Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 17:13

General

  • Target

    z1.exe

  • Size

    157KB

  • MD5

    6abfecb8d7115c6efdf0c41d97f13dcf

  • SHA1

    785f67febde6a9f084d6b41bebdd2ac7cc0d788e

  • SHA256

    eedce41f2642f9e2b640464df4a305522cb5caec2267cd38411608e67b4a91bc

  • SHA512

    980a5aa19454140b17571a286291cac4ceabbde9c2dc0a763c3401592428d23f2bc38bc9b6686f160d99af4ffc38d0f33b6b61b3d5a89e1766ca6e3333cb875c

  • SSDEEP

    3072:JhWoilJVQcCkW5VMw2CYDTKvZat753W+WCUUyT:J3GJVkkMVBaF75dGh

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>Cerber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <pre class="logo"> /###### /######## /####### /####### /######## /####### /##__ ##| ##_____/| ##__ ##| ##__ ##| ##_____/| ##__ ## | ## \__/| ## | ## \ ##| ## \ ##| ## | ## \ ## | ## | ##### | #######/| ####### | ##### | #######/ | ## | ##__/ | ##__ ##| ##__ ##| ##__/ | ##__ ## | ## ##| ## | ## \ ##| ## \ ##| ## | ## \ ## | ######/| ########| ## | ##| #######/| ########| ## | ## \______/ |________/|__/ |__/|_______/ |________/|__/ |__/ </pre> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #CerberRansomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846</a></li> <li><a href="http://cerberhhyed5frqa.easypaybtc.com/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.easypaybtc.com/FE5E-22DD-CEA9-0067-3846</a></li> <li><a href="http://cerberhhyed5frqa.fastpaybtc.com/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.fastpaybtc.com/FE5E-22DD-CEA9-0067-3846</a></li> <li><a href="http://cerberhhyed5frqa.onion.cab/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.onion.cab/FE5E-22DD-CEA9-0067-3846</a></li> <li><a href="http://cerberhhyed5frqa.onion.to/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.onion.to/FE5E-22DD-CEA9-0067-3846</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846" target="_blank">http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/FE5E-22DD-CEA9-0067-3846</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt

Ransom Note
/###### /######## /####### /####### /######## /####### /##__ ##| ##_____/| ##__ ##| ##__ ##| ##_____/| ##__ ## | ## \__/| ## | ## \ ##| ## \ ##| ## | ## \ ## | ## | ##### | #######/| ####### | ##### | #######/ | ## | ##__/ | ##__ ##| ##__ ##| ##__/ | ##__ ## | ## ##| ## | ## \ ##| ## \ ##| ## | ## \ ## | ######/| ########| ## | ##| #######/| ########| ## | ## \______/ |________/|__/ |__/|_______/ |________/|__/ |__/ ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #CerberRansomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846 | | 2. http://cerberhhyed5frqa.easypaybtc.com/FE5E-22DD-CEA9-0067-3846 | | 3. http://cerberhhyed5frqa.fastpaybtc.com/FE5E-22DD-CEA9-0067-3846 | | 4. http://cerberhhyed5frqa.onion.cab/FE5E-22DD-CEA9-0067-3846 | | 5. http://cerberhhyed5frqa.onion.to/FE5E-22DD-CEA9-0067-3846 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/FE5E-22DD-CEA9-0067-3846 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.kipfgs65s.com/FE5E-22DD-CEA9-0067-3846

http://cerberhhyed5frqa.easypaybtc.com/FE5E-22DD-CEA9-0067-3846

http://cerberhhyed5frqa.fastpaybtc.com/FE5E-22DD-CEA9-0067-3846

http://cerberhhyed5frqa.onion.cab/FE5E-22DD-CEA9-0067-3846

http://cerberhhyed5frqa.onion.to/FE5E-22DD-CEA9-0067-3846

http://cerberhhyed5frqa.onion/FE5E-22DD-CEA9-0067-3846

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Contacts a large (16393) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\z1.exe
    "C:\Users\Admin\AppData\Local\Temp\z1.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\ReAgentc.exe
      "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\ReAgentc.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2652
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1108
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1284
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1548
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:2900
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:108
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1900
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:1760
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "ReAgentc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\ReAgentc.exe" > NUL
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1440
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "ReAgentc.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:332
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:1904
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "z1.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\z1.exe" > NUL
          2⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "z1.exe"
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2576
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:2500
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {9CDA2CC5-DD98-4A00-AA55-ED3F121EB9AF} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\ReAgentc.exe
          C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\ReAgentc.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1244
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
          PID:2720

