Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_270b70bad151a515136f553e5bc880ac.exe
-
Size
344KB
-
MD5
270b70bad151a515136f553e5bc880ac
-
SHA1
77b7def336c7647c6faadaf7136d70ff1e9ba7fc
-
SHA256
db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
-
SHA512
c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f
-
SSDEEP
3072:v5sAzvcjE+lcO3zXgKRcP66BpwwB9RStc3Yfqr:v5jvc4+lcO3zQKSPfBJXv3YM
Malware Config
Extracted
C:\Users\Admin\Downloads\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/1068-DD1D-8BFB-0073-1733
http://cerberhhyed5frqa.45tori.win/1068-DD1D-8BFB-0073-1733
http://cerberhhyed5frqa.fkr84i.win/1068-DD1D-8BFB-0073-1733
http://cerberhhyed5frqa.fkri48.win/1068-DD1D-8BFB-0073-1733
http://cerberhhyed5frqa.djre89.win/1068-DD1D-8BFB-0073-1733
http://cerberhhyed5frqa.onion/1068-DD1D-8BFB-0073-1733
Extracted
C:\Users\Admin\Downloads\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16400) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" w32tm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\w32tm.lnk VirusShare_270b70bad151a515136f553e5bc880ac.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\w32tm.lnk w32tm.exe -
Executes dropped EXE 1 IoCs
pid Process 836 w32tm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\w32tm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\w32tm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\w32tm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" w32tm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\w32tm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" w32tm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA0FE.bmp" w32tm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3828 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 548 taskkill.exe 2116 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\Desktop VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\Desktop w32tm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B57C951B-33C8-2D1D-8AA8-20866904D814}\\w32tm.exe\"" w32tm.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings w32tm.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5008 PING.EXE 4548 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 836 w32tm.exe 672 msedge.exe 672 msedge.exe 3012 msedge.exe 3012 msedge.exe 4168 identity_helper.exe 4168 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe Token: SeDebugPrivilege 836 w32tm.exe Token: SeDebugPrivilege 548 taskkill.exe Token: SeBackupPrivilege 3680 vssvc.exe Token: SeRestorePrivilege 3680 vssvc.exe Token: SeAuditPrivilege 3680 vssvc.exe Token: SeIncreaseQuotaPrivilege 2116 wmic.exe Token: SeSecurityPrivilege 2116 wmic.exe Token: SeTakeOwnershipPrivilege 2116 wmic.exe Token: SeLoadDriverPrivilege 2116 wmic.exe Token: SeSystemProfilePrivilege 2116 wmic.exe Token: SeSystemtimePrivilege 2116 wmic.exe Token: SeProfSingleProcessPrivilege 2116 wmic.exe Token: SeIncBasePriorityPrivilege 2116 wmic.exe Token: SeCreatePagefilePrivilege 2116 wmic.exe Token: SeBackupPrivilege 2116 wmic.exe Token: SeRestorePrivilege 2116 wmic.exe Token: SeShutdownPrivilege 2116 wmic.exe Token: SeDebugPrivilege 2116 wmic.exe Token: SeSystemEnvironmentPrivilege 2116 wmic.exe Token: SeRemoteShutdownPrivilege 2116 wmic.exe Token: SeUndockPrivilege 2116 wmic.exe Token: SeManageVolumePrivilege 2116 wmic.exe Token: 33 2116 wmic.exe Token: 34 2116 wmic.exe Token: 35 2116 wmic.exe Token: 36 2116 wmic.exe Token: SeIncreaseQuotaPrivilege 2116 wmic.exe Token: SeSecurityPrivilege 2116 wmic.exe Token: SeTakeOwnershipPrivilege 2116 wmic.exe Token: SeLoadDriverPrivilege 2116 wmic.exe Token: SeSystemProfilePrivilege 2116 wmic.exe Token: SeSystemtimePrivilege 2116 wmic.exe Token: SeProfSingleProcessPrivilege 2116 wmic.exe Token: SeIncBasePriorityPrivilege 2116 wmic.exe Token: SeCreatePagefilePrivilege 2116 wmic.exe Token: SeBackupPrivilege 2116 wmic.exe Token: SeRestorePrivilege 2116 wmic.exe Token: SeShutdownPrivilege 2116 wmic.exe Token: SeDebugPrivilege 2116 wmic.exe Token: SeSystemEnvironmentPrivilege 2116 wmic.exe Token: SeRemoteShutdownPrivilege 2116 wmic.exe Token: SeUndockPrivilege 2116 wmic.exe Token: SeManageVolumePrivilege 2116 wmic.exe Token: 33 2116 wmic.exe Token: 34 2116 wmic.exe Token: 35 2116 wmic.exe Token: 36 2116 wmic.exe Token: 33 2372 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2372 AUDIODG.EXE Token: SeDebugPrivilege 2116 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 836 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe 82 PID 3544 wrote to memory of 836 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe 82 PID 3544 wrote to memory of 836 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe 82 PID 3544 wrote to memory of 2728 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe 83 PID 3544 wrote to memory of 2728 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe 83 PID 3544 wrote to memory of 2728 3544 VirusShare_270b70bad151a515136f553e5bc880ac.exe 83 PID 2728 wrote to memory of 548 2728 cmd.exe 85 PID 2728 wrote to memory of 548 2728 cmd.exe 85 PID 2728 wrote to memory of 548 2728 cmd.exe 85 PID 