Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/A775-CFFE-6C1A-029E-DA83
http://cerberhhyed5frqa.qor499.top/A775-CFFE-6C1A-029E-DA83
http://cerberhhyed5frqa.gkfit9.win/A775-CFFE-6C1A-029E-DA83
http://cerberhhyed5frqa.305iot.win/A775-CFFE-6C1A-029E-DA83
http://cerberhhyed5frqa.dkrti5.win/A775-CFFE-6C1A-029E-DA83
http://cerberhhyed5frqa.onion/A775-CFFE-6C1A-029E-DA83
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" verclsid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation verclsid.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verclsid.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verclsid.lnk verclsid.exe -
Executes dropped EXE 3 IoCs
pid Process 2724 verclsid.exe 3004 verclsid.exe 2256 verclsid.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\verclsid = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\verclsid = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\verclsid = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" verclsid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\verclsid = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" verclsid.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp8AD6.bmp" verclsid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2192 taskkill.exe 3372 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop verclsid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" verclsid.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\verclsid.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings verclsid.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4608 PING.EXE 3556 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe 2724 verclsid.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 2724 verclsid.exe Token: SeDebugPrivilege 2192 taskkill.exe Token: SeDebugPrivilege 3004 verclsid.exe Token: 33 396 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 396 AUDIODG.EXE Token: SeDebugPrivilege 2256 verclsid.exe Token: SeDebugPrivilege 3372 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 2724 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 3564 wrote to memory of 2724 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 3564 wrote to memory of 2724 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 3564 wrote to memory of 4132 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 3564 wrote to memory of 4132 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 3564 wrote to memory of 4132 3564 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 4132 wrote to memory of 2192 4132 cmd.exe 87 PID 4132 wrote to memory of 2192 4132 cmd.exe 87 PID 4132 wrote to memory of 2192 4132 cmd.exe 87 PID 4132 wrote to memory of 3556 4132 cmd.exe 89 PID 4132 wrote to memory of 3556 4132 cmd.exe 89 PID 4132 wrote to memory of 3556 4132 cmd.exe 89 PID 2724 wrote to memory of 1544 2724 verclsid.exe 98 PID 2724 wrote to memory of 1544 2724 verclsid.exe 98 PID 1544 wrote to memory of 3212 1544 msedge.exe 99 PID 1544 wrote to memory of 3212 1544 msedge.exe 99 PID 2724 wrote to memory of 3460 2724 verclsid.exe 100 PID 2724 wrote to memory of 3460 2724 verclsid.exe 100 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 492 1544 msedge.exe 101 PID 1544 wrote to memory of 2224 1544 msedge.exe 102 PID 1544 wrote to memory of 2224 1544 msedge.exe 102 PID 1544 wrote to memory of 3636 1544 msedge.exe 103 PID 1544 wrote to memory of 3636 1544 msedge.exe 103 PID 1544 wrote to memory of 3636 1544 msedge.exe 103 PID 1544 wrote to memory of 3636 1544 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exe"C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ea7546f8,0x7ff8ea754708,0x7ff8ea7547184⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:24⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:34⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:84⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:14⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:14⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:14⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:14⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:84⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:84⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:14⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:14⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:14⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:14⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,78675026070972439,9109373108709922830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1384 /prefetch:14⤵PID:1376
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/A775-CFFE-6C1A-029E-DA833⤵PID:632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ea7546f8,0x7ff8ea754708,0x7ff8ea7547184⤵PID:2172
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4536
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "verclsid.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exe" > NUL3⤵PID:5060
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "verclsid.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4608
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:3556
-
-
-
C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exeC:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:396
-
C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exeC:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\verclsid.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5e72f02e06be25e9213c6b4eae5640952
SHA1ff1208e471001f691f1e7d2036d52e7b58d6cb94
SHA2561ef687b275d9f6b83d1b5752b40249f0b7d9403c88a0dba58ac62f6f04db66a3
SHA512b8204bd3e1f3b8234d2d26af1de9271fd2503f7c87474aded1d18f95961635a2138ff48cdd704a7bd108bf3256fcc40c099c974f5d11de2a4e9c0ca53e435ba5
-
Filesize
10KB
MD5cd4cc09b330693fb8598ad0e6fb0443a
SHA1b767e70c36a69e99750272170958128e8c101ff1
SHA256242a183732cf69041dfac284053184587af3968f4b628941cae86407c81da823
SHA512a11d0e190e3e3e5346ee830cbd6cd8fe747fe22deff41d69b83e379bb099e95b7f71f25abb615c66894cafddef123b0d0b7591d2c1937f6431a3daabe79786f8
-
Filesize
85B
MD50e5b306ba4d73fc876faa562aa3ccd82
SHA131271c8487bcd6ea75c85ee10bd844b07b21c4b5
SHA2569f2f38cbe9b47379d68fe65f725dc17b02103ef2f5d636e14c0ac1d509adae10
SHA512458c7eef8bece6f200605df0029d51dd080ec70279e6209b891e8a907f80d9e1444d0f5f87a2f25da337298041fe8c9cca95c0102958d1d2b14aaeade70e4983
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
5KB
MD500b152bd44648a3c24468b04ffac90d7
SHA13a51455c903d60a9c25492b416107adbde591c69
SHA256070cbc07c87bbf1bbf2da697a138b569d8c0855a40bb8af0c446d86eb4f7c70f
SHA51224fcadb8fa325a9beb9ee4da67a7eb06ed62c4181f24ebd1a9ba4bd552b191fd74dc957e918e51b949744e0cc0d45c5f975d5d91c8d99f5762158aeb0e26fc3c
-
Filesize
6KB
MD562cc69d57f2d158ae5fe5f202397750e
SHA13c48037c3f74a8d26914fa651ccd5896ed6cff9d
SHA256e52572b8ed176dec8648fd557ca502f1949f1f2c5599cc82b79ceafebbb670c2
SHA512aa8aa61d6e63514656adea9de4eb11dbbe4961d560d7d052b33310df8b389681e932168acc87075c956331ea4eca57126ce372d9e7341497f4b06aca60480328
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b28fad460ddc53cc949419aeec406ea5
SHA120ab1afed9509af1347f6401fe6de74ac945b0cc
SHA256813db55d074825cb29e835bc3e1d42532b6e69a0e831d246fc58c21e09f278a5
SHA51236f16855bbe317a8ca89f430a3f30316b126d519828bb70cb19bc935339401c270923504145e0d052105ca9f69bf6f2436c324c4ff1bade6268568d01dbb00af
-
Filesize
1KB
MD515f7b525f167c7a976004ed1ad4525dc
SHA13f9f72a77f4a98e6174dd81b0e964552fc7789d0
SHA25650cdae652169a340f98bb966536abdc0b0a3f11208fa2baaf16dfbf7cca9e7a3
SHA51206fa88939dfd3eeb38b178394f07a7496101593c2fc613774bd8c98450909388b934708b6f4f5ff353fddfae30fd270c5a356bf30f4a6065c70480e71e36ef2d
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684