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html

          Filesize

          12KB

          MD5

          43497ccaf76a247fa84ca7bff8997efb

          SHA1

          f5353dd7078a6e5d56acfe7590e7bc79ea9847d7

          SHA256

          8cc6df53c9cdaef0ea3bf566f9ebbd8d63ffdc5f5cf0c25819d199a6229b11de

          SHA512

          781ce76965f1566b32ae89063d155078eba0d2387f80b816310aeca06330afa9c9a0d9f3ccffb1d7307394625e488a04313f3710ee9292c098f987379feb53d9

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt

          Filesize

          10KB

          MD5

          b4875c9cb4cbff25f406b6234b2f1678

          SHA1

          6d43d5e759300d0dc2906cf6fc1618a540d6804e

          SHA256

          f103fdc9ed647bb8301bbca9ac88c202a216ee8058b96b2ae98bb46e4d1fe3c4

          SHA512

          8d5e015ea21fb50c27d1f056104610250de3bf02e9351c531bde250235500f982ca2506f8d4c2a2fea1a82d9919853a5f550b184f31af5805c2c688b33ec1ef7

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.vbs

          Filesize

          204B

          MD5

          f4f62c6f03227c16f4224d94f3df3290

          SHA1

          e5d588a1fba64c8886685b948f51550e4807431e

          SHA256

          794ae25ea84923dbb539d6c7fba91206d56f11606a853ccb1dad54a8f84cebe2

          SHA512

          bcb43c92f5c95dfe301d4c2c219d9dfdebf8b47336c190a639e7436229ae6f7c16b861c422f3c054121962caced526a0d397eb1d93536fcf13e836c0fda67363

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          3ba75b014cf4ad87045bb92ff56054e7

          SHA1

          14d070cbf3430e971f1cf5c6c3e8e70626b39451

          SHA256

          fffe562d0b3eedb273895592a2bd7699ce520c1ad980a36ddf5d8f91514da28a

          SHA512

          ae457895e5b1179156b659bf11bea49a47c0938ab779df90088c0f978b9343ae52a837ef1ecc491f5698f1c6008be168e1e963daa03e8507e2454a4ea3cdf82b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b7c2ca2b78dc24d00439534b0bcdef00

          SHA1

          71bf257a25a5efea1655b480e6503f57b2c56b10

          SHA256

          a239af433f77b4b5252b90014c42d752a1372a6d91994a65cb9c04e89b677312

          SHA512

          2929c35d3652cd0a1ee6d443baf7d1c4038514df72f4267fd38448cba50bf386fdb9f5b0422606d509c920a69602896caf5182ad6b6ea01e997a87de7704255a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          85727fa24415e87ded73f0565a0e0cfc

          SHA1

          c3b750efcb1c549cb24035520454a93b446d0736

          SHA256

          575df2f398999af73435b78146fab1723b12e57850678aa2dc58389193ea030f

          SHA512

          07400a06974f6f0a9d208fc84f62d944cdbabe5e4f03ffb1a08e60cd951aee2228a65c46e92e27f8906cb7b35e23727e1228ad5bb1ea295b19b1cd6902ee99a8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f41d0130a8847726c3b80bc4c05ac6d2

          SHA1

          00d21ab7bb7632de06a335b0430f55eb08e77cf1

          SHA256

          3a65739394ff5e8662b60ca9a0c6c3c660a031cf9f54471fd331efc87267c213

          SHA512

          205d43e7f611cd59d619d0420789786d54f89b7a814e4d7030199d4e21ae37803817aa330636ca30965e04b306ab142a31a71f761d192c2610a85130e3de4608

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8290007d4ad9febbd496e6158945a8a6

          SHA1

          75dd98d4fe45cb5df682aef2fa5711af7ac3f59c

          SHA256

          b963648207f208d8ae747250d68fd0aa9e639735f9132bc531d20f895e926b4d

          SHA512

          8ea9187e014bb114abeb491799bd075d41d028c94e641934c9ce7b3eb8f46fccb98503ffa4ff5d6573837ce5832153f8194101f8047126ee156aba4ae09b59be

