Loading ...

Analysis Report LockerGogaRecent.exe

Overview

General Information

Joe Sandbox Version:25.0.0 Tiger's Eye
Analysis ID:820532
Start date:20.03.2019
Start time:10:07:58
Joe Sandbox Product:Cloud
Overall analysis duration:0h 17m 6s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:LockerGogaRecent.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40 1.8.0_191, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:41
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • HDC enabled
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.rans.phis.spyw.winEXE@99/123@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 3.1% (good quality ratio 2.9%)
  • Quality average: 62%
  • Quality standard deviation: 24.2%
HCA Information:
  • Successful, ratio: 81%
  • Number of executed functions: 130
  • Number of non-executed functions: 192
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Max analysis timeout: 600s exceeded, the analysis took too long
  • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryDirectoryFile calls found.

Detection

StrategyScoreRangeReportingWhitelistedDetection
Threshold1000 - 100Report FP / FNfalsemalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and Control
Valid AccountsWindows Remote ManagementWinlogon Helper DLLProcess Injection1Masquerading1Credential DumpingNetwork Share Discovery1Application Deployment SoftwareMan in the Browser1Data CompressedStandard Cryptographic Protocol2
Replication Through Removable MediaService ExecutionPort MonitorsAccessibility FeaturesProcess Injection1Network SniffingProcess Discovery1Remote ServicesData from Local System1Exfiltration Over Other Network MediumFallback Channels
Drive-by CompromiseWindows Management InstrumentationAccessibility FeaturesPath InterceptionObfuscated Files or Information2Input CaptureSecurity Software Discovery31Windows Remote ManagementData from Network Shared DriveAutomated ExfiltrationCustom Cryptographic Protocol
Exploit Public-Facing ApplicationScheduled TaskSystem FirmwareDLL Search Order HijackingObfuscated Files or InformationCredentials in FilesFile and Directory Discovery11Logon ScriptsInput CaptureData EncryptedMultiband Communication
Spearphishing LinkCommand-Line InterfaceShortcut ModificationFile System Permissions WeaknessMasqueradingAccount ManipulationSystem Information Discovery33Shared WebrootData StagedScheduled TransferStandard Cryptographic Protocol

Signature Overview

Click to jump to signature section


AV Detection:

barindex
Antivirus detection for submitted fileShow sources
Source: LockerGogaRecent.exeAvira: Label: TR/LockerGoga.qnfzd
Multi AV Scanner detection for submitted fileShow sources
Source: LockerGogaRecent.exevirustotal: Detection: 62%Perma Link
Source: LockerGogaRecent.exemetadefender: Detection: 21%Perma Link

Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic ProviderShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA250 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8,CryptAcquireContextA,___std_exception_copy,0_2_000CA250
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA8E0 CryptReleaseContext,0_2_000CA8E0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA9B0 CryptGenRandom,CryptReleaseContext,__CxxThrowException@8,0_2_000CA9B0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA3B0 CryptAcquireContextA,GetLastError,CryptReleaseContext,0_2_000CA3B0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA740 CryptReleaseContext,0_2_000CA740
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA780 CryptGenRandom,__CxxThrowException@8,0_2_000CA780
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CA810 ReleaseMutex,CryptGenRandom,CryptReleaseContext,__CxxThrowException@8,0_2_000CA810
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA250 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8,CryptAcquireContextA,___std_exception_copy,23_2_000CA250
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA810 ReleaseMutex,CryptGenRandom,CryptReleaseContext,__CxxThrowException@8,23_2_000CA810
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA8E0 CryptReleaseContext,23_2_000CA8E0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA9B0 CryptGenRandom,CryptReleaseContext,__CxxThrowException@8,23_2_000CA9B0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA3B0 CryptAcquireContextA,GetLastError,CryptReleaseContext,23_2_000CA3B0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA740 CryptReleaseContext,23_2_000CA740
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CA780 CryptGenRandom,__CxxThrowException@8,23_2_000CA780

