Overview
overview
10Static
static
VirusShare...5b.exe
windows7_x64
10VirusShare...5b.exe
windows10_x64
10VirusShare...5b.exe
windows10-2004_x64
10VirusShare...5b.exe
windows11_x64
VirusShare...5b.exe
macos_amd64
1VirusShare...5b.exe
linux_armhf
VirusShare...5b.exe
linux_mips
VirusShare...5b.exe
linux_mipsel
VirusShare...5b.exe
linux_amd64
Analysis
-
max time kernel
655s -
max time network
1565s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
07-04-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win10-20220331-en
Behavioral task
behavioral3
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
-
Size
382KB
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.we34re.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.5kti58.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.vmckfi.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion.to/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion/6405-1A00-EAB2-0078-18EB
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.wins4n.win/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.we34re.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.5kti58.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.vmckfi.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion.to/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion/6405-1A00-EAB2-0078-18EB
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16388) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" wuapp.exe -
Executes dropped EXE 3 IoCs
pid Process 1920 wuapp.exe 1600 wuapp.exe 1928 wuapp.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertLock.tiff wuapp.exe -
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\wuapp.lnk VirusShare_41dd108ada487cb93a6e099e074f605b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\wuapp.lnk wuapp.exe -
Loads dropped DLL 2 IoCs
pid Process 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 1920 wuapp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuapp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" wuapp.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce wuapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wuapp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" wuapp.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuapp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wuapp = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run wuapp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wuapp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3543.bmp" wuapp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 1956 taskkill.exe 2260 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\Desktop VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\Desktop wuapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\\wuapp.exe\"" wuapp.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc00000000020000000000106600000001000020000000867a918786e72d74d655813d8fea8f46fb69cc362a8adca58eaf83023069f1cd000000000e80000000020000200000001ca9d0e4f23240164d5d3c9afb5d1fdd75d75d0bc55349b36f9511db8310a69620000000d799ee0e1488edd19b4c9f8f2dc8d1f25630a1ef742644cc9c1d5f550f94aa3940000000831ea102075d9dbabaaed8046cbe2122a7014f191dbbdf5ef02a034abb7ee0b5bb84f1996e1f71a9fdb0ff529ad99dad0c12af08def50fc9ef5a9df155a09be2 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06A508D1-B6A9-11EC-9547-6600847C1211} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "356124736" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207ec7c9b54ad801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06DE29D1-B6A9-11EC-9547-6600847C1211} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1664 PING.EXE 2336 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe 1920 wuapp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1164 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 1920 wuapp.exe Token: SeDebugPrivilege 1600 wuapp.exe Token: SeDebugPrivilege 1928 wuapp.exe Token: 33 852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 852 AUDIODG.EXE Token: 33 852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 852 AUDIODG.EXE Token: SeDebugPrivilege 2260 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1164 iexplore.exe 1164 iexplore.exe 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1976 iexplore.exe 1976 iexplore.exe 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 1920 wuapp.exe 1600 wuapp.exe 1928 wuapp.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 628 wrote to memory of 1920 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 27 PID 628 wrote to memory of 1920 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 27 PID 628 wrote to memory of 1920 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 27 PID 628 wrote to memory of 1920 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 27 PID 628 wrote to memory of 1996 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 28 PID 628 wrote to memory of 1996 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 28 PID 628 wrote to memory of 1996 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 28 PID 628 wrote to memory of 1996 628 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 28 PID 1996 wrote to memory of 1956 1996 cmd.exe 30 PID 1996 wrote to memory of 1956 1996 cmd.exe 30 PID 1996 wrote to memory of 1956 1996 cmd.exe 30 PID 1996 wrote to memory of 1956 1996 