Overview
overview
10Static
static
VirusShare...4d.exe
windows7_x64
10VirusShare...4d.exe
windows10_x64
10VirusShare...4d.exe
windows10-2004_x64
10VirusShare...4d.exe
windows11_x64
VirusShare...4d.exe
macos_amd64
1VirusShare...4d.exe
linux_armhf
VirusShare...4d.exe
linux_mips
VirusShare...4d.exe
linux_mipsel
VirusShare...4d.exe
linux_amd64
Analysis
-
max time kernel
1800s -
max time network
1592s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
07-04-2022 19:21
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win10-20220310-en
Behavioral task
behavioral3
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
-
Size
382KB
-
MD5
41d87fa0c9244a9a098742155a862e4d
-
SHA1
f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
-
SHA256
60767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
-
SHA512
bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.xkfi59.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.sdfiso.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.wins4n.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.we34re.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion.to/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion/F8FA-CC2F-E275-0042-F6D5
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.xkfi59.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.sdfiso.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.wins4n.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.we34re.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion.to/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion/F8FA-CC2F-E275-0042-F6D5
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
suricata: ET MALWARE Ransomware/Cerber Checkin 2
suricata: ET MALWARE Ransomware/Cerber Checkin 2
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (16)
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (16)
-
Contacts a large (16396) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" VirusShare_41d87fa0c9244a9a098742155a862e4d.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" iscsicli.exe -
Executes dropped EXE 4 IoCs
pid Process 1908 iscsicli.exe 1196 iscsicli.exe 1040 iscsicli.exe 4356 iscsicli.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SaveCheckpoint.tiff iscsicli.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\International\Geo\Nation iscsicli.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\iscsicli.lnk VirusShare_41d87fa0c9244a9a098742155a862e4d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\iscsicli.lnk iscsicli.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce VirusShare_41d87fa0c9244a9a098742155a862e4d.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" VirusShare_41d87fa0c9244a9a098742155a862e4d.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Run iscsicli.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Run\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" iscsicli.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce iscsicli.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" iscsicli.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Run VirusShare_41d87fa0c9244a9a098742155a862e4d.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Run\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" VirusShare_41d87fa0c9244a9a098742155a862e4d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF11A.bmp" iscsicli.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 2368 taskkill.exe 4568 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" VirusShare_41d87fa0c9244a9a098742155a862e4d.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\Desktop iscsicli.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FDADBA18-15C4-C899-3D05-18266B544563}\\iscsicli.exe\"" iscsicli.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\Desktop VirusShare_41d87fa0c9244a9a098742155a862e4d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Discuz! MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates\4EEF7FAF0062D34ABE MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f2385ff2c54ad801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 082d21d5c634d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 082d21d5c634d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\NextPromptBuild = "15063" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\NextUpdateDate = "356152685" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = c8596af2c54ad801 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "5" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 612a66f2c54ad801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates\4EEF7FAF0062D34ABE = 