Overview
overview
10Static
static
VirusShare...fd.exe
windows7_x64
10VirusShare...fd.exe
windows10_x64
10VirusShare...fd.exe
windows10-2004_x64
10VirusShare...fd.exe
windows11_x64
VirusShare...fd.exe
macos_amd64
1VirusShare...fd.exe
linux_armhf
VirusShare...fd.exe
linux_mips
VirusShare...fd.exe
linux_mipsel
Analysis
-
max time kernel
649s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
07-04-2022 19:30
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10-20220223-en
Behavioral task
behavioral3
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral4
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
debian9-mipsel-en-20211208
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.qor499.top/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.gkfit9.win/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.305iot.win/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.dkrti5.win/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.onion/3775-55D3-C348-029E-DE2A
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.zmvirj.top/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.qor499.top/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.gkfit9.win/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.305iot.win/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.dkrti5.win/3775-55D3-C348-029E-DE2A
http://cerberhhyed5frqa.onion/3775-55D3-C348-029E-DE2A
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
suricata: ET MALWARE Ransomware/Cerber Checkin 2
suricata: ET MALWARE Ransomware/Cerber Checkin 2
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (4)
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (4)
-
Contacts a large (16388) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" Magnify.exe -
Executes dropped EXE 6 IoCs
pid Process 1340 Magnify.exe 576 Magnify.exe 2044 Magnify.exe 1820 Magnify.exe 1812 Magnify.exe 992 Magnify.exe -
Deletes itself 1 IoCs
pid Process 1200 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\Magnify.lnk Magnify.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\Magnify.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Loads dropped DLL 2 IoCs
pid Process 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 1340 Magnify.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run Magnify.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" Magnify.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Magnify.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" Magnify.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA94A.bmp" Magnify.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 1860 taskkill.exe 1604 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\Desktop Magnify.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{733118C5-0E24-B662-40F1-057F1DAF7894}\\Magnify.exe\"" Magnify.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dda8e4cddf84341b86bc814e98354e5000000000200000000001066000000010000200000000fbcc62fb4943f15e04aa96334f4f2ff795ee85be087a2fa0cac6177fd3e2688000000000e8000000002000020000000cc74141daf193e30b271ae8ae9097b306ebbc6c77f9f8d88cbfdb14b6e29b5b820000000d82c487a8ffc2727df91fd06d5ea8ca3cddc29ef011dfb4bbbac20f9e3bc05bc40000000ff4e17c08dfef339531458dab65ae2c53bb2ca68dc9eb2ff453482b6f9445696cadfcf6d621a3faa40a7651985b09473cf24a5ccf003019b838c9bdb0cb8c4d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e66960c74ad801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99106EB1-B6BA-11EC-9158-EA5C3F5CE8CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{989245D1-B6BA-11EC-9158-EA5C3F5CE8CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "356132284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1348 PING.EXE 1964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe 1340 Magnify.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 1340 Magnify.exe Token: SeDebugPrivilege 1860 taskkill.exe Token: SeDebugPrivilege 576 Magnify.exe Token: SeDebugPrivilege 2044 Magnify.exe Token: SeDebugPrivilege 1820 Magnify.exe Token: SeDebugPrivilege 1812 Magnify.exe Token: SeDebugPrivilege 992 Magnify.exe Token: 33 340 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 340 AUDIODG.EXE Token: 33 340 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 340 AUDIODG.EXE Token: SeDebugPrivilege 1604 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1580 iexplore.exe 1988 iexplore.exe 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 1988 iexplore.exe 1988 iexplore.exe 1580 iexplore.exe 1580 iexplore.exe 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 7 IoCs