836 wrote to memory of 3828 836 w32tm.exe 86 PID 836 wrote to memory of 3828 836 w32tm.exe 86 PID 2728 wrote to memory of 5008 2728 cmd.exe 92 PID 2728 wrote to memory of 5008 2728 cmd.exe 92 PID 2728 wrote to memory of 5008 2728 cmd.exe 92 PID 836 wrote to memory of 2116 836 w32tm.exe 93 PID 836 wrote to memory of 2116 836 w32tm.exe 93 PID 836 wrote to memory of 3012 836 w32tm.exe 103 PID 836 wrote to memory of 3012 836 w32tm.exe 103 PID 3012 wrote to memory of 516 3012 msedge.exe 105 PID 3012 wrote to memory of 516 3012 msedge.exe 105 PID 836 wrote to memory of 4328 836 w32tm.exe 104 PID 836 wrote to memory of 4328 836 w32tm.exe 104 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 3044 3012 msedge.exe 106 PID 3012 wrote to memory of 672 3012 msedge.exe 107 PID 3012 wrote to memory of 672 3012 msedge.exe 107 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Roaming\{B57C951B-33C8-2D1D-8AA8-20866904D814}\w32tm.exe"C:\Users\Admin\AppData\Roaming\{B57C951B-33C8-2D1D-8AA8-20866904D814}\w32tm.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3828
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde08f46f8,0x7ffde08f4708,0x7ffde08f47184⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:84⤵PID:300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:14⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:14⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 /prefetch:84⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:14⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:14⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:14⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:14⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8427720844928660660,18425785177533214303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:14⤵PID:2588
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.vmfu48.win/1068-DD1D-8BFB-0073-17333⤵PID:1212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0x100,0x104,0xb4,0x108,0x7ffde08f46f8,0x7ffde08f4708,0x7ffde08f47184⤵PID:860
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:512
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "w32tm.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B57C951B-33C8-2D1D-8AA8-20866904D814}\w32tm.exe" > NUL3⤵PID:212
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "w32tm.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_270b70bad151a515136f553e5bc880ac.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_270b70bad151a515136f553e5bc880ac.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:5008
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3b4 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
5KB
MD59cd0793bc8db81f425f12e8f16a23bcc
SHA1f57e99a4c176771a73e11d0483e37c63be294e3a
SHA25644bf1a495b770052fa17355459a63fb9137496ab3805088bc5da13a59993b08b
SHA51201ed466a25b8db382227465a126d5afd7b12ed57a45755a2230a0956840a67966ce2cbd0cb10e38e493a5f9ab5f871cdd1cfbabbfed8c156503efebb22e831a5
-
Filesize
6KB
MD51ce0bbd175cac3abd9b14708e954a9fd
SHA1049603370a91e964197d041c070b96ece6da950d
SHA2566f4f82d317803cb1711badf755b970aee6272bbd6a4e8a57bb55df6177e1b12d
SHA512a7ebcb9e9d8e777b3d3e1257d5288e5c73974f93968cb9e9b5b3fd7b4affdcdcc5eb520d8a67c99e5c57394169c1db36b9cacf929992ad5cd28506434739cfb4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c39332e4ff839f682990f2d1888c15c8
SHA1cde4d53d6a66aafa8b1ebe75762b06d39802e182
SHA25618e3c16541ac44fe3203921e50acc7b16db9829a368c4084c946c1487499ab97
SHA51262168e4433da41c518558e6c15a42f195f92972bc660ef1ba475efdf299f10ffd921b93efcd1d872614670e0e08cd2b62baadea746e76fbd32a545902fe8ac5d
-
Filesize
1KB
MD5d5c77bd0b54f5d26ea7c0576977fef00
SHA1995f8032f04b86aff44435d42297a306beb80400
SHA25633b1db82d66b38e1f1b07ea3b59e3f7ad41bb979bd8d66da2e529e4f4d4079d9
SHA512bbe75a419b8eaaf43a3584ab9732501d984bb941b365a76a1975c3eeb5ae27143eb9fdd410329c0e47bed87cfa890f2ed073e547755ce8b116e3fd9e90a8eafe
-
Filesize
344KB
MD5270b70bad151a515136f553e5bc880ac
SHA177b7def336c7647c6faadaf7136d70ff1e9ba7fc
SHA256db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
SHA512c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f
-
Filesize
12KB
MD59761eede3e4da6814013ead728c55fc0
SHA1c99f11f0490025c4a0d2ea4113fa5f6154f2d026
SHA256a468fa138d0e1faf52fcf96ab09cb6be31d23ea73a24ec3a395ca8f397232950
SHA51262921d979b19051ce527e85fca75224fd4183f4ec260edbac3d74a6ce4fba80c5af1d9d7aef65d1945f30b8b0f94d26b4615cd27784bc9b0555e7a4f9cc608cf
-
Filesize
10KB
MD528f3d1d88e573693f18ef97e1d730baa
SHA1c25e4d97d6e96d8497317fba04cb40dacb6372f7
SHA256e4f29963425dbac89fc06f2b2757c8b945ad8f954ca7da5e1661d779bf3df1d9
SHA51203e3f0cbf5ff0fddd82f264b5af882f86002df63c2fcdf999e87fe975b248488235e053148dd1459fc567471c4da1039e0c289ae87ab4c21779a031e1e8fc329
-
Filesize
85B
MD5e8a5c7f7b555fa69ec32d834c18886eb
SHA1b0d273a44dd023fa799813aa8de567059021237d
SHA2560ca439a7c29974b5cdfc70ca98641766a164ebaa3ef3599f94a5a45aaabc9ab8
SHA512ca5b0435497b6a4d0dac102f9a2a07cdb2472e279eb3cd5ae86df3e749a894175581875a25f52885a9b6d8a36f1efe566e76c751802ecf700198aead4e779001
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853