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3ef20306b5bd5c036cf85260d99943e1

          SHA1

          84cb4cd7af2e4e486790240882b19e2807b4b658

          SHA256

          0b2551ec1c488a62aeb8151ce882c097f6c2a736e6d803851ef19592362e53c1

          SHA512

          080795c1dfae17499eb732443128af4b32ef2ac69b639791466a95c49d4f411d4e27a7d7649156e5150b1680b028f4a5f75c6feacc70b2aed2f5044276f34cac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c743eab4c6855176060102d222d83058

          SHA1

          e9b280266e1383ad8f00a74fe816a333ec31831f

          SHA256

          594f20b5c425268b600b884319ef65bc65bc5faf406804509c4a61c260f2b8f9

          SHA512

          9e5548ba087ebd1bb6f956d716c553b2d5cbb092b1eac02167d6ad8276e15dc9a91f4935c9ac5721f07e8ffce4c5c609acd70ead12ddf839dd7eeb3490262eda

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9e72930fb49b262692d37a23a35b9152

          SHA1

          3d8b5078a7132fa6e2da6599734483da2a8a90f7

          SHA256

          5d8a0d33b8ce4109f70443cada03266050784a9f99f8d0a2d7bacebd409837fa

          SHA512

          04b56ea09e1a48cf2a0ef170f8188bb54774a224259cceedab8f84501330df580d95049595d40b4d656789618f33f4bb9b5212e177f64482755bd623a1691060

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e08d68799dc21c7046f059e15df36227

          SHA1

          9e3ce640423820c787625ba8ef0b7035066b44f8

          SHA256

          3ea64ecdcca42140347427a19a8b789982a80c6402cdeb9e4ac5869d26e6a780

          SHA512

          2c1a8002e00933145f533b67fd75b563ea78b856d2808f5936934a0a0ed8bbbd25783498a8c967d7d63c0371d3826cc04752892d0de2f3e40b5d06c365ad396a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          da6b6a146d6fd8411593aa4f6de5eb4d

          SHA1

          87867824aac2ff8ec4c16a3b79ca1b0d7b090bab

          SHA256

          8413dd05e772aa67bf6941ff7588b1fde8fcadc4cd89837cf35d6cf1787c05ae

          SHA512

          1433be2544a93cc92ec99c15bb61267bf0e14d39cfe5e5a2f3b421ea321047a4ae62a2feeaaf02acf9a17fe4e9c65679f23b7f2a8ec7f7fdd642090d6e2dd29b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7d8854db67be2ea56f6854d54f533f64

          SHA1

          1d2bb96e1ae56ab91f296547ea5584734277a03a

          SHA256

          31112d0b6f29a2ba753c33e0e22683ded6e69be12153d622088bfc36ef946125

          SHA512

          6d0c11d1cefdc03c13b74267ed0f0b3e8eba8c99660b680559eb3b1e8c008689edbaea5c8ea0a001e748f3033bdab09f4e9669aa465a249de4f27307d770f82f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          64244da176e8c0094381445d1d0e1867

          SHA1

          9208ca74fc4e9cdb310698df7237e98571686c7d

          SHA256

          8a9b94db52f506b53e083eeee1efe8ce1cb643466853b664a7338f8021da0326

          SHA512

          4f989bca092dc256e1c2c5a94acbb58a8bc8b62c2d8fbf0a6df010e17a5ad8f16d5d912ce405c8910470a168308166e73a91e6a8a32d1e8a2a606986389d141b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d950a1551ba237cba03a1eacf944290c

          SHA1

          d305d9a5cbab363d5c40cfa4e3e8448b896c7b27

          SHA256

          0e895f6e531340e3a7821c6ca03caa26412fe574c52b0f0572bf2c54650e004f

          SHA512

          92a7f0a2a411ba54c16760544b2c9c4c1b9381d259d4210a3a6aa92bfc03bdbe3ec200e3a9ec481ed2d40e73a78a28458119d741a761acf7d09b4cebcb0e3f6f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          409bd0c1a728272c4031794cfe0e8b53

