Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-07-2021 06:20
Static task
static1
Behavioral task
behavioral1
Sample
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe
Resource
win10v20210410
General
-
Target
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe
-
Size
436KB
-
MD5
8723362009a3762ce6e882fb99b107db
-
SHA1
33669b86b841b69570246eafcf8b823f893d6763
-
SHA256
35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b
-
SHA512
55ae8195467ab77b27989c6fc677526cc5e2807565765a278e1311e9c805f35e7a316c20915ce8908f3933ae51df66892c10cf80ea11d1518e79488aaea6a2d6
Malware Config
Extracted
\??\c:\_R_E_A_D___T_H_I_S___Z565O_.txt
cerber
http://xpcx6erilkjced3j.onion/3F04-FE10-CC9E-0098-BBBA
http://xpcx6erilkjced3j.1n5mod.top/3F04-FE10-CC9E-0098-BBBA
http://xpcx6erilkjced3j.19kdeh.top/3F04-FE10-CC9E-0098-BBBA
http://xpcx6erilkjced3j.1mpsnr.top/3F04-FE10-CC9E-0098-BBBA
http://xpcx6erilkjced3j.18ey8e.top/3F04-FE10-CC9E-0098-BBBA
http://xpcx6erilkjced3j.17gcun.top/3F04-FE10-CC9E-0098-BBBA
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___QIONXVLO_.hta
http://xpcx6erilkjced3j.1n5mod.top/3F04-FE10-CC9E-0098-BBBAhttp://xpcx6erilkjced3j.19kdeh.top/3F04-FE10-CC9E-0098-BBBAhttp://xpcx6erilkjced3j.1mpsnr.top/3F04-FE10-CC9E-0098-BBBAhttp://xpcx6erilkjced3j.18ey8e.top/3F04-FE10-CC9E-0098-BBBAhttp://xpcx6erilkjced3j.17gcun.top/3F04-FE10-CC9E-0098-BBBA
http://xpcx6erilkjced3j.onion/3F04-FE10-CC9E-0098-BBBA
https://www.baidu.com
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Fantom
Ransomware which hides encryption process behind fake Windows Update screen.
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3232 created 200 3232 WerFault.exe 89 -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 2300 Fan.exe 2900 Cer.exe 3948 Infinite.exe 2688 Deria.exe 2204 WindowsUpdate.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SelectRevoke.tif.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\UnblockClear.tif.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\LimitEdit.tiff.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\RequestSelect.png.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\StepRename.tif.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\LimitEdit.tiff.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\ResizeConfirm.tif.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\StepRename.tif.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\ResizeConfirm.tif.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\RequestSelect.png.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\StepResolve.crw.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\SelectRevoke.tif.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\StepResolve.crw.deria Deria.exe File opened for modification C:\Users\Admin\Pictures\ConvertToRepair.crw.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\UnblockClear.tif.deria.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Users\Admin\Pictures\ConvertToRepair.crw.deria Deria.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOGON.exe Deria.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Cer.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: Cer.exe File opened (read-only) \??\j: Cer.exe File opened (read-only) \??\l: Cer.exe File opened (read-only) \??\p: Cer.exe File opened (read-only) \??\s: Cer.exe File opened (read-only) \??\v: Cer.exe File opened (read-only) \??\b: Cer.exe File opened (read-only) \??\f: Cer.exe File opened (read-only) \??\q: Cer.exe File opened (read-only) \??\u: Cer.exe File opened (read-only) \??\w: Cer.exe File opened (read-only) \??\x: Cer.exe File opened (read-only) \??\z: Cer.exe File opened (read-only) \??\e: Cer.exe File opened (read-only) \??\o: Cer.exe File opened (read-only) \??\k: Cer.exe File opened (read-only) \??\m: Cer.exe File opened (read-only) \??\n: Cer.exe File opened (read-only) \??\t: Cer.exe File opened (read-only) \??\g: Cer.exe File opened (read-only) \??\h: Cer.exe File opened (read-only) \??\y: Cer.exe File opened (read-only) \??\a: Cer.exe File opened (read-only) \??\r: Cer.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Cer.exe File created C:\Windows\SysWOW64\Deria.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Cer.exe File created C:\Windows\SysWOW64\Infinite.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Cer.exe File created C:\Windows\SysWOW64\Fan.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Cer.exe File created C:\Windows\SysWOW64\Cer.exe 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Cer.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Cer.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp68E1.bmp" Cer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_ja_4.4.0.v20140623020002.jar Fan.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OsfInstallerConfig.xml Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AXE8SharedExpat.dll.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\QuickTime.mpp.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\icons_retina.png.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hu-hu\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File created C:\Program Files\Internet Explorer\images\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\1033\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-il\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\mr.pak Fan.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-compat_ja.jar Fan.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-options-api.xml Fan.exe File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Catalog\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nb-no\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt Fan.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreSmallTile.scale-100.png Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ScCore.dll.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak Fan.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt Fan.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png Fan.exe File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\TextureBitmaps\denim.jpg Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_checkbox_partialselected-default_18.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\tr-tr\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-core.xml Fan.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-140.png Fan.exe File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\EmbossBitmaps\shapes_icon.png Fan.