Overview
overview
10Static
static
3Ransomware...in.zip
windows10-1703-x64
1Ransomware...er.zip
windows10-1703-x64
1cerber.exe
windows10-1703-x64
10Ransomware...ll.zip
windows10-1703-x64
1cryptowall.exe
windows10-1703-x64
3Ransomware...aw.zip
windows10-1703-x64
1jigsaw.exe
windows10-1703-x64
10Ransomware...ICENSE
windows10-1703-x64
1Ransomware...ky.zip
windows10-1703-x64
1Locky.exe
windows10-1703-x64
10Ransomware...ba.zip
windows10-1703-x64
1Ransomware...nu.zip
windows10-1703-x64
1Ransomware...ap.zip
windows10-1703-x64
1Ransomware...ya.zip
windows10-1703-x64
1Ransomware...DME.md
windows10-1703-x64
3Ransomware...nt.zip
windows10-1703-x64
1Ransomware...ot.zip
windows10-1703-x64
1Ransomware...ex.zip
windows10-1703-x64
1Ransomware...na.zip
windows10-1703-x64
1Ransomware...pt.zip
windows10-1703-x64
1Ransomware...os.zip
windows10-1703-x64
1Ransomware..._0.zip
windows10-1703-x64
1Ransomware...na.zip
windows10-1703-x64
1Ransomware...ry.zip
windows10-1703-x64
1Ransomware...us.zip
windows10-1703-x64
1Ransomware...re.png
windows10-1703-x64
3Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
26-02-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-Samples-main.zip
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Ransomware-Samples-main/Cerber/Ransomware.Cerber.zip
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
cerber.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
Ransomware-Samples-main/Cryptowall/Ransomware.Cryptowall.zip
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
cryptowall.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Ransomware-Samples-main/Jigsaw/Ransomware.Jigsaw.zip
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
jigsaw.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Ransomware-Samples-main/LICENSE
Resource
win10-20240214-en
Behavioral task
behavioral9
Sample
Ransomware-Samples-main/Locky/Ransomware.Locky.zip
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
Locky.exe
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
Ransomware-Samples-main/Mamba/Ransomware.Mamba.zip
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
Ransomware-Samples-main/Matsnu/Ransomware.Matsnu.zip
Resource
win10-20240221-en
Behavioral task
behavioral13
Sample
Ransomware-Samples-main/Petrwrap/Ransomware.Petrwrap.zip
Resource
win10-20240221-en
Behavioral task
behavioral14
Sample
Ransomware-Samples-main/Petya/Ransomware.Petya.zip
Resource
win10-20240214-en
Behavioral task
behavioral15
Sample
Ransomware-Samples-main/README.md
Resource
win10-20240221-en
Behavioral task
behavioral16
Sample
Ransomware-Samples-main/Radamant/Ransomware.Radamant.zip
Resource
win10-20240221-en
Behavioral task
behavioral17
Sample
Ransomware-Samples-main/RedBoot/Ransomware.RedBoot.zip
Resource
win10-20240221-en
Behavioral task
behavioral18
Sample
Ransomware-Samples-main/Rex/Ransomware.Rex.zip
Resource
win10-20240221-en
Behavioral task
behavioral19
Sample
Ransomware-Samples-main/Satana/Ransomware.Satana.zip
Resource
win10-20240221-en
Behavioral task
behavioral20
Sample
Ransomware-Samples-main/TeslaCrypt/Ransomware.TeslaCrypt.zip
Resource
win10-20240221-en
Behavioral task
behavioral21
Sample
Ransomware-Samples-main/Thanos/Ransomware.Thanos.zip
Resource
win10-20240221-en
Behavioral task
behavioral22
Sample
Ransomware-Samples-main/Unnamed_0/Ransomware.Unnamed_0.zip
Resource
win10-20240221-en
Behavioral task
behavioral23
Sample
Ransomware-Samples-main/Vipasana/Ransomware.Vipasana.zip
Resource
win10-20240221-en
Behavioral task
behavioral24
Sample
Ransomware-Samples-main/WannaCry/Ransomware.WannaCry.zip
Resource
win10-20240221-en
Behavioral task
behavioral25
Sample
Ransomware-Samples-main/WannaCry_Plus/Ransomware.WannaCry_Plus.zip
Resource
win10-20240214-en
Behavioral task
behavioral26
Sample
Ransomware-Samples-main/ransomware.png
Resource
win10-20240221-en
General
-
Target
cerber.exe
-
Size
604KB
-
MD5
8b6bc16fd137c09a08b02bbe1bb7d670
-
SHA1
c69a0f6c6f809c01db92ca658fcf1b643391a2b7
-
SHA256
e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
-
SHA512
b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
SSDEEP
6144:yYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsR:yYKlYmDXEpDHRXP01
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___Z1OG_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___AII4_.txt
cerber
http://p27dokhpz2n7nvgr.onion/F4CE-E26B-DC7A-0446-905C
