Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
-
Size
382KB
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
SSDEEP
6144:n0Ly6qr9+br6u1yvZgQHhEaBTuPwyQ9Hmdy1MsZ:nxF9FZhH+aBaPUGY1M+
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/5609-7AA5-EF4B-0078-1266
http://4kqd3hmqgptupi3p.we34re.top/5609-7AA5-EF4B-0078-1266
http://4kqd3hmqgptupi3p.5kti58.top/5609-7AA5-EF4B-0078-1266
http://4kqd3hmqgptupi3p.vmckfi.top/5609-7AA5-EF4B-0078-1266
http://4kqd3hmqgptupi3p.onion.to/5609-7AA5-EF4B-0078-1266
http://4kqd3hmqgptupi3p.onion/5609-7AA5-EF4B-0078-1266
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16397) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" typeperf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation typeperf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\typeperf.lnk VirusShare_41dd108ada487cb93a6e099e074f605b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\typeperf.lnk typeperf.exe -
Executes dropped EXE 3 IoCs
pid Process 432 typeperf.exe 952 typeperf.exe 4080 typeperf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" typeperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" typeperf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB9F4.bmp" typeperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3284 taskkill.exe 4908 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" typeperf.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{75F6D708-221F-6073-7B3A-46D783DB8929}\\typeperf.exe\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\Desktop typeperf.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings typeperf.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1080 PING.EXE 3648 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe 432 typeperf.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe Token: SeDebugPrivilege 432 typeperf.exe Token: SeDebugPrivilege 3284 taskkill.exe Token: SeDebugPrivilege 952 typeperf.exe Token: 33 4928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4928 AUDIODG.EXE Token: SeDebugPrivilege 4080 typeperf.exe Token: SeDebugPrivilege 4908 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 432 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 84 PID 4844 wrote to memory of 432 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 84 PID 4844 wrote to memory of 432 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 84 PID 4844 wrote to memory of 4140 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 85 PID 4844 wrote to memory of 4140 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 85 PID 4844 wrote to memory of 4140 4844 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 85 PID 4140 wrote to memory of 3284 4140 cmd.exe 87 PID 4140 wrote to memory of 3284 4140 cmd.exe 87 PID 4140 wrote to memory of 3284 4140 cmd.exe 87 PID 4140 wrote to memory of 1080 4140 cmd.exe 89 PID 4140 wrote to memory of 1080 4140 cmd.exe 89 PID 4140 wrote to memory of 1080 4140 cmd.exe 89 PID 432 wrote to memory of 3088 432 typeperf.exe 99 PID 432 wrote to memory of 3088 432 typeperf.exe 99 PID 3088 wrote to memory of 444 3088 msedge.exe 100 PID 3088 wrote to memory of 444 3088 msedge.exe 100 PID 432 wrote to memory of 2168 432 typeperf.exe 101 PID 432 wrote to memory of 2168 432 typeperf.exe 101 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 860 3088 msedge.exe 102 PID 3088 wrote to memory of 636 3088 msedge.exe 103 PID 3088 wrote to memory of 636 3088 msedge.exe 103 PID 3088 wrote to memory of 1752 3088 msedge.exe 104 PID 3088 wrote to memory of 1752 3088 msedge.exe 104 PID 3088 wrote to memory of 1752 3088 msedge.exe 104 PID 3088 wrote to memory of 1752 3088 msedge.