Spreading:

barindex
Contains functionality to enumerate network sharesShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00095250 NetUserEnum,NetApiBufferFree,NetApiBufferFree,0_2_00095250
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00095250 NetUserEnum,NetApiBufferFree,NetApiBufferFree,23_2_00095250
Enumerates the file systemShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Reader\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Reader\AcroExt\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Esl\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Reader\AcroExt\locales\Jump to behavior
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000A9970 FindFirstFileW,GetLastError,GetLastError,GetLastError,GetLastError,0_2_000A9970
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00124A3B FindFirstFileExA,23_2_00124A3B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000A9970 FindFirstFileW,GetLastError,GetLastError,GetLastError,GetLastError,23_2_000A9970
Contains functionality to query local drivesShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0005CE90 GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,23_2_0005CE90

Networking:

barindex
Urls found in memory or binary dataShow sources
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://clients1.google.com/ocsp0
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://crl.geotrust.com/crls/secureca.crl0N
Source: LockerGogaRecent.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl0=
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: LockerGogaRecent.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://g.symcb.com/crls/gtglobal.crl0
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://g.symcd.com0
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://ocsp.digicert.com0K
Source: LockerGogaRecent.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://pki.google.com/GIAG2.crl0
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://pki.google.com/GIAG2.crt0
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://s2.symcb.com0
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://s2.symcb.com0k
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://www.symauth.com/cps0(
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: http://www.symauth.com/rpa0)
Source: tgytutrc3979.exe, 00000022.00000003.2519870637.01D05000.00000004.sdmpString found in binary or memory: http://www.symauth.com/rpa00
Source: LockerGogaRecent.exeString found in binary or memory: https://sectigo.com/CPS0C
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: tgytutrc3979.exe, 00000022.00000003.2524218394.01D1C000.00000004.sdmpString found in binary or memory: https://www.geotrust.com/resources/repository0

Spam, unwanted Advertisements and Ransom Demands:

barindex
Detected LockerGoga RansomwareShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0008FC60 GetDriveTypeW,ReleaseMutex,GetDriveTypeW,GetFileAttributesExW,RtlInitUnicodeString,NtOpenFile,NtReadFile,NtWriteFile,NtWriteFile,NtClose,23_2_0008FC60
Detected suspicious e-Mail address in disassemblyShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: DharmaParrack@protonmail.comwyattpettigrew8922555@mail.com0_2_000913D0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: DharmaParrack@protonmail.comwyattpettigrew8922555@mail.com23_2_000913D0
Modifies existing user documents (likely ransomware behavior)Show sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile moved: C:\Users\user\Desktop\EWZCVGNOWT.docxJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile moved: C:\Users\user\Desktop\EOWRVPQCCS\EIVQSAOTAQ.xlsx
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile moved: C:\Users\user\Desktop\EIVQSAOTAQ.docx
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile moved: C:\Users\user\Desktop\EOWRVPQCCS\EOWRVPQCCS.docxJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile moved: C:\Users\user\Desktop\EWZCVGNOWT\JDDHMPCDUJ.xlsxJump to behavior
Writes a notice file (html or txt) to demand a ransomShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile dropped: C:\Users\Public\Desktop\README_LOCKED.txt -> decryptor etc.will lead to irreversible destruction of your data.to confirm our honest intentions.send us 2-3 different random files and you will get them decrypted.it can be from different computers on your network to be sure that our decoder decrypts everything.sample files we unlock for free (files should not be related to any kind of backups).we exclusively have decryption software for your situationdo not reset or shutdown - files may be damaged.do not rename the encrypted files.do not move the encrypted files.this may lead to the impossibility of recovery of the certain files.the payment has to be made in bitcoins.the final price depends on how fast you contact us.as soon as we receive the payment you will get the decryption tool andinstructions on how to improve your systems securityto get information on the price of the decoder contact us at:dharmaparrack@protonmail.comwyattpettigrew8922555@mail.com

DDoS:

barindex
Too many similar processes foundShow sources
Source: unknownProcess created: 48