          SHA1

          a1149ff56ec12e76c0ba1d4ed2fd99721682d085

          SHA256

          5ce186018e28a5a1710df9e6e70ad406e9d101db088805e7c94ed2409ea8d545

          SHA512

          633edada6c2149a7ec3acdbfc34ce3d91738daf579655cc188fc9b255b1ee9a586f0c1cc8952b849f8f6ff06a8d4e3a22a5485a56680591498117df23443a808

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          389e794a6d5e4f399e7ee695a1ab2cfc

          SHA1

          ddfb5551cec1d8a85944a4391a5a372086657d20

          SHA256

          afc89d8c6d0fbad1d2272279e9f55bb307e089b3fcc336396044cd2f68d41023

          SHA512

          b354679ff7f57575b9cac9fbf5d728c75b3900db21077a1f20881c25686213f15fe88d2f663a7ebd9f45343b9f7c8222367303ab2a921eaf0b182ee6e1d19707

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          87361be344f6dcda2e0fc8c3bab034e2

          SHA1

          cea24502a943bffc5a23204e0e0339f0080673f3

          SHA256

          83f681b90a55c79bf725365468523f82c7360002646aed63b06761bec6126806

          SHA512

          4247805b49b7f87cf32c17a1cb3666bfdde0828156ab4f4a874b9d40995dbc7149ae2022acbe65a03e656874cfd2c32a69836717f2d16e38209f31c65fae41d4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          20b96ce59da55773f87688473970fa20

          SHA1

          c7cce39ec53cba73bd7816f5d860a6b8601b32d7

          SHA256

          7613b9d13425a9a46872ffe8e09268ee099a7cfb7063a0ab86d82ae7cfd2bae9

          SHA512

          5b3cef7373213035aeb9deca1699ff8db5db6d5c45c2c8e1b793f2455b39dc4d5260e597983e06c4103a3bbf40ff66a710dd1f9b3b2c0fb686446aa40a621886

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          bf62c5e2eebde48ae230fdebf6a0aeb8

          SHA1

          9470deb3dd73c7374aa4ff4787c3213b5a92c2c2

          SHA256

          d0c51886853e489565825102b083bd73ce7a57ab5e560ab27a7934a0eac2359b

          SHA512

          c4c0dc1f68c1b993249b826eb0497fba040a876a37e2bfab5c0be212f90b3ae6d8faaf8b602c0ebc20717e0f45c38307a494f333dd7cd92a5db84538d6e11737

        • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

          Filesize

          4KB

          MD5

          da597791be3b6e732f0bc8b20e38ee62

          SHA1

          1125c45d285c360542027d7554a5c442288974de

          SHA256

          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

          SHA512

          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

        • C:\Users\Admin\AppData\Local\Temp\CabFE5D.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\TarFFB9.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ReAgentc.lnk

          Filesize

          1KB

          MD5

          33ed02a24e892df649326d2899c3c70f

          SHA1

          d66ceef4f38ea3a118b54666d7dfe4244094d47f

          SHA256

          c07c3192ce42d2ab83b9b3465f7bbd549480817dfcec805dfbfb702850904c3a

          SHA512

          c2e3430711d277ce45dbd50eaa2c43bf1923144f6be43eef62d882cbc7d8755eb60cf9cc6db003765cfb28957ccad791209ab814df17072909e6a4638877d160

        • \Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\ReAgentc.exe

          Filesize

          157KB

          MD5

          6abfecb8d7115c6efdf0c41d97f13dcf

          SHA1

          785f67febde6a9f084d6b41bebdd2ac7cc0d788e

          SHA256

          eedce41f2642f9e2b640464df4a305522cb5caec2267cd38411608e67b4a91bc

          SHA512

          980a5aa19454140b17571a286291cac4ceabbde9c2dc0a763c3401592428d23f2bc38bc9b6686f160d99af4ffc38d0f33b6b61b3d5a89e1766ca6e3333cb875c

        • memory/948-23-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/948-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/948-3-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/948-4-0x0000000000220000-0x000000000023F000-memory.dmp

          Filesize

          124KB

        • memory/948-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/948-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/948-5-0x0000000000401000-0x0000000000413000-memory.dmp

          Filesize

          72KB

        • memory/1244-37-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-18-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-21-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-22-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-20-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-1003-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-19-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-17-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-29-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-31-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-30-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-39-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2184-425-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB