Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-07-2021 06:20
Static task
static1
Behavioral task
behavioral1
Sample
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe
Resource
win10v20210410
General
-
Target
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe
-
Size
436KB
-
MD5
8723362009a3762ce6e882fb99b107db
-
SHA1
33669b86b841b69570246eafcf8b823f893d6763
-
SHA256
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b
-
SHA512
55ae8195467ab77b27989c6fc677526cc5e2807565765a278e1311e9c805f35e7a316c20915ce8908f3933ae51df66892c10cf80ea11d1518e79488aaea6a2d6
Malware Config
Extracted
\??\c:\_R_E_A_D___T_H_I_S___GU86_.txt
cerber
http://xpcx6erilkjced3j.onion/1A12-7D32-549E-0098-BAEC
http://xpcx6erilkjced3j.1n5mod.top/1A12-7D32-549E-0098-BAEC
http://xpcx6erilkjced3j.19kdeh.top/1A12-7D32-549E-0098-BAEC
http://xpcx6erilkjced3j.1mpsnr.top/1A12-7D32-549E-0098-BAEC
http://xpcx6erilkjced3j.18ey8e.top/1A12-7D32-549E-0098-BAEC
http://xpcx6erilkjced3j.17gcun.top/1A12-7D32-549E-0098-BAEC
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___7ZXIDJ_.hta
http://xpcx6erilkjced3j.1n5mod.top/1A12-7D32-549E-0098-BAEChttp://xpcx6erilkjced3j.19kdeh.top/1A12-7D32-549E-0098-BAEChttp://xpcx6erilkjced3j.1mpsnr.top/1A12-7D32-549E-0098-BAEChttp://xpcx6erilkjced3j.18ey8e.top/1A12-7D32-549E-0098-BAEChttp://xpcx6erilkjced3j.17gcun.top/1A12-7D32-549E-0098-BAEC
http://xpcx6erilkjced3j.onion/1A12-7D32-549E-0098-BAEC
https://www.baidu.com
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Fantom
Ransomware which hides encryption process behind fake Windows Update screen.
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2190 1888 mshta.exe 2193 1888 mshta.exe 2195 1888 mshta.exe 2197 1888 mshta.exe 2199 1888 mshta.exe 2201 1888 mshta.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 760 Fan.exe 1684 Cer.exe 536 Infinite.exe 1468 Deria.exe 1680 WindowsUpdate.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\InitializeStep.tif.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\RemoveStart.tiff.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\InitializeStep.tif.deria.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Users\Admin\Pictures\RemoveStart.tiff.deria.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOGON.exe Deria.exe -
Loads dropped DLL 7 IoCs
pid Process 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 1684 Cer.exe 760 Fan.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: Cer.exe File opened (read-only) \??\g: Cer.exe File opened (read-only) \??\p: Cer.exe File opened (read-only) \??\r: Cer.exe File opened (read-only) \??\w: Cer.exe File opened (read-only) \??\x: Cer.exe File opened (read-only) \??\z: Cer.exe File opened (read-only) \??\a: Cer.exe File opened (read-only) \??\j: Cer.exe File opened (read-only) \??\l: Cer.exe File opened (read-only) \??\m: Cer.exe File opened (read-only) \??\n: Cer.exe File opened (read-only) \??\q: Cer.exe File opened (read-only) \??\t: Cer.exe File opened (read-only) \??\e: Cer.exe File opened (read-only) \??\f: Cer.exe File opened (read-only) \??\h: Cer.exe File opened (read-only) \??\i: Cer.exe File opened (read-only) \??\k: Cer.exe File opened (read-only) \??\o: Cer.exe File opened (read-only) \??\s: Cer.exe File opened (read-only) \??\v: Cer.exe File opened (read-only) \??\b: Cer.exe File opened (read-only) \??\y: Cer.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Cer.exe File created C:\Windows\SysWOW64\Cer.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Cer.exe File created C:\Windows\SysWOW64\Fan.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File created C:\Windows\SysWOW64\Infinite.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Cer.exe File created C:\Windows\SysWOW64\Deria.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Cer.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4930.bmp" Cer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285360.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\CHICAGO.XSL.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar Fan.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ADD.GIF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD.DPV.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02291U.BMP.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02567J.JPG.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Paper.xml.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_K_COL.HXK.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB6.BDR.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_zh_4.4.0.v20140623020002.jar Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00685_.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DELIMWIN.FAE.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MML2OMML.XSL.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BORDERBB.POC.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.lucene.core_3.5.0.v20120725-1805.jar Fan.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\settings.css Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Executive.xml.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File created C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.jpg Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153302.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIcons.jpg.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts2.css.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CUP.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105600.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD_F_COL.HXK.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.zh_CN_5.5.0.165303.jar Fan.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\speaker-32.png Fan.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEEXCH.DLL.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107154.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OISGRAPH.DLL.