System Summary:

barindex
Uses logoff.exe to logoff the current userShow sources
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Abnormal high CPU UsageShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess Stats: CPU usage > 98%
Contains functionality to call native functionsShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0008FC60 GetDriveTypeW,ReleaseMutex,GetDriveTypeW,GetFileAttributesExW,RtlInitUnicodeString,NtOpenFile,NtReadFile,NtWriteFile,NtWriteFile,NtClose,23_2_0008FC60
Contains functionality to communicate with device driversShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000AA410: CreateFileW,DeviceIoControl,CloseHandle,0_2_000AA410
Creates mutexesShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeMutant created: \Sessions\2\BaseNamedObjects\MX-tgytutrc
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000D18800_2_000D1880
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000B40600_2_000B4060
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CB07A0_2_000CB07A
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000A81500_2_000A8150
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_001281660_2_00128166
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0011B2BE0_2_0011B2BE
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000B42E00_2_000B42E0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CB4220_2_000CB422
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CC4350_2_000CC435
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000B44B00_2_000B44B0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000785B00_2_000785B0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000B76100_2_000B7610
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000D56F00_2_000D56F0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0010E7960_2_0010E796
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000B87900_2_000B8790
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0009D7B00_2_0009D7B0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_001048300_2_00104830
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000A68400_2_000A6840
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000678500_2_00067850
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00105A630_2_00105A63
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000D5AD00_2_000D5AD0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00115B000_2_00115B00
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000C6B100_2_000C6B10
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000C7BE00_2_000C7BE0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000A5C200_2_000A5C20
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0008FC600_2_0008FC60
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000D3C800_2_000D3C80
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000A4CC00_2_000A4CC0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00086CF00_2_00086CF0
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000CBDC70_2_000CBDC7
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000B3E500_2_000B3E50
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000D3E600_2_000D3E60
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000D5F300_2_000D5F30
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00107FF70_2_00107FF7
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000A815023_2_000A8150
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CC43523_2_000CC435
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0009D7B023_2_0009D7B0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D188023_2_000D1880
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0008FC6023_2_0008FC60
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D404023_2_000D4040
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000B406023_2_000B4060
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000F415923_2_000F4159
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0012816623_2_00128166
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000B42E023_2_000B42E0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000B44B023_2_000B44B0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000785B023_2_000785B0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000B879023_2_000B8790
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0010483023_2_00104830
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CC8CF23_2_000CC8CF
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D491023_2_000D4910
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000A4CC023_2_000A4CC0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000F11D323_2_000F11D3
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D56F023_2_000D56F0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0011173B23_2_0011173B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000F19B923_2_000F19B9
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00105A6323_2_00105A63
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D5AD023_2_000D5AD0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00115B0023_2_00115B00
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000A5C2023_2_000A5C20
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00105DD523_2_00105DD5
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D5F3023_2_000D5F30
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0010607F23_2_0010607F
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0010634623_2_00106346
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000F655123_2_000F6551
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0010660123_2_00106601
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0010E79623_2_0010E796
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000A684023_2_000A6840
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_001228D923_2_001228D9
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000DAA9B23_2_000DAA9B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000C6B1023_2_000C6B10
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00086CF023_2_00086CF0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CB07A23_2_000CB07A
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CB08723_2_000CB087
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0011B2BE23_2_0011B2BE
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CB42223_2_000CB422
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000B761023_2_000B7610
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0006785023_2_00067850