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_ja_4.4.0.v20140623020002.jar Fan.exe File created C:\Program Files\Microsoft Office\root\vreg\DECRYPT_YOUR_FILES.HTML Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\root\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\tr-tr\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar Fan.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-125_8wekyb3d8bbwe\Assets\contrast-white\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ar\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\VideoLAN\VLC\locale\et\DECRYPT_YOUR_FILES.HTML Fan.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_LogoSmall.targetsize-256.png Fan.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-coredump.xml Fan.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Proof.Culture.msi.16.fr-fr.xml Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-default.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-default_32.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\check-mark-1x.png.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-gb\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html Fan.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_16.511.8780.0_neutral_split.scale-100_8wekyb3d8bbwe\Lumia.ViewerPlugin\Assets\IconEditRichCapture.contrast-white_scale-100.png Fan.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\StopwatchSmallTile.contrast-black_scale-125.png Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIDE.dll.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_folder-down_32.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\share.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\arrow-up.png.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fr-ma\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\license.html Fan.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-125_8wekyb3d8bbwe\Assets\iheart-radio.scale-125.png Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\organize.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\de-de\ui-strings.js.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Workflow\Icon_Printer.png Fan.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\s_checkbox_unselected_18.svg.50702BC5CF7877055EEC0C3D9008EE6DF28B181B11D3D48F28D747747AC8EE5E Infinite.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word Cer.exe File opened for modification \??\c:\windows\ Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Cer.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Cer.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook Cer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3232 200 WerFault.exe 89 3244 200 WerFault.exe 89 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Infinite.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Infinite.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Cer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1288 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe 2688 Deria.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2300 Fan.exe Token: SeShutdownPrivilege 2900 Cer.exe Token: SeCreatePagefilePrivilege 2900 Cer.exe Token: SeDebugPrivilege 2688 Deria.exe Token: SeRestorePrivilege 3244 WerFault.exe Token: SeBackupPrivilege 3244 WerFault.exe Token: SeDebugPrivilege 3244 WerFault.exe Token: SeDebugPrivilege 3948 Infinite.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4020 wrote to memory of 3064 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 55 PID 4020 wrote to memory of 2300 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 76 PID 4020 wrote to memory of 2300 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 76 PID 4020 wrote to memory of 2300 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 76 PID 4020 wrote to memory of 2900 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 77 PID 4020 wrote to memory of 2900 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 77 PID 4020 wrote to memory of 2900 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 77 PID 2900 wrote to memory of 1312 2900 Cer.exe 78 PID 2900 wrote to memory of 1312 2900 Cer.exe 78 PID 2900 wrote to memory of 1312 2900 Cer.exe 78 PID 2900 wrote to memory of 3728 2900 Cer.exe 80 PID 2900 wrote to memory of 3728 2900 Cer.exe 80 PID 2900 wrote to memory of 3728 2900 Cer.exe 80 PID 4020 wrote to memory of 3948 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 82 PID 4020 wrote to memory of 3948 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 82 PID 4020 wrote to memory of 3948 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 82 PID 4020 wrote to memory of 2688 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 83 PID 4020 wrote to memory of 2688 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 83 PID 4020 wrote to memory of 2688 4020 35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe 83 PID 2900 wrote to memory of 200 2900 Cer.exe 89 PID 2900 wrote to memory of 200 2900 Cer.exe 89 PID 2900 wrote to memory of 200 2900 Cer.exe 89 PID 2900 wrote to memory of 1288 2900 Cer.exe 90 PID 2900 wrote to memory of 1288 2900 Cer.exe 90 PID 2900 wrote to memory of 1288 2900 Cer.exe 90 PID 2900 wrote to memory of 3140 2900 Cer.exe 94 PID 2900 wrote to memory of 3140 2900 Cer.exe 94 PID 2900 wrote to memory of 3140 2900 Cer.exe 94 PID 2300 wrote to memory of 2204 2300 Fan.exe 96 PID 2300 wrote to memory of 2204 2300 Fan.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe"C:\Users\Admin\AppData\Local\Temp\35195406382becaa3866e042e17dc62dcf956b43ca05e8022565c4591f0da98b.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\Fan.exeC:\Windows\System32\Fan.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"4⤵
- Executes dropped EXE
PID:2204
-
-
-
C:\Windows\SysWOW64\Cer.exeC:\Windows\System32\Cer.exe3⤵
- Executes dropped EXE
- Drops startup file
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵PID:1312
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵PID:3728
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___QIONXVLO_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}4⤵PID:200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 200 -s 5285⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 200 -s 17285⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___ITTMPCGY_.txt4⤵
- Opens file in notepad (likely ransom note)
PID:1288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit4⤵PID:3140
-
-
-
C:\Windows\SysWOW64\Infinite.exeC:\Windows\System32\Infinite.exe3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\SysWOW64\Deria.exeC:\Windows\System32\Deria.exe3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3256