Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/286B-E140-CE03-029E-DE37
http://cerberhhyed5frqa.qor499.top/286B-E140-CE03-029E-DE37
http://cerberhhyed5frqa.gkfit9.win/286B-E140-CE03-029E-DE37
http://cerberhhyed5frqa.305iot.win/286B-E140-CE03-029E-DE37
http://cerberhhyed5frqa.dkrti5.win/286B-E140-CE03-029E-DE37
http://cerberhhyed5frqa.onion/286B-E140-CE03-029E-DE37
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16403) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" quickassist.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation quickassist.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\quickassist.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\quickassist.lnk quickassist.exe -
Executes dropped EXE 3 IoCs
pid Process 3784 quickassist.exe 2684 quickassist.exe 4336 quickassist.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quickassist = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\quickassist = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quickassist = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" quickassist.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\quickassist = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" quickassist.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC743.bmp" quickassist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2536 taskkill.exe 5856 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop quickassist.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" quickassist.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\quickassist.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings quickassist.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2424 PING.EXE 5908 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe 3784 quickassist.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 3784 quickassist.exe Token: SeDebugPrivilege 2536 taskkill.exe Token: SeDebugPrivilege 2684 quickassist.exe Token: SeDebugPrivilege 4336 quickassist.exe Token: 33 1628 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1628 AUDIODG.EXE Token: SeDebugPrivilege 5856 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3784 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 2616 wrote to memory of 3784 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 2616 wrote to memory of 3784 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 2616 wrote to memory of 1184 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 2616 wrote to memory of 1184 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 2616 wrote to memory of 1184 2616 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 1184 wrote to memory of 2536 1184 cmd.exe 86 PID 1184 wrote to memory of 2536 1184 cmd.exe 86 PID 1184 wrote to memory of 2536 1184 cmd.exe 86 PID 1184 wrote to memory of 2424 1184 cmd.exe 89 PID 1184 wrote to memory of 2424 1184 cmd.exe 89 PID 1184 wrote to memory of 2424 1184 cmd.exe 89 PID 3784 wrote to memory of 3672 3784 quickassist.exe 104 PID 3784 wrote to memory of 3672 3784 quickassist.exe 104 PID 3672 wrote to memory of 1852 3672 msedge.exe 105 PID 3672 wrote to memory of 1852 3672 msedge.exe 105 PID 3784 wrote to memory of 4808 3784 quickassist.exe 106 PID 3784 wrote to memory of 4808 3784 quickassist.exe 106 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 3268 3672 msedge.exe 107 PID 3672 wrote to memory of 4972 3672 msedge.exe 108 PID 3672 wrote to memory of 4972 3672 msedge.exe 108 PID 3672 wrote to memory of 5040 3672 msedge.exe 109 PID 3672 wrote to memory of 5040 3672 msedge.exe 109 PID 3672 wrote to memory of 5040 3672 msedge.exe 109 PID 3672 wrote to memory of 5040 3672 msedge.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exe"C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847184⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:24⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:34⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:84⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:14⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:14⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:14⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:14⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:14⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:84⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:84⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:14⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:14⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:14⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:14⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9386707204348589147,10371734025781857724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:14⤵PID:6120
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/286B-E140-CE03-029E-DE373⤵PID:4148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847184⤵PID:3660
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3116
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "quickassist.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exe" > NUL3⤵PID:5804
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "quickassist.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5856
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:5908
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2424
-
-
-
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exeC:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exeC:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\quickassist.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x3041⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52bdcc0792fb17f929ebc25285bd8aa2d
SHA10da6f9cedff47ddd14e6bd6a7f2d4174af0a29e4
SHA25607fe7efeef2c4239ef99a1ac663dac616f2a089d82c341e1eb7ad4a50bb1523c
SHA512ca2a1522a3c0482fbf097df1e217e85417db43aff3cffaceddd5386d750143fbcd063917cd76b3cc2574cd82bd3e08fd1de0596905599fb926f88b8350ae4f4a
-
Filesize
10KB
MD51d9e3f9314d51d7937d404121a23ccb0
SHA14de81e0093e61ff20be8d6640cc30bd6abcfa3e0
SHA25611ba80bae6b62b59dfd051ca10f2be3ef32fe786b1c32f2c7adb607ceaa64563
SHA512af1f826f4c23d88cb2d7d3193124b0e49a6b68a0074de5b3e8115c446230f2f44bd6d8b7b0649bf5e2c598188caa9f52d65a7c1a5b4ad2d13be43541d0cdbb52
-
Filesize
85B
MD585cb885ad7e1c695a5ec0e8e09d3b851
SHA1d0d05875c1a65a1c80ab50b44feaadb713d866af
SHA2568c9a19ba9e353e66692eb47d9542f76e3ef6767ee814806b9aaf9369a15cb36d
SHA512acdccc7253c64be528e65f0ab5b5cfd903d927b043a32f052692952709e2b3773908d04957681ba446e6d91f74f14eaf3a283fc07b026d29ab6ee21655c99bc3
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
6KB
MD54a7081feaca6aa9e7d1bc3591a60c2a7
SHA15053b504f50cd927e017750c5cae8c000caff0f3
SHA2566f09fd56c661b6afa320011501ad8854656f9197b0f767e7dc1c1cf23625877b
SHA512e9fc67be3b2f153b479e6a9a55174092f1d9893c4cd789a5dbc5190ef13ad192f9287c150f09297322d893cb265166a2a12e9c994cc0e5f67c1333772ebdd2bf
-
Filesize
5KB
MD51d585ea38ec8b30666abd25d0a337934
SHA1d297969a839e6a1b16635e976ff98bb4a70e4d5a
SHA256cc81b0d9e941b18ef0a2a899ab4ac7981cf5852559e8dfd523dfdc1b905ff64b
SHA5123253bfd8928ec810300f9b66fc06a3b1068c356c731906b05cd23409b56706a61120ed07ba84cf14286c5e0ae9b2d8ba9a029021aa6e779105e3b0e57b1a8c73
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5945986b5d073b6a293c6c1765d3a3be8
SHA17c9a96b2a47e874a64abb177dbf3239bf0fa7265
SHA256bcfaa779d0c80d9b1640dc5aa44923cb9a167e32b8264801767abf78bd73be60
SHA5123516be0d264b5147ea2333bae9512839e8e9ccf7e448bc251844ef54db6ab6b290392c97487d1d1911093d590241b096831442ce33fa9aa6b7d6a64a50ce0fe8
-
Filesize
1KB
MD556f2287ab045825de7bd8e2c2a3f8eb4
SHA1ae682a15004c062aa18bd9acdf2e4f205781df16
SHA256d29407265980433be68618f9ecbde7b9688b5df9f8b0550c905f59f29e344547
SHA5124deb6aa1240c33825d31dff0e59e74a2b99c1583021a32cd2952206a46c97e283a5c3b23bb2b0765497e9b8b64832611aa0346190b81c1ec1b8c42a0e9d319ed
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684