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000C7BE023_2_000C7BE0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000D3C8023_2_000D3C80
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CBDC723_2_000CBDC7
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000B3E5023_2_000B3E50
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00107FF723_2_00107FF7
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000CBFEB23_2_000CBFEB
Found potential string decryption / allocating functionsShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: String function: 00064B00 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: String function: 000EE140 appears 58 times
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: String function: 000EDE0E appears 163 times
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: String function: 000EDE42 appears 71 times
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: String function: 000ED2D0 appears 59 times
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: String function: 00064B00 appears 43 times
Sample file is different than original file name gathered from version infoShow sources
Source: LockerGogaRecent.exe, 00000000.00000002.1665362832.0017B000.00000002.sdmpBinary or memory string: OriginalFilenametgytutrcB vs LockerGogaRecent.exe
Source: LockerGogaRecent.exeBinary or memory string: OriginalFilenametgytutrcB vs LockerGogaRecent.exe
Tries to load missing DLLsShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dll
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dll
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dll
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dll
Classification labelShow sources
Source: classification engineClassification label: mal100.rans.phis.spyw.winEXE@99/123@0/0
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00061760 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00061760
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00061760 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,23_2_00061760
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0005B450 CoCreateInstance,0_2_0005B450
Creates files inside the user directoryShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeFile created: C:\Users\Public\Desktop\README_LOCKED.txtJump to behavior
Found command line outputShow sources
Source: C:\Windows\System32\cmd.exeConsole Write: ........n#.......... . . . . . . . .1. .f.i.l.e.(.s.). .m.o.v.e.d.......V.KJ..%.(..(......%.......Ww..%.4...`.....,.....Jump to behavior
Source: C:\Windows\System32\net1.exeConsole Write: ....................T.h.e. .c.o.m.m.a.n.d. .c.o.m.p.l.e.t.e.d. .s.u.c.c.e.s.s.f.u.l.l.y.........O...4...J...........8...Jump to behavior
Source: C:\Windows\System32\net1.exeConsole Write: ..........................0.................yO..........................e.s.s.f.u.l.l.y.........O...4.........#.........Jump to behavior
Source: C:\Windows\System32\net1.exeConsole Write: ....................T.h.e. .c.o.m.m.a.n.d. .c.o.m.p.l.e.t.e.d. .s.u.c.c.e.s.s.f.u.l.l.y.......%.O.F.d.%.J...........8.G.Jump to behavior
Source: C:\Windows\System32\net1.exeConsole Write: ..........................0..... ...l...8....Q..........................e.s.s.f.u.l.l.y.......%.O.F.d.%.....l...........Jump to behavior
PE file has an executable .text section and no other executable sectionShow sources
Source: LockerGogaRecent.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Reads software policiesShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Sample is known by AntivirusShow sources
Source: LockerGogaRecent.exevirustotal: Detection: 62%
Source: LockerGogaRecent.exemetadefender: Detection: 21%
Sample might require command line arguments (.Net)Show sources
Source: LockerGogaRecent.exeString found in binary or memory: 3http://crl.usertrust.com/AddTrustExternalCARoot.crl05
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\LockerGogaRecent.exe 'C:\Users\user\Desktop\LockerGogaRecent.exe'
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c move /y C:\Users\user\Desktop\LockerGogaRecent.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -m
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Source: unknownProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exe
Source: unknownProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJD
Source: unknownProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user Administrator HuHuHUHoHo283283@dJD
Source: unknownProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user user HuHuHUHoHo283283@dJD
Source: unknownProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user user HuHuHUHoHo283283@dJD
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c move /y C:\Users\user\Desktop\LockerGogaRecent.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exeJump to behavior
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -mJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user user HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user user HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user Administrator HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user user HuHuHUHoHo283283@dJDJump to behavior
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Submission file is bigger than most known malware samplesShow sources
Source: LockerGogaRecent.exeStatic file information: File size 1268600 > 1048576
PE file contains a mix of data directories often seen in goodwareShow sources
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: LockerGogaRecent.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
PE file contains a debug data directoryShow sources
Source: LockerGogaRecent.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
PE file contains a valid data directory to section mappingShow sources
Source: LockerGogaRecent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: LockerGogaRecent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: LockerGogaRecent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: LockerGogaRecent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: LockerGogaRecent.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000FC820 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,23_2_000FC820
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000EE186 push ecx; ret 0_2_000EE199
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000EDDD7 push ecx; ret 0_2_000EDDEA
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000EDDD7 push ecx; ret 23_2_000EDDEA
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000EE186 push ecx; ret 23_2_000EE199

