Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 13:45
Static task
static1
Behavioral task
behavioral1
Sample
8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe
Resource
win10v2004-20230220-en
General
-
Target
8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe
-
Size
207KB
-
MD5
a57745a30d63f511d28aa43e4b710e1c
-
SHA1
5985e7d1831784fd15de2cc62451deb16b65b046
-
SHA256
8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3
-
SHA512
d7297bc3945f14b820379989b32d9476be5c3da04ae135a4c4492cdae811956c241db5edd0ba3c858d82649dbe4fd1ca40775a7272c5b00f0a1ab77a5b4ba076
-
SSDEEP
6144:634cRT8CJLtVXW+BPGaDEoi/Siazel15:s4OT8CJpVm+BuaDm/Sps
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
http://bqyjebfh25oellur.onion.to/425C-D74F-BE43-0046-1981
http://bqyjebfh25oellur.onion.cab/425C-D74F-BE43-0046-1981
http://bqyjebfh25oellur.onion.nu/425C-D74F-BE43-0046-1981
http://bqyjebfh25oellur.onion.link/425C-D74F-BE43-0046-1981
http://bqyjebfh25oellur.tor2web.org/425C-D74F-BE43-0046-1981
http://bqyjebfh25oellur.onion/425C-D74F-BE43-0046-1981
Signatures
-
Cerber 2 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc Process Mutant opened shell.{C5AEE8B0-983E-4819-BB09-89B5D1FFE197} 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Mutant created shell.{C5AEE8B0-983E-4819-BB09-89B5D1FFE197} sdchange.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sdchange.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3700 bcdedit.exe 396 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" sdchange.exe -
Contacts a large (532) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\InitializeProtect.tiff sdchange.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation sdchange.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\sdchange.lnk 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe -
Executes dropped EXE 1 IoCs
pid Process 1296 sdchange.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sdchange = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" sdchange.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\Run 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sdchange = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sdchange = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\Run sdchange.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sdchange = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" sdchange.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce sdchange.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7078.bmp" sdchange.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE sdchange.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url sdchange.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE sdchange.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml sdchange.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt sdchange.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html sdchange.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE sdchange.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html sdchange.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt sdchange.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2140 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 4736 taskkill.exe 4488 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\Desktop 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\Desktop sdchange.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\\sdchange.exe\"" sdchange.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings sdchange.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1516 PING.EXE 3660 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe 1296 sdchange.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe Token: SeDebugPrivilege 4488 taskkill.exe Token: SeDebugPrivilege 1296 sdchange.exe Token: SeBackupPrivilege 1672 vssvc.exe Token: SeRestorePrivilege 1672 vssvc.exe Token: SeAuditPrivilege 1672 vssvc.exe Token: SeIncreaseQuotaPrivilege 4368 wmic.exe Token: SeSecurityPrivilege 4368 wmic.exe Token: SeTakeOwnershipPrivilege 4368 wmic.exe Token: SeLoadDriverPrivilege 4368 wmic.exe Token: SeSystemProfilePrivilege 4368 wmic.exe Token: SeSystemtimePrivilege 4368 wmic.exe Token: SeProfSingleProcessPrivilege 4368 wmic.exe Token: SeIncBasePriorityPrivilege 4368 wmic.exe Token: SeCreatePagefilePrivilege 4368 wmic.exe Token: SeBackupPrivilege 4368 wmic.exe Token: SeRestorePrivilege 4368 wmic.exe Token: SeShutdownPrivilege 4368 wmic.exe Token: SeDebugPrivilege 4368 wmic.exe Token: SeSystemEnvironmentPrivilege 4368 wmic.exe Token: SeRemoteShutdownPrivilege 4368 wmic.exe Token: SeUndockPrivilege 4368 wmic.exe Token: SeManageVolumePrivilege 