pid Process 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 1340 Magnify.exe 576 Magnify.exe 2044 Magnify.exe 1820 Magnify.exe 1812 Magnify.exe 992 Magnify.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 1340 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 27 PID 744 wrote to memory of 1340 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 27 PID 744 wrote to memory of 1340 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 27 PID 744 wrote to memory of 1340 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 27 PID 744 wrote to memory of 1200 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 28 PID 744 wrote to memory of 1200 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 28 PID 744 wrote to memory of 1200 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 28 PID 744 wrote to memory of 1200 744 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 28 PID 1200 wrote to memory of 1860 1200 cmd.exe 30 PID 1200 wrote to memory of 1860 1200 cmd.exe 30 PID 1200 wrote to memory of 1860 1200 cmd.exe 30 PID 1200 wrote to memory of 1860 1200 cmd.exe 30 PID 1200 wrote to memory of 1964 1200 cmd.exe 33 PID 1200 wrote to memory of 1964 1200 cmd.exe 33 PID 1200 wrote to memory of 1964 1200 cmd.exe 33 PID 1200 wrote to memory of 1964 1200 cmd.exe 33 PID 924 wrote to memory of 576 924 taskeng.exe 36 PID 924 wrote to memory of 576 924 taskeng.exe 36 PID 924 wrote to memory of 576 924 taskeng.exe 36 PID 924 wrote to memory of 576 924 taskeng.exe 36 PID 924 wrote to memory of 2044 924 taskeng.exe 39 PID 924 wrote to memory of 2044 924 taskeng.exe 39 PID 924 wrote to memory of 2044 924 taskeng.exe 39 PID 924 wrote to memory of 2044 924 taskeng.exe 39 PID 924 wrote to memory of 1820 924 taskeng.exe 40 PID 924 wrote to memory of 1820 924 taskeng.exe 40 PID 924 wrote to memory of 1820 924 taskeng.exe 40 PID 924 wrote to memory of 1820 924 taskeng.exe 40 PID 924 wrote to memory of 1812 924 taskeng.exe 41 PID 924 wrote to memory of 1812 924 taskeng.exe 41 PID 924 wrote to memory of 1812 924 taskeng.exe 41 PID 924 wrote to memory of 1812 924 taskeng.exe 41 PID 924 wrote to memory of 992 924 taskeng.exe 42 PID 924 wrote to memory of 992 924 taskeng.exe 42 PID 924 wrote to memory of 992 924 taskeng.exe 42 PID 924 wrote to memory of 992 924 taskeng.exe 42 PID 1340 wrote to memory of 1580 1340 Magnify.exe 43 PID 1340 wrote to memory of 1580 1340 Magnify.exe 43 PID 1340 wrote to memory of 1580 1340 Magnify.exe 43 PID 1340 wrote to memory of 1580 1340 Magnify.exe 43 PID 1340 wrote to memory of 1552 1340 Magnify.exe 44 PID 1340 wrote to memory of 1552 1340 Magnify.exe 44 PID 1340 wrote to memory of 1552 1340 Magnify.exe 44 PID 1340 wrote to memory of 1552 1340 Magnify.exe 44 PID 1580 wrote to memory of 2032 1580 iexplore.exe 46 PID 1580 wrote to memory of 2032 1580 iexplore.exe 46 PID 1580 wrote to memory of 2032 1580 iexplore.exe 46 PID 1580 wrote to memory of 2032 1580 iexplore.exe 46 PID 1988 wrote to memory of 1144 1988 iexplore.exe 48 PID 1988 wrote to memory of 1144 1988 iexplore.exe 48 PID 1988 wrote to memory of 1144 1988 iexplore.exe 48 PID 1988 wrote to memory of 1144 1988 iexplore.exe 48 PID 1340 wrote to memory of 1640 1340 Magnify.exe 49 PID 1340 wrote to memory of 1640 1340 Magnify.exe 49 PID 1340 wrote to memory of 1640 1340 Magnify.exe 49 PID 1340 wrote to memory of 1640 1340 Magnify.exe 49 PID 1340 wrote to memory of 112 1340 Magnify.exe 53 PID 1340 wrote to memory of 112 1340 Magnify.exe 53 PID 1340 wrote to memory of 112 1340 Magnify.exe 53 PID 1340 wrote to memory of 112 1340 Magnify.exe 53 PID 112 wrote to memory of 1604 112 cmd.exe 55 PID 112 wrote to memory of 1604 112 cmd.exe 55 PID 112 wrote to memory of 1604 112 cmd.exe 55 PID 112 wrote to memory of 1348 112 cmd.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe"C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1552
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1640
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "Magnify.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "Magnify.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:1348
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1964
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E1628EBF-051D-4CC3-9911-6ED8D3398B10} S-1-5-21-2932610838-281738825-1127631353-1000:NXLKCZKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exeC:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:576
-
-
C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exeC:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2044
-
-
C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exeC:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1820
-
-
C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exeC:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1812
-
-
C:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exeC:\Users\Admin\AppData\Roaming\{733118C5-0E24-B662-40F1-057F1DAF7894}\Magnify.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:904
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{989245D1-B6BA-11EC-9158-EA5C3F5CE8CA}.dat
Filesize4KB
MD551c3636cee7e789348e9c9b3587627fd
SHA1baa5cd17ab06179f0a9101fcc7f13ae28d47f266
SHA256daef8423e04ad5693614702441420690e1e6f6a9de373d69d93ebd523971d2eb
SHA5124001476752f3bc31ea1b200a4e0ee57212944c2ab5b2d7c876967225892735985c45312ec662f909207556dd3b110fe0ab9b5f91f23a45d85c14b236fdf5a2ed
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{99106EB1-B6BA-11EC-9158-EA5C3F5CE8CA}.dat
Filesize5KB
MD5b6aed7382f09345d8f4562fabaaf198b
SHA1008cb86d4ce8f767ef85bba58516a53274c81411
SHA25620edb66cd42ccb0a9fad6b68e4ef1c7f676c25488b5c54111ebfb6836e8788b6
SHA51224526bbc81913a02aaef54cfcc3e23cb40294ff06820c4062ef36100de0efefbe48af9329d46cf98427d3322f908f840143d8e1dae2e10d2e3d74b407638a589
-
Filesize
608B
MD5e69b2fb457af512636f6ca61aa599c50
SHA10a211c3fdd85607cc8c030193726e3f1b1a1970a
SHA256e9763e5d9b864d1f09642529ef56f3ef142a484ad4a3b8549892fc8f5902e523
SHA512b7380edcd61da8de818d3cee1d305eee67f92fa0ca570fc19c01e5459062d698dae7b10c4f94f44d8baee3d495bd07a3dbb283cb42394db04d1a841e614f2fae
-
Filesize
1KB
MD5dc2b4239ac6466d2ca57a50cd8f1b225
SHA1cdc7afe46379766ed32fa4a435582916d216e2cf
SHA2567fc7093f8b6610ae170cb999e8760cf8cff20ea632a813c88e9640d0cafbbee2
SHA512d778cd889726471615142b737a0ece80843db08f8529fdb915e615913ba21ab50ba0010c347cdb8d1a5c18f5b1fb338978454e67dda5a7e98cffb69476343423
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
12KB
MD59357e871f296ae41cc11f1384bdd962b
SHA15df87b6f23db9fc0483fcb602b6c7050aa721336
SHA256e6c158e6fc99319b7718687d95d2c7e9c1c9cb7f77d2439d8fb5a7634f94b049
SHA512718d3e7d9b97aad2c470290a5e8b0b2073de96cfe82e53017e51bbc5a1bf5fac1dbde6c9c527b14e8117512feebd0da649ab73665b33fc2c1ec6f1fb91f07238
-
Filesize
10KB
MD57f5d3579a0244aef70c265bec89674df
SHA1174b7b561fdbe4461614304b82bfef619256473a
SHA25607c6f074956a5398a6ec373ca280d03f13d5d2898a8ac4127e0aeee55cd3ef05
SHA51285b5a50dd4fda0477d5e4473af17818fc4ecb7a9e6e01de9c910279ca4a92b60bebb497b55889cd89aea17c46a88319990fdc987ab7c32d40c47e3dcc140b7d9
-
Filesize
85B
MD5a512326ddde6b2382059557ee989e706
SHA1d0fd11bb49fe190d1addecc2e3126bbd4a7d06c1
SHA25618b9bd3353f3a7d4f8030b3c5527432bbcd041571d31ce07e696bbd307c43fe8
SHA512ee156ec1a36f47ce1a7805ffc682243489aa41e4c7c2fb2762fe663c0aaf3f709e83c2e0f6e687e8adc37d1633ddd294697b709e94f98c51f4ee5ae90cde0b72
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684