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\TAB_ON.GIF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR33F.GIF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR35B.GIF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\SketchIconImages.bmp.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\ActiveTabImageMask.bmp.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_ja_4.4.0.v20140623020002.jar Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0278702.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\OARPMANR.DLL.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02077_.GIF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt Fan.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip Fan.exe File created C:\Program Files\Windows Sidebar\Gadgets\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageHistoryIconImagesMask.bmp.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL083.XML.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.zh_CN_5.5.0.165303.jar Fan.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\4.png Fan.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sampler_zh_CN.jar Fan.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.htm Fan.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01660_.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_GreenTea.gif.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html Fan.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\AXIS.INF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01080_.WMF.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Angles.xml.46176D458770BA277A6A8A3EB0B96DF00DC880DE0EDC821263070FCAB3CD9B03 Infinite.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop Cer.exe File opened for modification \??\c:\windows\ Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Cer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Infinite.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Infinite.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 mshta.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 436 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe 1468 Deria.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 760 Fan.exe Token: SeShutdownPrivilege 1684 Cer.exe Token: SeDebugPrivilege 1468 Deria.exe Token: SeDebugPrivilege 536 Infinite.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1684 Cer.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1256 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 11 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 760 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 32 PID 2004 wrote to memory of 1684 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 33 PID 2004 wrote to memory of 1684 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 33 PID 2004 wrote to memory of 1684 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 33 PID 2004 wrote to memory of 1684 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 33 PID 1684 wrote to memory of 984 1684 Cer.exe 34 PID 1684 wrote to memory of 984 1684 Cer.exe 34 PID 1684 wrote to memory of 984 1684 Cer.exe 34 PID 1684 wrote to memory of 984 1684 Cer.exe 34 PID 1684 wrote to memory of 1996 1684 Cer.exe 36 PID 1684 wrote to memory of 1996 1684 Cer.exe 36 PID 1684 wrote to memory of 1996 1684 Cer.exe 36 PID 1684 wrote to memory of 1996 1684 Cer.exe 36 PID 2004 wrote to memory of 536 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 38 PID 2004 wrote to memory of 536 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 38 PID 2004 wrote to memory of 536 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 38 PID 2004 wrote to memory of 536 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 38 PID 2004 wrote to memory of 1468 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 39 PID 2004 wrote to memory of 1468 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 39 PID 2004 wrote to memory of 1468 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 39 PID 2004 wrote to memory of 1468 2004 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 39 PID 1684 wrote to memory of 1888 1684 Cer.exe 42 PID 1684 wrote to memory of 1888 1684 Cer.exe 42 PID 1684 wrote to memory of 1888 1684 Cer.exe 42 PID 1684 wrote to memory of 1888 1684 Cer.exe 42 PID 1684 wrote to memory of 436 1684 Cer.exe 43 PID 1684 wrote to memory of 436 1684 Cer.exe 43 PID 1684 wrote to memory of 436 1684 Cer.exe 43 PID 1684 wrote to memory of 436 1684 Cer.exe 43 PID 1684 wrote to memory of 1476 1684 Cer.exe 44 PID 1684 wrote to memory of 1476 1684 Cer.exe 44 PID 1684 wrote to memory of 1476 1684 Cer.exe 44 PID 1684 wrote to memory of 1476 1684 Cer.exe 44 PID 760 wrote to memory of 1680 760 Fan.exe 46 PID 760 wrote to memory of 1680 760 Fan.exe 46 PID 760 wrote to memory of 1680 760 Fan.exe 46 PID 760 wrote to memory of 1680 760 Fan.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe"C:\Users\Admin\AppData\Local\Temp\35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Fan.exeC:\Windows\System32\Fan.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"4⤵
- Executes dropped EXE
PID:1680
-
-
-
C:\Windows\SysWOW64\Cer.exeC:\Windows\System32\Cer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵PID:984
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵PID:1996
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___7ZXIDJ_.hta"4⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Modifies system certificate store
PID:1888
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___B1ST_.txt4⤵
- Opens file in notepad (likely ransom note)
PID:436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit4⤵PID:1476
-
-
-
C:\Windows\SysWOW64\Infinite.exeC:\Windows\System32\Infinite.exe3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\SysWOW64\Deria.exeC:\Windows\System32\Deria.exe3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1976