http://p27dokhpz2n7nvgr.12hygy.top/F4CE-E26B-DC7A-0446-905C
http://p27dokhpz2n7nvgr.14ewqv.top/F4CE-E26B-DC7A-0446-905C
http://p27dokhpz2n7nvgr.14vvrc.top/F4CE-E26B-DC7A-0446-905C
http://p27dokhpz2n7nvgr.129p1t.top/F4CE-E26B-DC7A-0446-905C
http://p27dokhpz2n7nvgr.1apgrn.top/F4CE-E26B-DC7A-0446-905C
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (1092) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2240 netsh.exe 3244 netsh.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ cerber.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB333.bmp" cerber.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\outlook cerber.exe File opened for modification \??\c:\program files (x86)\steam cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook cerber.exe File opened for modification \??\c:\program files (x86)\onenote cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\office cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote cerber.exe File opened for modification \??\c:\program files (x86)\the bat! cerber.exe File opened for modification \??\c:\program files (x86)\thunderbird cerber.exe File opened for modification \??\c:\program files (x86)\word cerber.exe File opened for modification \??\c:\program files (x86)\ cerber.exe File opened for modification \??\c:\program files (x86)\bitcoin cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\word cerber.exe File opened for modification \??\c:\program files (x86)\office cerber.exe File opened for modification \??\c:\program files\ cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint cerber.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop cerber.exe File opened for modification \??\c:\windows\ cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel cerber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2376 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000_Classes\Local Settings cerber.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1624 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3016 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 496 cerber.exe Token: SeCreatePagefilePrivilege 496 cerber.exe Token: SeDebugPrivilege 2376 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 496 wrote to memory of 2240 496 cerber.exe 75 PID 496 wrote to memory of 2240 496 cerber.exe 75 PID 496 wrote to memory of 2240 496 cerber.exe 75 PID 496 wrote to memory of 3244 496 cerber.exe 78 PID 496 wrote to memory of 3244 496 cerber.exe 78 PID 496 wrote to memory of 3244 496 cerber.exe 78 PID 496 wrote to memory of 2312 496 cerber.exe 79 PID 496 wrote to memory of 2312 496 cerber.exe 79 PID 496 wrote to memory of 2312 496 cerber.exe 79 PID 496 wrote to memory of 1624 496 cerber.exe 80 PID 496 wrote to memory of 1624 496 cerber.exe 80 PID 496 wrote to memory of 1624 496 cerber.exe 80 PID 496 wrote to memory of 636 496 cerber.exe 82 PID 496 wrote to memory of 636 496 cerber.exe 82 PID 496 wrote to memory of 636 496 cerber.exe 82 PID 636 wrote to memory of 2376 636 cmd.exe 84 PID 636 wrote to memory of 2376 636 cmd.exe 84 PID 636 wrote to memory of 2376 636 cmd.exe 84 PID 636 wrote to memory of 3016 636 cmd.exe 86 PID 636 wrote to memory of 3016 636 cmd.exe 86 PID 636 wrote to memory of 3016 636 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cerber.exe"C:\Users\Admin\AppData\Local\Temp\cerber.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
PID:2240
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
PID:3244
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___OHRBD0TN_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:2312
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___CYIE_.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "cerber.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD58b6c658d8cf8b159d017afd6c0dbaa4e
SHA199c020c3ed3b7abfd22ed4005373b1a3559d5d98
SHA256f9dab6e9188be28002b2c99e7067780b08890a6e078fa836bc04eabdaecd931e
SHA5124602c2b35fd8728bbcf54703463284a4601249790bef21228672256f25e887da44801c9972c9cc1086e74c523651b7d133f951442b9c25333bdcf2ec560e1ee6
-
Filesize
1KB
MD5cc8642528be40ac2d5376eeb55fe5af0
SHA1238e5cffbbdaeec782781f28475d339f25f9b707
SHA25651d9804b4832a50202856796ba40e768977bc299c4034956c29f034f3b38ccbb
SHA512cecc8d28fc9d3309fac950f1807c390f101cc9b2a467d40cd9457063d426f71b2ed73c9bf45f82178d642ca461bef7e0681daaaf14ce2a20e01a51cd9846f807