Analysis
-
max time kernel
168s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 15:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/kh4sh3i/Ransomware-Samples
Resource
win10v2004-20240221-en
General
-
Target
https://github.com/kh4sh3i/Ransomware-Samples
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___YJWW3_.txt
cerber
http://p27dokhpz2n7nvgr.onion/217B-B506-FCEF-0446-95E3
http://p27dokhpz2n7nvgr.12hygy.top/217B-B506-FCEF-0446-95E3
http://p27dokhpz2n7nvgr.14ewqv.top/217B-B506-FCEF-0446-95E3
http://p27dokhpz2n7nvgr.14vvrc.top/217B-B506-FCEF-0446-95E3
http://p27dokhpz2n7nvgr.129p1t.top/217B-B506-FCEF-0446-95E3
http://p27dokhpz2n7nvgr.1apgrn.top/217B-B506-FCEF-0446-95E3
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___OHZ565BC_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (1103) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 4672 netsh.exe 3484 netsh.exe -
Drops startup file 1 IoCs
Processes:
cerber.exedescription ioc process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ cerber.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 23 raw.githubusercontent.com 47 raw.githubusercontent.com 22 raw.githubusercontent.com -
Drops file in System32 directory 38 IoCs
Processes:
cerber.exedescription ioc process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
cerber.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp1F56.bmp" cerber.exe -
Drops file in Program Files directory 20 IoCs
Processes:
cerber.exedescription ioc process File opened for modification \??\c:\program files (x86)\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\office cerber.exe File opened for modification \??\c:\program files (x86)\word cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\word cerber.exe File opened for modification \??\c:\program files (x86)\onenote cerber.exe File opened for modification \??\c:\program files (x86)\outlook cerber.exe File opened for modification \??\c:\program files (x86)\the bat! cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook cerber.exe File opened for modification \??\c:\program files (x86)\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\steam cerber.exe File opened for modification \??\c:\program files (x86)\thunderbird cerber.exe File opened for modification \??\c:\program files\ cerber.exe File opened for modification \??\c:\program files (x86)\ cerber.exe File opened for modification \??\c:\program files (x86)\bitcoin cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\office cerber.exe -
Drops file in Windows directory 64 IoCs
Processes:
cerber.exedescription ioc process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server cerber.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2916 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.execerber.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000_Classes\Local Settings cerber.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1436 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
chrome.exetaskmgr.exepid process 1784 chrome.exe 1784 chrome.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1784 chrome.exe 1784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe 1412 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1784 wrote to memory of 4604 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4604 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 3256 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 2120 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 2120 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe PID 1784 wrote to memory of 4796 1784 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/kh4sh3i/Ransomware-Samples1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99bec9758,0x7ff99bec9768,0x7ff99bec97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1908,i,17259279125196759144,2766401039624918840,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\Ransomware.Cerber\cerber.exe"C:\Users\Admin\Downloads\Ransomware.Cerber\cerber.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___BK0TL2T_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___NJHO9ES_.txt2⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "cerber.exe"3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5d60071551ab035d43f85eba9ef6d1abe
SHA147104a74c5c8f2f6f233940b016e677297d0f407
SHA25656b0a4933ba2126314b16ed800206a1b84aa24a6634b08a0009ddc1825924e30
SHA5120c34999400b7cd0f3586ecece530e5f1f016ef5d87bc8f7f163ce40ffc9623e75b2d3e1036490b08f69bbf206d7577807ba7ef326a637863abff8b9a13b1da88
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD571bd5c976e02c6c877a0c7539e474678
SHA1424fcd795d90e9ac7124f3291c4f0236b7e8b586
SHA2560242d8639ddcbd348973339dbc225dd044c02be3c4061c9939d1c2b581b82133
SHA512f6791035af564ca2917f21db9a7d4956c6eab4e5b00f430919a5046127f0640f532a6215130ac8effd67c12ddc048a21b4506606f34dbdd65bc3e6be1d631d80
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5be0c8fee4b5a8f100dd0382eed7118f2
SHA1876b4d98a4534a20a9eca694f55f69bddc9f7328
SHA2568baa35fcc68d5acf5121f293de94ce602fb698905b21403f2826b58a2f2ea944
SHA5125fd5fc6a82f1bdfc59d762cf1a81f2f1fba15329a48a5b275f485b014577988c9a9ddc1c0917868beca96114d51bbe9d3b1ed8f84ceb7bb0945a736db1fca072
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5d17c1a5948c4877c3ec19a205c32f2c4
SHA1df8cbfae708fafdcbf051a4ea203598b06d9179f