4368 wmic.exe Token: 33 4368 wmic.exe Token: 34 4368 wmic.exe Token: 35 4368 wmic.exe Token: 36 4368 wmic.exe Token: SeIncreaseQuotaPrivilege 4368 wmic.exe Token: SeSecurityPrivilege 4368 wmic.exe Token: SeTakeOwnershipPrivilege 4368 wmic.exe Token: SeLoadDriverPrivilege 4368 wmic.exe Token: SeSystemProfilePrivilege 4368 wmic.exe Token: SeSystemtimePrivilege 4368 wmic.exe Token: SeProfSingleProcessPrivilege 4368 wmic.exe Token: SeIncBasePriorityPrivilege 4368 wmic.exe Token: SeCreatePagefilePrivilege 4368 wmic.exe Token: SeBackupPrivilege 4368 wmic.exe Token: SeRestorePrivilege 4368 wmic.exe Token: SeShutdownPrivilege 4368 wmic.exe Token: SeDebugPrivilege 4368 wmic.exe Token: SeSystemEnvironmentPrivilege 4368 wmic.exe Token: SeRemoteShutdownPrivilege 4368 wmic.exe Token: SeUndockPrivilege 4368 wmic.exe Token: SeManageVolumePrivilege 4368 wmic.exe Token: 33 4368 wmic.exe Token: 34 4368 wmic.exe Token: 35 4368 wmic.exe Token: 36 4368 wmic.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4724 wrote to memory of 1296 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe 86 PID 4724 wrote to memory of 1296 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe 86 PID 4724 wrote to memory of 1296 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe 86 PID 4724 wrote to memory of 4064 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe 87 PID 4724 wrote to memory of 4064 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe 87 PID 4724 wrote to memory of 4064 4724 8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe 87 PID 4064 wrote to memory of 4488 4064 cmd.exe 89 PID 4064 wrote to memory of 4488 4064 cmd.exe 89 PID 4064 wrote to memory of 4488 4064 cmd.exe 89 PID 4064 wrote to memory of 1516 4064 cmd.exe 90 PID 4064 wrote to memory of 1516 4064 cmd.exe 90 PID 4064 wrote to memory of 1516 4064 cmd.exe 90 PID 1296 wrote to memory of 2140 1296 sdchange.exe 92 PID 1296 wrote to memory of 2140 1296 sdchange.exe 92 PID 1296 wrote to memory of 4368 1296 sdchange.exe 96 PID 1296 wrote to memory of 4368 1296 sdchange.exe 96 PID 1296 wrote to memory of 3700 1296 sdchange.exe 98 PID 1296 wrote to memory of 3700 1296 sdchange.exe 98 PID 1296 wrote to memory of 396 1296 sdchange.exe 101 PID 1296 wrote to memory of 396 1296 sdchange.exe 101 PID 1296 wrote to memory of 4140 1296 sdchange.exe 118 PID 1296 wrote to memory of 4140 1296 sdchange.exe 118 PID 1296 wrote to memory of 4180 1296 sdchange.exe 119 PID 1296 wrote to memory of 4180 1296 sdchange.exe 119 PID 4140 wrote to memory of 5060 4140 msedge.exe 120 PID 4140 wrote to memory of 5060 4140 msedge.exe 120 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe"C:\Users\Admin\AppData\Local\Temp\8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe"1⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Roaming\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\sdchange.exe"C:\Users\Admin\AppData\Roaming\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\sdchange.exe"2⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2140
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:3700
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc505846f8,0x7ffc50584708,0x7ffc505847184⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18053002549409246842,148846835129508095,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:24⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18053002549409246842,148846835129508095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:34⤵PID:3296
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bqyjebfh25oellur.onion.to/425C-D74F-BE43-0046-1981?auto3⤵PID:4008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd4,0xfc,0x100,0xd8,0x104,0x7ffc505846f8,0x7ffc50584708,0x7ffc505847184⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6781859392198001352,9150050604311055397,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:34⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6781859392198001352,9150050604311055397,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:24⤵PID:1148
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4484
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /f /im "sdchange.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{C06D62F1-6939-4AA0-CC25-ED1241F98FF4}\sdchange.exe" > NUL3⤵PID:3816
-
C:\Windows\system32\taskkill.exetaskkill /f /im "sdchange.exe"4⤵
- Kills process with taskkill
PID:4736
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:3660
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /f /im "8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "8cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1516
