd5562e2fad18905831e94f5b0ae6a3
SHA5123efdb237b7f6fc839cdec573c70b7f2eb2cb4eb3690e063de7436e5dc5c3b9b4c7edab045756a6eafd9303160bf01fe786ff70d09008d8923ee45a9607d02ff3
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Bitman.joz-b6fc8ad904ca0c3028f8f84365637d812fe906dfe8d8c150f80e27a8d78c095d.exe
Filesize191KB
MD5bd301a3f2a3c419209676b280837cd78
SHA19cb7d5951b9d2f45815cdf9f292ab848d26a1e40
SHA256b6fc8ad904ca0c3028f8f84365637d812fe906dfe8d8c150f80e27a8d78c095d
SHA512f8b12915d8da73eb2b484f417329b43019f771b9e13de282539e5c615b96b12cda1a06fde7e75f53468d25ce30fa68c4beb83d6b14160f0c1899f33325769c8c
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jhsj-ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f.exe
Filesize3.0MB
MD5d31a3b9124c0df5216b71e7a95738972
SHA124e58c69ad4295b43fd56562ffb6ce3d8b057289
SHA256ef5b7665ea1dcc16816547e032d82132832403e6daac70cc5768f26e99ac174f
SHA5126764c8dd52ff7e4e20fc4332eedb41fde22ab9ab878578caa5f6ad5eb47e88622259dd4167c4b74cb8eceb7b2c79e7744ce849fe74a8bee6eaf7f10274c2f8d3
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jkzx-d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e.exe
Filesize234KB
MD5486eb99f837e78d3f3ffbc4f3bfe1e7d
SHA12a0990da8380dfed3cf50d41ff9b850afdfa3978
SHA256d124c89b0a5a9b1f56f9176c2c412aa1ed2dda64566df4f499105705ea75da4e
SHA5120106511e81978f3559e4878ae29b0548b0734a574917f9f83994ac008a756c2a09700eb8872af56e7e7fd95814a5383dbfc4bb99298584f527f65c8f8eb234ab
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Blocker.jovc-a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f.exe
Filesize2.7MB
MD581cda088cb79f851e63a2fe0a689c526
SHA130aca12985427d200ec3a9a2326905e56420e95a
SHA256a900b335b9ad0363630d9517d99d4f636b84a538f40acfd6dff9391702d30c9f
SHA5127a493f83e1590fc8f264e80a8e3425f002b0fb7b0adf42c402809fad81a463b3aa53d7a1f1921168595dfa6fe2aaf25fe14a527bbeb76a0a0827611b6454a23f
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.hamq-686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd.exe
Filesize500KB
MD518d85258b7be26b16ef4ed4777d43590
SHA148e08b376e9b8fd4e4dd9ed3a68e16196f8d983e
SHA256686d991ce763e683ea6ee0f0202681364e8f55efb02c312a59e599b5abb547fd
SHA51252a3d96809a9c20ae1494a122077feac63f80645db6fd3865aa64aeea5a2bbe63e10026aa9328043b4cfcf7ed46003bdebf944326101669036cf50aebf1a8c2d
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.ngmm-dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02.exe
Filesize833KB
MD511c560e8806a96cb9964ffc3e841d3ae
SHA1ee66d6e40bc8b10a60dd0989dc93e20d49fa828a
SHA256dfef0ef6449c8dfde93a161cda3cc821cb9d6e83910197fd828189d94b27bd02
SHA512e759727d409774f3d4ccba6ba8ba156f5653b30a1510bb996e3ab84b0ac34ec79ec610595962bbd26fda44405bbbcf252bab62eab7fef2dd305151555907f324
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Foreign.nhhn-9b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348.exe
Filesize638KB
MD5ac5181029e7cd72244cce8df1953845d
SHA13541bcf50d39573c15f87efd544d72bb5028e2d1
SHA2569b2699969896d0b301ab47e2f2f7f2051534ea526d862d75f4cda83b29408348
SHA51210ad163317bc0aab11c86f67e5cce92c3f38cc6e0b941f41c7844bf4a3e8859ac777dd7a452db85a52b18dc7565bf31384b31d9e683705d0b899b1299b25b1c1
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.cfh-530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d.exe
Filesize539KB
MD5cd862b423b01c908ad9a7a6a479ed642
SHA157cbff6535f018b2d5a62c30aba7cf6387ad025b
SHA256530326ed9cafede731a478242b0f1f13f7263c1bec156adb2f3f26132667464d
