Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
CryptoLocker.exe
Resource
win10v2004-20250217-en
General
-
Target
CryptoLocker.exe
-
Size
338KB
-
MD5
04fb36199787f2e3e2135611a38321eb
-
SHA1
65559245709fe98052eb284577f1fd61c01ad20d
-
SHA256
d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
-
SHA512
533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
SSDEEP
6144:sWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvC:sWkEuCaNT85I2vCMX5l+ZRv
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 1740 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 1740 {34184A33-0407-212E-3320-09040709E2C2}.exe 1464 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Microsoft\Internet Explorer\GPU wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Internet Explorer\GPU wwahost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry wwahost.exe Key created \REGISTRY\USER\S-1-5-19 wwahost.exe Key created \REGISTRY\USER\S-1-5-19\Software wwahost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft wwahost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography wwahost.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DomStorageState\EdpCleanupState = "0" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CacheLimit = "1" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DomStorageState\EdpState = "0" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cloudexperiencehost\ = "0" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\live.com wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\live.com\ = "0" wwahost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cloudexperiencehos wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\live.com\NumberOfSubdomain = "0" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Content wwahost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Cookies wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\History\CacheLimit = "1" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cloudexperiencehost\N = "0" wwahost.exe Key deleted \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cloudexperiencehos wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Content\CacheVersion = "1" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Content\CacheLimit = "51200" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CacheVersion = "1" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DomStorageState wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\History wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\History\CacheVersion = "1" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cloudexperiencehost wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\live.com\NumberOfSubdomains = "0" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\live.com wwahost.exe Key deleted \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cloudexperiencehost wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\live.com\ = "0" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\live.com\NumberOfSubdomains = "1" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Extensible Cache wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cloudexperiencehos = "0" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cloudexperiencehost\N = "1" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\MuiCache wwahost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 2716 msedge.exe 2716 msedge.exe 5408 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4056 taskmgr.exe Token: SeSystemProfilePrivilege 4056 taskmgr.exe Token: SeCreateGlobalPrivilege 4056 taskmgr.exe Token: 33 4056 taskmgr.exe Token: SeIncBasePriorityPrivilege 4056 taskmgr.exe Token: SeDebugPrivilege 5436 wwahost.exe Token: SeDebugPrivilege 5436 wwahost.exe Token: SeDebugPrivilege 5436 wwahost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe 4056 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5436 wwahost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 1740 3476 CryptoLocker.exe 88 PID 3476 wrote to memory of 1740 3476 CryptoLocker.exe 88 PID 3476 wrote to memory of 1740 3476 CryptoLocker.exe 88 PID 1740 wrote to memory of 1464 1740 {34184A33-0407-212E-3320-09040709E2C2}.exe 89 PID 1740 wrote to memory of 1464 1740 {34184A33-0407-212E-3320-09040709E2C2}.exe 89 PID 1740 wrote to memory of 1464 1740 {34184A33-0407-212E-3320-09040709E2C2}.exe 89 PID 4460 wrote to memory of 4128 4460 msedge.exe 116 PID 4460 wrote to memory of 4128 4460 msedge.exe 116 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 3740 4460 msedge.exe 117 PID 4460 wrote to memory of 2716 4460 msedge.exe 118 PID 4460 wrote to memory of 2716 4460 msedge.exe 118 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119 PID 4460 wrote to memory of 4268 4460 msedge.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoLocker.exe"C:\Users\Admin\AppData\Local\Temp\CryptoLocker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\CryptoLocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002283⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4056