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x2f41⤵PID:2760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cd4f5fe0fc0ab6b6df866b9bfb9dd762
SHA1a6aaed363cd5a7b6910e9b3296c0093b0ac94759
SHA2563b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81
SHA5127072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676
-
Filesize
152B
MD5cd4f5fe0fc0ab6b6df866b9bfb9dd762
SHA1a6aaed363cd5a7b6910e9b3296c0093b0ac94759
SHA2563b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81
SHA5127072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676
-
Filesize
152B
MD5cd4f5fe0fc0ab6b6df866b9bfb9dd762
SHA1a6aaed363cd5a7b6910e9b3296c0093b0ac94759
SHA2563b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81
SHA5127072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676
-
Filesize
152B
MD5cd4f5fe0fc0ab6b6df866b9bfb9dd762
SHA1a6aaed363cd5a7b6910e9b3296c0093b0ac94759
SHA2563b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81
SHA5127072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676
-
Filesize
152B
MD51d40312629d09d2420e992fdb8a78c1c
SHA1903950d5ba9d64ec21c9f51264272ca8dfae9540
SHA2561e7c6aa575c3ec46cd1fdf6df51063113d277012ed28f5f6b37aea95cd3a64ac
SHA512a7073247ae95e451ed32ceeae91c6638192c15eaad718875c1272eff51c0564016d9f84690543f27df509a7d579de329d101fbf82fed7cbeb27af57393de24ac
-
Filesize
152B
MD51d40312629d09d2420e992fdb8a78c1c
SHA1903950d5ba9d64ec21c9f51264272ca8dfae9540
SHA2561e7c6aa575c3ec46cd1fdf6df51063113d277012ed28f5f6b37aea95cd3a64ac
SHA512a7073247ae95e451ed32ceeae91c6638192c15eaad718875c1272eff51c0564016d9f84690543f27df509a7d579de329d101fbf82fed7cbeb27af57393de24ac
-
Filesize
305B
MD59503e14ea14378cadd7d034029a92f19
SHA17a57c0c5d074229ec0368f00ae4289ee4cb4f63e
SHA2568e19896bf0b7b5ae91cc4adf8a16376868731b95517760f0606175bf4ad4a8da
SHA51210c35cf7aa7b09e81ec0ea15179f4917863b194057482fd5d17cadd8975f756b4b05519e433507f717814acc16dd77a595b854ca353956bbcd416e07d77bb22d
-
Filesize
1KB
MD52f781562e4b1d857be4a31afa1f9e5f6
SHA114266e555deae47a38080436416d843362ff4b78
SHA256a69e55650694ea09a2aed8d05e0c389bbdb09f1fe139e4bcd93055d363e8441f
SHA512b2b9d83b18e11d22ec10483cc1ed55a7fc397049f96f619358a29f1f8da047be1dc000e475c3371726eb158be5e3b46746478e2fb3ec417e19f0320d5de87ad9
-
Filesize
207KB
MD5a57745a30d63f511d28aa43e4b710e1c
SHA15985e7d1831784fd15de2cc62451deb16b65b046
SHA2568cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3
SHA512d7297bc3945f14b820379989b32d9476be5c3da04ae135a4c4492cdae811956c241db5edd0ba3c858d82649dbe4fd1ca40775a7272c5b00f0a1ab77a5b4ba076
-
Filesize
207KB
MD5a57745a30d63f511d28aa43e4b710e1c
SHA15985e7d1831784fd15de2cc62451deb16b65b046
SHA2568cc84c910910535990b7ec98b521f7bb84774a78fa488a27dacff5590a7322e3
SHA512d7297bc3945f14b820379989b32d9476be5c3da04ae135a4c4492cdae811956c241db5edd0ba3c858d82649dbe4fd1ca40775a7272c5b00f0a1ab77a5b4ba076
-
Filesize
10KB
MD5c2778809e84f8e0608a4ec150796b588
SHA1675a8db3a8da00a480bf4c8640d81775f87004fd
SHA256c338afc7dcfb0c0c403aa7341d3def7837cdbd34e16b8a956609d2f7f9ac6b53
SHA5128f5f69e859425415d0dcbc6e44756191ef9c21f3acbb9c7eb8821094a725ffb6a654734fca2f71ef136c61e4ef4030907791d5637561d6d0708ceb4f72545c4e
-
Filesize
252B
MD518d46f5d8ebd3c7d6df0c7a8fd1bd64d
SHA1aeb8407457434aabce2a4c2f95fe305c5303f929
SHA256ceb35b75d397b07c84dfab3a28189e9431bdf80ec99ab65f9ccf01986bd4a8e9
SHA51235fc759be0dee77eb9e39350873c24d9693cf6f370f171814e2ce6250ea814fea8a0887442ebae9077d6e9ff81ae7034faa0afcb080401a7d4ac384d2ba42d65
-
Filesize
19KB
MD5f9ff864228d15e3df81032a3a3653b70
SHA17402eb23a2c959be9b3fa6098bb372f16d8a844e
SHA256264b26531997be249ba6786324602f0343e882ba37457e9aeca2dddeb5b06029
SHA5124e6ad8b063b6f60d366d750047bfe933e6eae939d2e5067037dd119bc2470ebee08ef8ab1967d2a2e9cf3569cc3e6d263dd289275a271971b19c25adc7152530
-
Filesize
10KB
MD5c2778809e84f8e0608a4ec150796b588
SHA1675a8db3a8da00a480bf4c8640d81775f87004fd
SHA256c338afc7dcfb0c0c403aa7341d3def7837cdbd34e16b8a956609d2f7f9ac6b53
SHA5128f5f69e859425415d0dcbc6e44756191ef9c21f3acbb9c7eb8821094a725ffb6a654734fca2f71ef136c61e4ef4030907791d5637561d6d0708ceb4f72545c4e
-
Filesize
88B
MD52b5b43aeaaf5c20fbc5834aba204ba0d
SHA159dd2535d8d5cb7b671c352c6c31042dd515fe45
SHA2561a88937e19b6d36c54d40f45e0d033a0983d140312db0948231e0ebc1a998505
SHA512b37bedf28ef52f968f12246bb2c77df179dfa8108da4e8b43e69a5d30000b22590385d62606e76392a7431f7fff69e6a8cac49510301488736869fcf33030dad
-
Filesize
252B
MD518d46f5d8ebd3c7d6df0c7a8fd1bd64d
SHA1aeb8407457434aabce2a4c2f95fe305c5303f929
SHA256ceb35b75d397b07c84dfab3a28189e9431bdf80ec99ab65f9ccf01986bd4a8e9
SHA51235fc759be0dee77eb9e39350873c24d9693cf6f370f171814e2ce6250ea814fea8a0887442ebae9077d6e9ff81ae7034faa0afcb080401a7d4ac384d2ba42d65