cmd.exe 30 PID 1996 wrote to memory of 1664 1996 cmd.exe 32 PID 1996 wrote to memory of 1664 1996 cmd.exe 32 PID 1996 wrote to memory of 1664 1996 cmd.exe 32 PID 1996 wrote to memory of 1664 1996 cmd.exe 32 PID 1724 wrote to memory of 1600 1724 taskeng.exe 39 PID 1724 wrote to memory of 1600 1724 taskeng.exe 39 PID 1724 wrote to memory of 1600 1724 taskeng.exe 39 PID 1724 wrote to memory of 1600 1724 taskeng.exe 39 PID 1724 wrote to memory of 1928 1724 taskeng.exe 40 PID 1724 wrote to memory of 1928 1724 taskeng.exe 40 PID 1724 wrote to memory of 1928 1724 taskeng.exe 40 PID 1724 wrote to memory of 1928 1724 taskeng.exe 40 PID 1920 wrote to memory of 1164 1920 wuapp.exe 41 PID 1920 wrote to memory of 1164 1920 wuapp.exe 41 PID 1920 wrote to memory of 1164 1920 wuapp.exe 41 PID 1920 wrote to memory of 1164 1920 wuapp.exe 41 PID 1920 wrote to memory of 1664 1920 wuapp.exe 42 PID 1920 wrote to memory of 1664 1920 wuapp.exe 42 PID 1920 wrote to memory of 1664 1920 wuapp.exe 42 PID 1920 wrote to memory of 1664 1920 wuapp.exe 42 PID 1164 wrote to memory of 1136 1164 iexplore.exe 43 PID 1164 wrote to memory of 1136 1164 iexplore.exe 43 PID 1164 wrote to memory of 1136 1164 iexplore.exe 43 PID 1164 wrote to memory of 1136 1164 iexplore.exe 43 PID 1976 wrote to memory of 1508 1976 iexplore.exe 45 PID 1976 wrote to memory of 1508 1976 iexplore.exe 45 PID 1976 wrote to memory of 1508 1976 iexplore.exe 45 PID 1976 wrote to memory of 1508 1976 iexplore.exe 45 PID 1920 wrote to memory of 1072 1920 wuapp.exe 46 PID 1920 wrote to memory of 1072 1920 wuapp.exe 46 PID 1920 wrote to memory of 1072 1920 wuapp.exe 46 PID 1920 wrote to memory of 1072 1920 wuapp.exe 46 PID 1920 wrote to memory of 2224 1920 wuapp.exe 50 PID 1920 wrote to memory of 2224 1920 wuapp.exe 50 PID 1920 wrote to memory of 2224 1920 wuapp.exe 50 PID 1920 wrote to memory of 2224 1920 wuapp.exe 50 PID 2224 wrote to memory of 2260 2224 cmd.exe 52 PID 2224 wrote to memory of 2260 2224 cmd.exe 52 PID 2224 wrote to memory of 2260 2224 cmd.exe 52 PID 2224 wrote to memory of 2336 2224 cmd.exe 54 PID 2224 wrote to memory of 2336 2224 cmd.exe 54 PID 2224 wrote to memory of 2336 2224 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exe"C:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1164 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1664
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1072
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "wuapp.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "wuapp.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2336
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_41dd108ada487cb93a6e099e074f605b.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_41dd108ada487cb93a6e099e074f605b.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1664
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3DCFD964-78EC-40F2-AA5B-664882B20300} S-1-5-21-2199625441-3471261906-229485034-1000:DRLQIXCW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exeC:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1600
-
-
C:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exeC:\Users\Admin\AppData\Roaming\{CAB49217-40F8-DD7D-5ABA-7FBE8D716652}\wuapp.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:936
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5c41⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{06A508D1-B6A9-11EC-9547-6600847C1211}.dat
Filesize5KB
MD50054aa4668dfa8e4676dfbac78aaea7a
SHA10f78947bd0236e377f8358297eb560dfd4de937c
SHA256b4bc486332b2022b1d26099c891a1a5b7d19dc6e42fb53e7b04310ce72fd97f0
SHA512c8cdf25d4b16b29aa62a7f22c87ab588036b90efbb3034786d5db0649708e5bb5bf5cd86519972cb358faa14bb6b79e68e069b707b74c4fed73d59e50fe0626b
-
Filesize
607B
MD5e62d0143092c2a39d5ac407e661c7456
SHA1b4b35ab1ae4d6a38c1728cf6930bf7b69326343d
SHA256510d6779ce73f10b99e9c30049b67e43ab04d37ff07bc88c21eb1a43c4f87616
SHA512c3387144732533dfa2c7abc0df76a5056d5762faac9db88ebedc0c195d2d3ce31046f43a6aa009e4f52cc22acf6c1791aa900d6576da6ab03695bc77294480e9
-
Filesize
1KB
MD5a886425974809763af6ac18ab133fca5
SHA17ef9fa762d575bcb16329ea7f5543431cd08fbc4
SHA256dc94685d7d4d0600b418319e6390dec05dae3427288c6c6e9d9586578a1cb806
SHA512e9bde327b3a78bcd6330b085f62069651263195c05ca3ab695e9fcdf696fa3af34ea26f0eff66e2f110f8108b1cafb11a8dedf55db6aaba6544eafe36a705d20
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Filesize
12KB
MD5c247714dc1a8af7c5f4c8660f25070b2
SHA10201696cf2f83797b78c388e58c5e87578699faa
SHA2562c60114480bf35e9bd85ebd842cd29d0e62a9d5346ec85cb0eb2f8720b4a5a4e
SHA5121876f4d78dc7d5b949dfa5bf9ed2643abee03003ef3b4daaf239812fbeade10aaff7b9bcb46cccd8d1f695b3244795bd8fbb95145f155e498faf51ded64b7ea6
-
Filesize
10KB
MD5c7afff11dc53b96e79e0837c60a89c49
SHA10bc6e1b84afa6466b4bd045af4c3617f2b4ebe6a
SHA256acab97c20d0a665665d4405ee1f0e07362464966c421a482febc78a0bbda2b4d
SHA512dd754f20443331e0c0a2f9bd2cb173880187c819be6162a073012c0334641107aff6bce54092a1893df7ed6684923809f52f2d658770608d583c1e8e9564f486
-
Filesize
85B
MD56f48fe8ea594602aaeca4c0e977acd8a
SHA1648d18be89cb5a623bdfeda8ea50b4a05261dd42
SHA256f00f258ab6dbb32471a8a95c1063027457395f2ea6867d259c057264b50fd6a1
SHA51272e65de5e17e3808ae93d0a5f19cfa4ce98df815c91c5bbe5c368ff5fe02512ddffdd0e7cab975fa1d0de8d9a392076a05f292eb53a1da705cda0d886d952af7
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b