Tags:
defense_evasion discovery execution impact persistence privilege_escalation ransomware trojan
Checks SCSI registry key(s)
Interacts with shadow copies
Kills process with taskkill
Opens file in notepad (likely ransom note)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Windows directory
Drops file in System32 directory
Sets desktop wallpaper using registry
Adds Run key to start application
Checks whether UAC is enabled
Command and Scripting Interpreter: PowerShell
Indicator Removal: Clear Persistence
Checks computer location settings
Blocklisted process makes network request
Blocks application from running via registry modification
Disables RegEdit via registry modification
Disables Task Manager via registry modification
Drops file in Drivers directory
Event Triggered Execution: Image File Execution Options Injection
Modifies Windows Firewall
Modifies WinLogon for persistence
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.