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exe"C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb1d46f8,0x7ffcdb1d4708,0x7ffcdb1d47184⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:24⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:34⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:84⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:14⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:14⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:14⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:14⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:14⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:84⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:84⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:14⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:14⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:14⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:14⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4858538535956718450,15092781519054779552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:14⤵PID:3716
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4kqd3hmqgptupi3p.wins4n.win/5609-7AA5-EF4B-0078-12663⤵PID:2560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb1d46f8,0x7ffcdb1d4708,0x7ffcdb1d47184⤵PID:1312
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3800
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "typeperf.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exe" > NUL3⤵PID:4056
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "typeperf.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:3648
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_41dd108ada487cb93a6e099e074f605b.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_41dd108ada487cb93a6e099e074f605b.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1080
-
-
-
C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exeC:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x390 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
C:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exeC:\Users\Admin\AppData\Roaming\{75F6D708-221F-6073-7B3A-46D783DB8929}\typeperf.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
5KB
MD5fca943001bec0a72543d27c7760543ec
SHA1c8ce7db5afa331017e3e05a69dc3ba1f2938ab1d
SHA256f37842780b4ab4bef4071a9a665be8eef139834ef49229680c68ab81f1040376
SHA512d0df959ce4996daebd3761db1a1fc353b73f9ef3f63eddc96fddc40d359062f9596598d0141aab8ef133e989c6cbf11a77793e02999c4b1fe12577444e42d032
-
Filesize
6KB
MD51dd62854979a49b6ece88465c8f46761
SHA12f870520731e7c265f62e601e3f17597a3e3a2a9
SHA2564483b6a5ef6d8502f53810e7aacfee7b4c382be59a3c2df37f30b2230f6b4080
SHA512d5c0d6d911d7518cc02ed6a06e33a5cef6f4c0428ff8dac3a89569394175e4116aae175477de511cb3bab94d62fb33a9e8c97a16a4cc8d14ff654a5a631475ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57269f9a160111f46aebe4c30515f35a5
SHA1f2bc9e6ba2112b5f18f24a68e86ad6eb467bfceb
SHA256d5210ad7759709201f0995225786cd906418cf8cf0c502b9857a8dc60cd71fe8
SHA512e3054eab747d856628cef62e26e84a37bcf29a256790d6e8b5aa3ffc0c0362cea392e14de7789a4bb9cd1350f918e8c07dc716f66e7a4e6083d01591136bcbf5
-
Filesize
12KB
MD5d2228168d18d4722a7b1665c82f785ca
SHA1ebba1ad417e84b29d5be4beec46a1f46e231edab
SHA2565c73982913d7e8bc785b38a8ab133e353c49a2e950589d7afd2a6ccd63e79c17
SHA5120fbe98590d96f664190a3fb92a21c65d31cde7fe4646b0563f31b36db53b2afc6052d70580166b815a37ef820bab0a5f7c9bee35c5c5dbb822ab348081a9c480
-
Filesize
10KB
MD5584cf8042f750d04a92860a65fc17e53
SHA144949b9f41e6dd8134b8b59c1eabcfc7b817b5f7
SHA2569dc5836eebcfba44585a8165ff13bda324ef137cb4c532e89f9b95aeea16e29c
SHA5122e2eef5cfb1b441b5d176da13e3f449ab9c3cb9b7c26f2a0372d162c073ddc7f00e0c0910b23a3be21b8a9a9a87d5f743ffcc1154f8f0691b92c2c1b4a3a42d2
-
Filesize
85B
MD5aabebc7fdeeeeae8f6f31c450bbcf89f
SHA143d105f3d7890fcd488b16b0635dd36813fda562
SHA2565f10922b17e7508a0e9dc6bbbb60d078e822184d5b09ab7162bce700fc6fef28
SHA5128e167c1ab2f18ae2b6ed77b4123646de18c652d21673cdc307892c862eda0d7d058b81e968220c93c222ee48d4c33d49e39d0323f00899487bc0acdeb604bc9e
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
Filesize
1KB
MD5f35cc45c34203484c2ff4cb2ea88c913
SHA1a08b09f4f52d0d4036445cacfa96af7251d89154
SHA25685cb9fd79ed1297bd20c9770fdd63221aed71c33b735280c209d16250fe9aca1
SHA5126187189744078b9fc4d3a09ca378c69e4e668e8a2c48624204f0f8b47b943875a67d17b9ae808f493ad03a2669fef58d5ec28e11a457996ecafa90f5a35f3262
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b