SHA5122d0ff8cedae6f4e6e55feee8b4ff2c75033516a3f2e584da23cf848e3ece54ff549b432e6df8f90c4003832dc30eea5bcee46c2028893b0fc351afd86ad18148
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Locky.hy-ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c.exe
Filesize188KB
MD5a5c8cc42ea38b56a373191513275ab93
SHA15aacff18f99995d2a005ad07f5bf17f8e184b64c
SHA256ddb80a24da8bec08eeac77e0a7ea13e48805a302290555d4bcb5d86d9080b13c
SHA512b6519f948f01be941cf04918b53e3c76b52b35e87f2e696140ab742fc51d0d3479c4270a45da2c9ffe18ccf08a654e6eb0341cfedbe3080bc3adbcc170091ff6
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Purga.p-25aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3.exe
Filesize930KB
MD5319647b02250fd73efd5dca36578c12e
SHA1643d35f914662ceddb74897deac3675af58925da
SHA25625aa2980ba724f212ca7292f968ded935760ba0a5b5562c3702e3572342089a3
SHA5124b0c16d2a601121636ca16bfb20afb85cac62f8d69a8ba8297aa01aac91bfc8f8cae19537548af860cd70061f8b24db975d137b60a743e1114f2813155eb6511
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.dhg-b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff.exe
Filesize284KB
MD55b499d2825b174f1d87caddb2aa64d50
SHA111c1a42d916ed40267f17d2859d7ef1e2f497c57
SHA256b0697ec9eeec95dc0d07b0d339bcd2577e07ef27dce3d2ac62e55ab32b5a75ff
SHA51245e6b874662810f77ef9eb1a122ad1415774c9084c5e04e3de3ffa9f53115cdccd58cfb4b84184d819ec0a8bbc91649c5b53bb9fd7671b66178f036708849739
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.gre-9f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40.exe
Filesize142KB
MD5ec71b6318e23d9033a3b9d5d9c6d6ec0
SHA187f50c91bf53ecf75281687b8c57029137cd7411
SHA2569f39b703428343ea6f5b8f83307bc03f5914ac168aa86acd7214a85badc2ca40
SHA512e999169419adb20017ffec17a66dcd9300225bdc64fc4e461b1f4d47aef1fee8b2005744256790322b588a5b319bed79591a0aa3238756d99829a21ce7c82aed
-
C:\Users\Admin\Desktop\00269\Trojan-Ransom.Win32.Zerber.jnu-e5ba39b9b74ad9ac430c915c3fb3b93584f4ad16b03a10a2436b4ce9b66f1da5.exe
Filesize292KB
MD5a2089863a5c1b1a9cdade386183f506a
SHA15aba922029c5c5ca37cec8e4ba6d244ad76afa6c
SHA256e5ba39b9b74ad9ac430c915c3fb3b93584f4ad16b03a10a2436b4ce9b66f1da5
SHA5129db9a3f3568037c458191bebd3694e9919c917f5799e448693d47b9bd7809e10c39544bb74696a9a34492f9b6fed8d1aeee61dcb58acd73f0e68357528071679
-
Filesize
19KB
MD5a4d50ef7fd068fda07f4d1423dda8db0
SHA116c2da4a1fed051eab981b7853f6d596d425b379
SHA256c49e5c8f469afecd20e65d21485a7916285f7059c32ae94374b345822dd46334
SHA512a7fc27cbbff9d6bd76f0005d3c956641abff63c5cc18c61aca1ed7e87cc8e22e3f98674a3d60f38c60c76b677e06c3e3e9a17c4ce759f02cbadd3a85b32b384e
-
Filesize
10KB
MD5283cf31dbfb42b67f9ebb25b25d66793
SHA15a320561fa0f70582eb255d85d68aefa2ce0e7a2
SHA256edbc827f2dd2f041c6a74ac989d61755d60ea50ede21fa052e3b4250dc988c8c
SHA512cf9e167e70e16b65ec794751890fe1af769db23fc77650024ebc5b631e021227c534bc58b77c6e6f25ea58ccdc3f37567a7def6e713a2c2e9961dba0f666f839
-
Filesize
90B
MD5ee77593edc7048522011f699cfeb7020
SHA1c69ed5cb7ab90d2ff0b07d02f7a5e2701779fb62
SHA2565e7083daba3b197eb90aa54f57abd4f786d4daf97a6ce8aac74d667661f2746b
SHA512c3eccea0d1685ca58dc0d51bee1c14d1e10d195dc82bd373d8bdedf982cbc7a222bb0d8c5efef2e16f5cdfffec0d42cdb6ac47130687a50225372eb6b3e64b38
-
Filesize
213B
MD51c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c
-
Filesize
283KB
MD58a2122e8162dbef04694b9c3e0b6cdee
SHA1f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA51299e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397