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault5f58a691ha967h4204ha9cfhb4c76400d5451⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff8207f46f8,0x7ff8207f4708,0x7ff8207f47182⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1129015972727766458,738190912716545172,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1129015972727766458,738190912716545172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1129015972727766458,738190912716545172,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault0d83c93dhf88ch4a60ha49ahbc0236e01c251⤵PID:5984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8207f46f8,0x7ff8207f4708,0x7ff8207f47182⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,16822016798871308841,14748755294746511881,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,16822016798871308841,14748755294746511881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,16822016798871308841,14748755294746511881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:82⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault1f693b34h118ch43cfhaa09h2d89cec8a7031⤵PID:3676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8207f46f8,0x7ff8207f4708,0x7ff8207f47182⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10986803888252686003,3003857831845324185,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10986803888252686003,3003857831845324185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10986803888252686003,3003857831845324185,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3008 /prefetch:82⤵PID:5376
-
-
C:\Windows\system32\wwahost.exe"C:\Windows\system32\wwahost.exe" -ServerName:App.wwa1⤵
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5436
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD527ff0ad692f41c03dc35087c3ab14711
SHA105aa1f84e78fa89a1c66f050deb18cb844d36dd3
SHA256ec10956ef89e13eb8ec5e6f7efbf69527888abeb3088bc7d09ecbb9f61b96c7e
SHA512b0d5e6f0acfe040afa4e39f21a4b498d85d0c16597479daceff3e7e5a93cc952189eb4d2528518f0718b01d2dcadde9422379071ac5efc9938e391eae4816c3f
-
Filesize
152B
MD539e376ee2f541e6b1ed0bca701e8fb59
SHA1bfe3cc2eed8721339d433533aef6e18e0a13a9a3
SHA25680eda1e4d8c05e257ff17ef734d606e67d8ab70b3e351430b2b231631eed5e04
SHA512a3f082c32857db0e3dec24394a259fff85e21b6a7b057ef55933504c23ec38cbb3237eb519d38385fc53cbc584c52aaf66291f44231245d9afee509a108a3350
-
Filesize
152B
MD539c51e5592e99966d676c729e840107b
SHA1e2dd9be0ffe54508a904d314b3cf0782a9a508b7
SHA25629f29a3495976b65de3df2d537628d260bc005da5956b262ff35e9f61d3d9ed3
SHA512b20532d0131b12603410c3cb425cb5df0ddc740f34e688455eff757802ffc854be771b30c3ff196e56b396c6fe53928a1577c8330b00f3f7b849fcf625e51bf4
-
Filesize
5KB
MD5da43330d47cb83efd849ddbdf3a4c6b3
SHA1a5b70dd7b1f7569a3970af9e77d58459459fe4cf
SHA256c653d4d27e54e36a1efe29a2a5bbb80f53564be3f4bf80155ead80e12d1982a1
SHA51211f4886f6032d16acac273f18f9ac348645bda19033f594b93965f48cce1cd72d5e4a5a775e9ba35076fc16e2106c9a132d8fd9b84d8482ed05c465321acca98
-
Filesize
5KB
MD5033bd446070f751f6ae775fa15361e3c
SHA1696b3afb9b716c65c0360f5a98a472daa1fbcfec
SHA25607a3468d344b63b8a8fc4197a7eca09ff15fe3a58f9ecb22a32965072fed108c
SHA5123cd1f89625da5dd5ec65e5b512c343a007f39096c997cf969089ce94a0e27dc26786e47bc69ba60daf42eb6cc981d707b90f4e8588fe8e2b9dabdad3d4a52965
-
Filesize
347B
MD59f829319ab798b37ea836312e44d461e
SHA1ed13582c231cc63cc610a02bdc423ee7564c3fe0
SHA2567b2c78319e00bac1ae5a3c0aef5fb0bcb225edeb78739865a19c0e2879b4096f
SHA5124560925c9c663e6ebdcec3e202364731926b14b0f66bafc5e5ab752e1aec4991bb0ed492f8d2054bdac5c80e53feba90f42d6828ef46f3b6dd89a073bc113463
-
Filesize
350B
MD53ac1ce588c0376500c97b34057337843
SHA1a9b6661b4a5ecd93b6c88925bd416d87ab3ccbac
SHA25667a26b22e1792117132e37105e258c7ecae14320c41af50ad79f3efcd854244b
SHA51206e154f79066d160f2b90e343b431e43549ca3a8810627c23ca87535b718a6ca9c60810b826d53470a040e1cc995c9b87523bf616810f1d3e700055d1e048a9f
-
Filesize
323B
MD503054f887126a5160d018af945722795
SHA16f371edca2d158b609699f6e3cac62b030c7c242
SHA256c470a9da26a47b00c18141c199b999c3b729cf9a580f5b0c45d239127be630c5
SHA5123bd4392ec81d7baed19045086d3892e8524bc272dc336f5047e080271e7bd010bf9ed6ea0c5defd94b5fef89400e9eaece0e3c3a5cf8bb7cc1c775b2501c1033
-
Filesize
323B
MD5d8a989e9e46283e22e60ad77e5a0961c
SHA1a3de083e624267a993e8760c13cf205d1ff053e5
SHA256ad7129c004b2a66bd82c7d7e3ad48d8f6b192feff3224d54a5a936188bc4ca76
SHA51299f80c4656b056ad39a3bb73ca7332ed3271128a5f90a6bb7347d203f1dee67ffeb1fa782caaa6766a86588bd36ff338a59e1983680ccc92e967b1db571bc51d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d56d984a-2d28-4a64-a417-393ecd84649d.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
8KB
MD59d56ccbeabd39e18c6e67239305b3a5f
SHA192939ddc863ecaee3d9d25b7b8f8908d1dc67098
SHA2564c65386b969a0e830e2a79c361c7f40499d12433c86a7ace3743ebc8c33a0f80
SHA5121ad4f7bceea1a755efe8e0de734ef41343f2964b7821e72d6845a95a0777facbb7b30fc12cc32c468f93197c1b33b5b79a99474787a04738381be821443bfa07
-
Filesize
8KB
MD5d487cfa4764f029a7ab492e22af1d13d
SHA1b45b29b1b6aad54f17aeeb2a798829c8cdd24faa
SHA256b92ef5189f067daf1d49996cddc7a40837e1f785acae817061493451d5734651
SHA512929f95948ec131efe3789403e71270c8b90eb9b473e93428c42f5495287b7d0754f99740995eefa5213656f2376064195e5d6d53c83cfe3afeee13953e80a293
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\LocalState\_sessionState.json
Filesize143B
MD5af6b577dfcb368967d6ffd5d830eb697
SHA16886b41c6f07ada168e623e7f46fce8250039104
SHA2568d4e3f0520fe7df69bf17f5f8178810a2be7dda235ab9aa6d90dc597ba908dde
SHA51250ceecb40d7fcce350842529b636510d96b60107835079acfa154795f6dd024f1600f3d4b0723129bcdc7e4ae467461f2c801c6865f719108c83d1fc1c5cdfbd
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444