Persistence and Installation Behavior:

barindex
Creates license or readme fileShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeFile created: C:\Users\Public\Desktop\README_LOCKED.txtJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Moves itself to temp directoryShow sources
Source: c:\users\user\desktop\lockergogarecent.exeFile moved: C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exeJump to behavior
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000DAA9B GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,23_2_000DAA9B
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Enumerates the file systemShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Reader\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Reader\AcroExt\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Esl\Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Program Files\Adobe\Reader 11.0\Reader\AcroExt\locales\Jump to behavior
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000A9970 FindFirstFileW,GetLastError,GetLastError,GetLastError,GetLastError,0_2_000A9970
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00124A3B FindFirstFileExA,23_2_00124A3B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000A9970 FindFirstFileW,GetLastError,GetLastError,GetLastError,GetLastError,23_2_000A9970
Contains functionality to query local drivesShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0005CE90 GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,23_2_0005CE90
Contains functionality to query system informationShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00051280 GetSystemInfo,0_2_00051280
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory)Show sources
Source: LockerGogaRecent.exe, 00000000.00000002.1667079524.004E4000.00000004.sdmpBinary or memory string: vmbusres.dll
Queries a list of all running processesShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging:

barindex
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeSystem information queried: KernelDebuggerInformationJump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0010F271 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0010F271
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000FC820 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,23_2_000FC820
Contains functionality to read the PEBShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_001190D7 mov eax, dword ptr fs:[00000030h]0_2_001190D7
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_001190D7 mov eax, dword ptr fs:[00000030h]23_2_001190D7
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000947F0 ReleaseMutex,GetTickCount,EnumDependentServicesW,GetLastError,GetProcessHeap,HeapAlloc,EnumDependentServicesW,OpenServiceW,ControlService,Sleep,QueryServiceStatusEx,GetTickCount,@_EH4_CallFilterFunc@8,0_2_000947F0
Enables debug privilegesShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess token adjusted: Debug
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_0010F271 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0010F271
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000EDEEA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000EDEEA
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000EE33E SetUnhandledExceptionFilter,23_2_000EE33E
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000EDEEA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_000EDEEA
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000EE1AB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000EE1AB
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0010F271 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_0010F271

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c move /y C:\Users\user\Desktop\LockerGogaRecent.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exeJump to behavior
Source: C:\Users\user\Desktop\LockerGogaRecent.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -mJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user user HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exe C:\Users\user~1\AppData\Local\Temp\tgytutrc3979.exe -i SM-tgytutrc -s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\logoff.exe C:\Windows\system32\logoff.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net.exe C:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user user HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user Administrator HuHuHUHoHo283283@dJDJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user user HuHuHUHoHo283283@dJDJump to behavior
Contains functionality to add an ACL to a security descriptorShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00051230 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,23_2_00051230
Contains functionality to create a new security descriptorShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_00095690 AllocateAndInitializeSid,LookupAccountSidW,GetLastError,LookupAccountSidW,FreeSid,0_2_00095690

Language, Device and Operating System Detection:

barindex
Contains functionality locales information (e.g. system language)Show sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0012719B
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0012736F
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: GetLocaleInfoW,0_2_0011F384
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00126A37
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: EnumSystemLocalesW,0_2_00126CAF
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: EnumSystemLocalesW,0_2_00126CFA
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: EnumSystemLocalesW,0_2_00126D95
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: EnumSystemLocalesW,0_2_0011EE9B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetLocaleInfoW,23_2_000ECCEE
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: ___crtGetLocaleInfoEx,23_2_000ECDE7
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,23_2_00126A37
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: EnumSystemLocalesW,23_2_00126CAF
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: EnumSystemLocalesW,23_2_00126CFA
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: EnumSystemLocalesW,23_2_00126D95
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,23_2_00126E22
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: EnumSystemLocalesW,23_2_0011EE9B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetLocaleInfoW,23_2_00127072
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,23_2_0012719B
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetLocaleInfoW,23_2_001272A2
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,23_2_0012736F
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: GetLocaleInfoW,23_2_0011F384
Contains functionality to query CPU information (cpuid)Show sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000ED8C3 cpuid 23_2_000ED8C3
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\IlsCache\ilrcache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x000000000000000b.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\en-US\resource.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\branding.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\AccessMUISet.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\5516.1005.0.3_0\angular.js VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000003.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP.pdf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\JDDHMPCDUJ.xlsx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP.pdf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proofing.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-report-latest.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\IlsCache\imcrcache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUISet.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\resource.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\ONetConfig\b6419f5bc3093b5f22142ce454e02407.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows Mail\oeold.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Templates\LiveContent\Managed\Word Document Building Blocks\1033\TM01793060[[fn=Origin]].dotx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\DUUDTUBZFW\DUUDTUBZFW.docx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Caches\{67D69890-D853-4011-A87E-AA64FA83CE5A}.2.ver0x0000000000000002.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-report-2015-03-09.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000002.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\en-US\resource.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OneNoteMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\5516.1005.0.3_0\background_script.js VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\cversions.1.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Caches\cversions.2.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000007.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\behavior.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\tasks.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-003D-0000-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\branding.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Mozilla\updates\308046B0AF4A39CB\updates.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\energy-report-2011-04-08.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Caches\{86012F79-362C-43D2-98EF-AB58A0A31343}.2.ver0x0000000000000001.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\behavior.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\tasks.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-003D-0000-0000-0000000FF1CE}-C\SingleImageWW.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\Setup.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\MSOCache\All Users\{90140000-003D-0000-0000-0000000FF1CE}-C\Office64WW.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Document Building Blocks\1033\14\Built-In Building Blocks.dotx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP\ZGGKNSUKOP.docx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\KLIZUSIQEN.xlsx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EWZCVGNOWT.docx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\DUUDTUBZFW\ZGGKNSUKOP.pdf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EWZCVGNOWT\JDDHMPCDUJ.xlsx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\KLIZUSIQEN.xlsx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EWZCVGNOWT.docx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS\EOWRVPQCCS.docx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW.docx VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000004.db VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\blocklist.xml VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\NWCXBPIUYI.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ\KLIZUSIQEN.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\DUUDTUBZFW.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ\QCOILOQIKC.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\QCOILOQIKC.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS\GIGIYTFFYT.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\sessionstore-backups\previous.js VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_96.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP\KLIZUSIQEN.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\QCOILOQIKC.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\DUUDTUBZFW\EOWRVPQCCS.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EWZCVGNOWT.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ\EIVQSAOTAQ.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\JDDHMPCDUJ.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EWZCVGNOWT\NWCXBPIUYI.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS\EIVQSAOTAQ.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ\KLIZUSIQEN.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\KLIZUSIQEN.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP\EWZCVGNOWT.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EWZCVGNOWT\JDDHMPCDUJ.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\GIGIYTFFYT.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EWZCVGNOWT\EWZCVGNOWT.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW\DUUDTUBZFW.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ\EIVQSAOTAQ.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\key3.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_32.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EWZCVGNOWT\NWCXBPIUYI.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ\QCOILOQIKC.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Documents\EWZCVGNOWT\EWZCVGNOWT.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\prefs.js VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\NWCXBPIUYI.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.docx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW\EOWRVPQCCS.xlsx VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW\ZGGKNSUKOP.pdf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_256.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\IconCache.db VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Temp\opatchinstall(3).log VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\WWINTL.DLL.trx_dll VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Roaming\.jre\bin\prism_sw.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\NTUSER.DAT{6cced2f1-6e01-11de-8bed-001e0bcd1824}.TM.blf VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeQueries volume information: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\D85795856A15100A0C45C075CFB29C4FC314C2EE VolumeInformation
Queries time zone informationShow sources
Source: C:\Windows\System32\net1.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation BiasJump to behavior
Contains functionality to query local / system timeShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeCode function: 0_2_000EE393 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_000EE393
Contains functionality to query time zone informationShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_0012447F _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,23_2_0012447F
Contains functionality to query windows versionShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000F3E94 GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,23_2_000F3E94
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\Desktop\LockerGogaRecent.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Overwrites Mozilla Firefox settingsShow sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\blocklist.xml.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\blocklist.xml.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\sessionstore-backups\previous.js.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\sessionstore-backups\previous.js.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\key3.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\key3.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\prefs.js.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\prefs.js.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\D85795856A15100A0C45C075CFB29C4FC314C2EE.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile written: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\D85795856A15100A0C45C075CFB29C4FC314C2EE.locked