0300000001000000140000004eef7faf0062d34abee6137e774438ae9988739f04000000010000001000000024d7172657e6b799f66cf32ae88b5c280f0000000100000020000000547b3c62613c9c2b025d5461623ae703e9853ee45a8bf3b425bf63528e992912140000000100000014000000fe7e60dd9d8292295edf1cf80869a75b98896ed01900000001000000100000002aac2185e0e1b6503eb16a495b1815fc5c0000000100000004000000000800001800000001000000100000002d581a49c8eb5b3b3c6ef9bb65314d702000000001000000eb050000308205e7308203cfa003020102021333000001a636dabe8bbe573d9a0000000001a6300d06092a864886f70d01010b0500307e310b3009060355040613025553311330110603550408130a57617368696e67746f6e3110300e060355040713075265646d6f6e64311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e312830260603550403131f4d6963726f736f667420536563757265205365727665722043412032303131301e170d3231303331313139323835325a170d3232303631313139323835325a3081a9310b3009060355040613025553311330110603550408130a57617368696e67746f6e3110300e060355040713075265646d6f6e64311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e310d300b060355040b130442696e67311b301906035504031312494520496e737472756d656e746174696f6e3127302506092a864886f70d010901161862696e6769657465616d406d6963726f736f66742e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100d0b49f5b650f0fa690df343367a2cd62155e98e3c0fc14cb1f696618be8c327ef257f50d47bce3a4286e36edc0382e0ac81096dbce62463bb552970d01d02a7ca642d6faed9b5878c4e2e33e7c9f94ea4eb7f125662d5d2fe78138ce3e827bd98969028a908fab20632542a1ef952c10382b7efcaae1f5e7521d5fb617a93aa002b579a3203726111c73a9832712e3b5d4d140b247c91824de8123b45ea39fbcdb6e5c77d68cd3db64dd24844a1879865356f655cf1c5d94b208e244bd075a9823c87af7bcad6aab52e3444aad2947a7baad0d42c9d785964dbd8b4e09004359094d0646c3ca98e7c698b0fa7d6f1606b1459fd6df8d9aea8ae85911789bc5e10203010001a38201303082012c300e0603551d0f0101ff0404030204f030150603551d25040e300c060a2b0601040182374c0c01301d0603551d0e04160414fe7e60dd9d8292295edf1cf80869a75b98896ed0301f0603551d230418301680143656896549cb5b9b2f3cac4216504d91b933d79130530603551d1f044c304a3048a046a0448642687474703a2f2f7777772e6d6963726f736f66742e636f6d2f706b696f70732f63726c2f4d69635365635365724341323031315f323031312d31302d31382e63726c306006082b0601050507010104543052305006082b060105050730028644687474703a2f2f7777772e6d6963726f736f66742e636f6d2f706b696f70732f63657274732f4d69635365635365724341323031315f323031312d31302d31382e637274300c0603551d130101ff04023000300d06092a864886f70d01010b05000382020100c1055e1c6ece899cbff031668bd0b72ee668484f9392c48efe112ba21c521af47582849539f2fd53f7f8adecc243743211150de90b106e6bdaaedb88a8fc71aff2bd4bfeae5628507aa3b47095bf680a0a56bc6cb9c70871fa0b05857bf1762af884469264870c4139f7f9e93bbedaf73a867994c51e7c8473506f1ca68a8f9059cfa5c068be7ecade98315eebd7e71431ebe7d033b4fc8056d94ab70b03e1368082fc83a82cd632b9f3a03f9c9d51881c39b432ee9856e87835bc0481e57489da3590d20b2b9b0900704de861f994d956a2c0347178c59e5048bb9bbfbe8cef237d5860d7f407dcbce486eee7d98a90509a8f1b81445453326b139f0d2fdc68b831681fa96f2284b8153e3dbe60cb2d0ac030d0e2ecfc85c9d361c25e01cabe57cd6ebdc40708b2bd449152e90d2d45d725db856ab64d29a9fdb9fdb85f6354cbd5be240f4b71fa745db8eb32c0e4ea4747bfa5a4f9a5346e42b3379636d05e52225cea1baa7792b8f51b803658026b11fd0ab5877a99f4e74ff994c61177ea425554a7135d8b020661d2d285eb8bf1aa00d3bf78e2f5dba62cd7befdb85fffe6c1b65643f56fe36cf412f366b03bc8c78c852c1ed43a218256636d67eb8241477d3258af4f96b9698b0326d6d01826734eb18f1b393cbf85c0f9fdab4fb854536110f2f678003f80f270cbb1fbeb5ba09523f959dfeba84319577874e4dec0 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 082d21d5c634d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4648 PING.EXE 3676 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe 1908 iscsicli.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2008 MicrosoftEdgeCP.exe 2008 MicrosoftEdgeCP.exe 2008 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 1908 iscsicli.exe Token: SeDebugPrivilege 1196 iscsicli.exe Token: SeDebugPrivilege 1040 iscsicli.exe Token: SeDebugPrivilege 1300 MicrosoftEdge.exe Token: SeDebugPrivilege 1300 MicrosoftEdge.exe Token: SeDebugPrivilege 1300 MicrosoftEdge.exe Token: SeDebugPrivilege 1300 MicrosoftEdge.exe Token: SeDebugPrivilege 2260 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2260 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2260 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2260 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3696 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3696 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3696 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3696 MicrosoftEdgeCP.exe Token: 33 4284 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4284 AUDIODG.EXE Token: SeDebugPrivilege 4356 iscsicli.exe Token: SeDebugPrivilege 4568 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1300 MicrosoftEdge.exe 2008 MicrosoftEdgeCP.exe 2008 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1908 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe 69 PID 1628 wrote to memory of 1908 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe 69 PID 1628 wrote to memory of 1908 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe 69 PID 1628 wrote to memory of 2088 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe 70 PID 1628 wrote to memory of 2088 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe 70 PID 1628 wrote to memory of 2088 1628 VirusShare_41d87fa0c9244a9a098742155a862e4d.exe 70 PID 2088 wrote to memory of 2368 2088 cmd.exe 72 PID 2088 wrote to memory of 