SHA256fa941ae4dd07fe52b3c4f2b8554aca675fa6b1ba83fe9efd3fff61d04a1a7238
SHA512e8cdc82f6af577ea43aded555e393eee22fe7d6d32a1981f1d05033fe7738c6bcd70778dd7e2bf73f589fd45780442f26b699e207bfe854b74a93cbb2d580c94
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5ae5b417326bdf0366fdb75246a4a286a
SHA1a5616051cdb4fe03635aca8c968ab9c9de83dd06
SHA256430d296696690f0aed1c4befa5d9f78a2e5c1133498424f9253a1f17b8b54b64
SHA51280115a6ea53b187b85fcde2cff2755e249d5d1a0ada7b9c6e844fbccc97a0b5dfa1aa6b6c467499d559ac082fafbd57996db21b9bc12402ccd814fb2a2606319
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5259846feeff7f3a8e81ccd12ae2952f7
SHA1bd746e2c15c10d22001e84b1dc3900fe1f2a4711
SHA25669ac9eed1e38f0af729dd1d40c999d167957176329be7fba8d5b0e74e26dc8dc
SHA5121fcb28200d9aa06fdc114eee558a7c478a39010edf393388b303d12fa80a1cda97ef6ca3035f9af493462c8364a132f1e67e026e53310a36a563cd170a4bd648
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5e4f36948023777592e89fdb45d1f9c55
SHA141c9f3d0fd1a2a88954900a6d9130506d5d178f1
SHA256b1f6933d14bd96a6a71f2db1fbc9bac37c62c300475b2b63383c90104e946514
SHA5122e2a560949f67c80cb0f5ede71377943e05e2939fa18ba6dab8e0bd52bebdd688467f079f6ecebee30daf3418bcca4dacfaf18c37ba5d9215da4d5e4e9a4fdd7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50dd4203e31a11374289352e2c3d0ed79
SHA1b92a96130a2063e749add3f8e1b49802be4436b9
SHA256dc0a54bc37fe894b02c0df9ef41cf52b10de7c920ee5b7670d6d61329761f942
SHA5127ef66ea9e493826e987f7145c7e75ec35bc29142780c20e1556dbb144d085d34d8772be733619321e51a7083a4a123033c9ed3ea3ab93f9183233682fba8390a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD5e199b58d865d292652bcf8e42985b81a
SHA1807beb6b68ca949309d79b94180642e39ab77a6f
SHA256c77028d93499668e917f7c8b14a4746dc2c91da2535b6ae55c41f9669505207e
SHA51278d42422d5246c16d21a1193c8396c4e3c9b7517808f18f20f071c17af43b50071650b2250c6ba5fc87daa8c71857345298a6d716c93a38fbc4655ad37422ab0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD51946aa04046bf8bed9dbbdaf7abdad88
SHA1469b7c1803f0b68523d2eac649a0e7d32a43565c
SHA256de2b4f37317a7c928058dff1124db253835dba9b6e012a796ef0777278c599ac
SHA512db2b078b2d91ffeda509b5e95357cbdcf1fd8038d0e4ab8198cceeaaf3396fc3ed87af6e84573bae3b73c15b1b7aa56cb340a4d5b2802da853411da52e397464
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
107KB
MD5e946ed5adfe24a3bc40d5a6f5af0692d
SHA1a70b2da88dfb225cc320485f9d963a6de61f6922
SHA25666d826a4ab09f73292b1614c8f1c781237fa78fc8efb9a73fb4e9b2806e3c990
SHA512ada3a341013d162712319a5d72e660b239904ddc1a69e6b972abb000474a79652a02d8f2e5159d4152d04e5ae985813e65c767d4c7aa30002c81c8bc9887c11a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57c1c9.TMPFilesize
97KB
MD5a46f523d126d540097e689dd868c47b4
SHA1bfb5b2b898a5e1eb1f1a882fd8ccd840081034aa
SHA25649b76e4ec06416fa09f3082dfe4ca17d55bdf6973abfbc62d8c92645cf2501b1
SHA512bb30625d5a2e8983f179a3309c056d65439d17a892baee905f77bcd367c39c8a3a4888b5dbe8c64f748112c63341c1fba33816f7da17781bd9f51030673679e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___OHZ565BC_.htaFilesize
75KB
MD52ab888fa20b55f5b062e88220a347b3e
SHA189b4af56fc82f5b2bf39042948627b24d7b4045a
SHA256519a4e47cfb5889aa3353cb248fbb9eb70286921f2b510804e9ad75dfe37bbf4
SHA51273cb36698dddeb5a00d01c8354b0ea6410107bd0ce8298888a84c9ec469f51cf9028b3df71c729d483f8cfda2b425b848ee027ca1409f40c2b7ed5e373d90c07
-
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___YJWW3_.txtFilesize
1KB
MD5c31ab273cdfaa94580730bdfbc9953be
SHA1d4a27db8c0bccadc40083e80fbc31e70f84e449d
SHA25674995ad635b0be44c98386570b101252f51cd33c4a8e5c73e168bbfe311e4430
SHA5129e80f3328ce215689d1a8973a001ef63c6df061843d2b5f0d35a7188b8a0aee596f471cd2cf85df79fa8ac5707b5b8c7e350739cc1617e55a51b739a89e9dcd3
-
C:\Users\Admin\Downloads\Ransomware.Cerber.zipFilesize
215KB
MD55c571c69dd75c30f95fe280ca6c624e9
SHA1b0610fc5d35478c4b95c450b66d2305155776b56
SHA256416774bf62d9612d11d561d7e13203a3cbc352382a8e382ade3332e3077e096c
SHA5128e7b9a4a514506d9b8e0f50cc521f82b5816d4d9c27da65e4245e925ec74ac8f93f8fe006acbab5fcfd4970573b11d7ea049cc79fb14ad12a3ab6383a1c200b2
-
\??\pipe\crashpad_1784_WLTQHPOJLIWDAUWAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1412-328-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-340-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-329-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-330-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-336-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-335-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-334-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-338-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-337-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/1412-339-0x000001D5AADF0000-0x000001D5AADF1000-memory.dmpFilesize
4KB
-
memory/5060-344-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-327-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-348-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-351-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-359-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-363-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-326-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-325-0x00000000021F0000-0x0000000002221000-memory.dmpFilesize
196KB
-
memory/5060-690-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-712-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/5060-715-0x0000000000440000-0x0000000000451000-memory.dmpFilesize
68KB