Stealing of Sensitive Information:

barindex
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\D85795856A15100A0C45C075CFB29C4FC314C2EE
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.db
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\D85795856A15100A0C45C075CFB29C4FC314C2EE.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.db
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\sessionstore-backups\previous.js
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\prefs.js
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\key3.db
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\blocklist.xml
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\key3.db.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\blocklist.xml.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\prefs.js.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\sessionstore-backups\previous.js.locked
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeFile opened: \C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.db.locked

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)Show sources
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_00051400 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,23_2_00051400
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000520F0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,23_2_000520F0
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000FE7B8 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,23_2_000FE7B8
Source: C:\Users\user\AppData\Local\Temp\tgytutrc3979.exeCode function: 23_2_000FF48A Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,23_2_000FF48A
Sample Distance (10 = nearest)
10 9 8 7 6 5 4 3 2 1
Samplename Analysis ID SHA256 Similarity

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 signatures2 2 Behavior Graph ID: 820532 Sample: LockerGogaRecent.exe Startdate: 20/03/2019 Architecture: WINDOWS Score: 100 52 Antivirus detection for submitted file 2->52 54 Too many similar processes found 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 Uses logoff.exe to logoff the current user 2->58 8 LockerGogaRecent.exe 1 2->8         started        process3 signatures4 60 Writes a notice file (html or txt) to demand a ransom 8->60 62 Detected suspicious e-Mail address in disassembly 8->62 11 tgytutrc3979.exe 8->11         started        14 cmd.exe 8->14         started        process5 signatures6 64 Detected LockerGoga Ransomware 11->64 66 Writes a notice file (html or txt) to demand a ransom 11->66 68 Detected suspicious e-Mail address in disassembly 11->68 16 tgytutrc3979.exe 11->16         started        20 tgytutrc3979.exe 11->20         started        22 tgytutrc3979.exe 11->22         started        24 16 other processes 11->24 70 Moves itself to temp directory 14->70 process7 file8 30 C:\Users\user\AppData\...\prefs.js.locked, data 16->30 dropped 32 C:\Users\Public\Desktop\README_LOCKED.txt, ASCII 16->32 dropped 46 Overwrites Mozilla Firefox settings 16->46 48 Tries to harvest and steal browser information (history, passwords, etc) 16->48 50 Modifies existing user documents (likely ransomware behavior) 16->50 34 C:\Users\user\AppData\...\previous.js.locked, data 20->34 dropped 36 C:\Users\user\AppData\...\secmod.db.locked, data 20->36 dropped 38 C:\Users\user\...\blocklist.xml.locked, data 20->38 dropped 40 C:\Users\user\AppData\...\key3.db.locked, data 22->40 dropped 42 C:\Users\user\AppData\...\cert8.db.locked, data 22->42 dropped 44 D85795856A15100A0C...9C4FC314C2EE.locked, data 24->44 dropped 26 net1.exe 24->26         started        28 net1.exe 24->28         started        signatures9 process10

Simulations

Behavior and APIs

TimeTypeDescription
10:10:07API Interceptor5907x Sleep call for process: LockerGogaRecent.exe modified
10:10:08API Interceptor12x Sleep call for process: tgytutrc3979.exe modified
10:10:08API Interceptor6x Sleep call for process: logoff.exe modified
10:10:09API Interceptor2x Sleep call for process: net1.exe modified

Antivirus Detection

Initial Sample

SourceDetectionScannerLabelLink
LockerGogaRecent.exe62%virustotalBrowse
LockerGogaRecent.exe22%metadefenderBrowse
LockerGogaRecent.exe100%AviraTR/LockerGoga.qnfzd

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.