2368 2088 cmd.exe 72 PID 2088 wrote to memory of 2368 2088 cmd.exe 72 PID 2088 wrote to memory of 3676 2088 cmd.exe 74 PID 2088 wrote to memory of 3676 2088 cmd.exe 74 PID 2088 wrote to memory of 3676 2088 cmd.exe 74 PID 1908 wrote to memory of 3492 1908 iscsicli.exe 84 PID 1908 wrote to memory of 3492 1908 iscsicli.exe 84 PID 1908 wrote to memory of 3832 1908 iscsicli.exe 87 PID 1908 wrote to memory of 3832 1908 iscsicli.exe 87 PID 2008 wrote to memory of 2260 2008 MicrosoftEdgeCP.exe 86 PID 2008 wrote to memory of 2260 2008 MicrosoftEdgeCP.exe 86 PID 2008 wrote to memory of 2260 2008 MicrosoftEdgeCP.exe 86 PID 2008 wrote to memory of 2260 2008 MicrosoftEdgeCP.exe 86 PID 2008 wrote to memory of 2260 2008 MicrosoftEdgeCP.exe 86 PID 2008 wrote to memory of 2260 2008 MicrosoftEdgeCP.exe 86 PID 2008 wrote to memory of 3696 2008 MicrosoftEdgeCP.exe 88 PID 2008 wrote to memory of 3696 2008 MicrosoftEdgeCP.exe 88 PID 2008 wrote to memory of 3696 2008 MicrosoftEdgeCP.exe 88 PID 2008 wrote to memory of 3696 2008 MicrosoftEdgeCP.exe 88 PID 2008 wrote to memory of 3696 2008 MicrosoftEdgeCP.exe 88 PID 2008 wrote to memory of 3696 2008 MicrosoftEdgeCP.exe 88 PID 1908 wrote to memory of 4524 1908 iscsicli.exe 93 PID 1908 wrote to memory of 4524 1908 iscsicli.exe 93 PID 4524 wrote to memory of 4568 4524 cmd.exe 94 PID 4524 wrote to memory of 4568 4524 cmd.exe 94 PID 4524 wrote to memory of 4648 4524 cmd.exe 96 PID 4524 wrote to memory of 4648 4524 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_41d87fa0c9244a9a098742155a862e4d.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_41d87fa0c9244a9a098742155a862e4d.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exe"C:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3492
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3832
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "iscsicli.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "iscsicli.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4648
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_41d87fa0c9244a9a098742155a862e4d.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_41d87fa0c9244a9a098742155a862e4d.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_41d87fa0c9244a9a098742155a862e4d.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:3676
-
-
-
C:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exeC:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
C:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exeC:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1300
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3748
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4141⤵
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
C:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exeC:\Users\Admin\AppData\Roaming\{FDADBA18-15C4-C899-3D05-18266B544563}\iscsicli.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de811470851f5d86a0baf61acc4a72d0
SHA19b14c9126c2be018e5ff459c208b89ce145c3477
SHA256dc0614ea0c8735bec4c60babd8631cf6ff26f2424c547cf61ced223b02fa2ea1
SHA512ff9651d529d4955024c277c8f37b1284119d0376ba24e8ba4d39acc71e9db5bab883ddac53582f564193eb5aac112981ab5e0547d7860da19c198989066d756e
-
Filesize
382KB
MD541d87fa0c9244a9a098742155a862e4d
SHA1f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
SHA25660767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
SHA512bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
Filesize
382KB
MD541d87fa0c9244a9a098742155a862e4d
SHA1f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
SHA25660767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
SHA512bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
Filesize
382KB
MD541d87fa0c9244a9a098742155a862e4d
SHA1f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
SHA25660767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
SHA512bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
Filesize
382KB
MD541d87fa0c9244a9a098742155a862e4d
SHA1f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
SHA25660767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
SHA512bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
Filesize
382KB
MD541d87fa0c9244a9a098742155a862e4d
SHA1f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
SHA25660767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
SHA512bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
Filesize
12KB
MD5b0dec3611074b37d2cef51ef2b511f48
SHA167cb2ad026f458a3aec9766f92889fb2e7495113
SHA256c2900deb7fefb8a57265679c4a7dc4f8e54c17cb32e93b3b4971e2c8b3dab4ca
SHA512dd25755cd71dfc0afa4dc9d27af408843cc60b1418bb4bed0b87266290e59931ef145ae821fcaacc25b62ec88d5d5ea42c35af97c206a5bae2874150b45235b2
-
Filesize
10KB
MD5eb0a4fad15e9c173b5b2fd5f7dba7d35
SHA11e2c3058af53d1d46a7bc7cc08b4e1814df821ec
SHA256e50d999772316b7ed5d41f2aedc1e9f80bc75d006806c143af63a874be8b7d86
SHA51286bbbed3d794fc6883312ffbad286b0cd83fa562049d18700732f35d6d7bca32fd3b2194279938221b18d4b0c995ee3a60314ccb43f18928e2f83a5727275328
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f