Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/5213-6A27-4237-029E-D493
http://cerberhhyed5frqa.qor499.top/5213-6A27-4237-029E-D493
http://cerberhhyed5frqa.gkfit9.win/5213-6A27-4237-029E-D493
http://cerberhhyed5frqa.305iot.win/5213-6A27-4237-029E-D493
http://cerberhhyed5frqa.dkrti5.win/5213-6A27-4237-029E-D493
http://cerberhhyed5frqa.onion/5213-6A27-4237-029E-D493
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16399) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" eudcedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation eudcedit.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\eudcedit.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\eudcedit.lnk eudcedit.exe -
Executes dropped EXE 3 IoCs
pid Process 3608 eudcedit.exe 1472 eudcedit.exe 4192 eudcedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eudcedit = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eudcedit = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eudcedit = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" eudcedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eudcedit = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" eudcedit.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA11D.bmp" eudcedit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4896 taskkill.exe 616 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop eudcedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\\eudcedit.exe\"" eudcedit.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings eudcedit.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2528 PING.EXE 2300 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe 3608 eudcedit.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 3608 eudcedit.exe Token: SeDebugPrivilege 4896 taskkill.exe Token: SeDebugPrivilege 1472 eudcedit.exe Token: 33 3152 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3152 AUDIODG.EXE Token: SeDebugPrivilege 4192 eudcedit.exe Token: SeDebugPrivilege 616 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3608 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 2712 wrote to memory of 3608 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 2712 wrote to memory of 3608 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 2712 wrote to memory of 1568 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 2712 wrote to memory of 1568 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 2712 wrote to memory of 1568 2712 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 1568 wrote to memory of 4896 1568 cmd.exe 87 PID 1568 wrote to memory of 4896 1568 cmd.exe 87 PID 1568 wrote to memory of 4896 1568 cmd.exe 87 PID 1568 wrote to memory of 2528 1568 cmd.exe 89 PID 1568 wrote to memory of 2528 1568 cmd.exe 89 PID 1568 wrote to memory of 2528 1568 cmd.exe 89 PID 3608 wrote to memory of 2160 3608 eudcedit.exe 98 PID 3608 wrote to memory of 2160 3608 eudcedit.exe 98 PID 2160 wrote to memory of 4084 2160 msedge.exe 99 PID 2160 wrote to memory of 4084 2160 msedge.exe 99 PID 3608 wrote to memory of 3872 3608 eudcedit.exe 100 PID 3608 wrote to memory of 3872 3608 eudcedit.exe 100 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 4948 2160 msedge.exe 101 PID 2160 wrote to memory of 2876 2160 msedge.exe 102 PID 2160 wrote to memory of 2876 2160 msedge.exe 102 PID 2160 wrote to memory of 4288 2160 msedge.exe 103 PID 2160 wrote to memory of 4288 2160 msedge.exe 103 PID 2160 wrote to memory of 4288 2160 msedge.exe 103 PID 2160 wrote to memory of 4288 2160 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exe"C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc02c146f8,0x7ffc02c14708,0x7ffc02c147184⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:34⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:14⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:14⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3376 /prefetch:84⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:14⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4420 /prefetch:14⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:14⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 /prefetch:84⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 /prefetch:84⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:14⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:14⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:14⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:14⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16167549540895907840,7269308485973655168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1988 /prefetch:14⤵PID:1540
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/5213-6A27-4237-029E-D4933⤵PID:2712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc02c146f8,0x7ffc02c14708,0x7ffc02c147184⤵PID:3460
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4692
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "eudcedit.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exe" > NUL3⤵PID:1520
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "eudcedit.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2300
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2528
-
-
-
C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exeC:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exeC:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\eudcedit.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x52c 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD54b753ec598b48f4eb53d5eb51d0acbe9
SHA157b09f97064c03a0ada5b9bbc1984f95290b4ea2
SHA25654512eeb113a5bb67cd5419d6b498f1cbb7b3e99a955a178d19cf0d2f9ec87ec
SHA51225e717f1891dfe4cc7d06aec5fbe33585faea65b88bc908651ed0a11b8c30ed38972d9f554233c9b84a7b1c04b086e7c8c70710b6fe0b84921416da86769e01c
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
5KB
MD584c7b61bee4663d1bedd783321d045f5
SHA18e1121ff98b41f6dc8facb5f3621877c3732b387
SHA25638bcc20b2eba0f43549b26573c530aeb324a784cc7fc2ab0381290827c27a31a
SHA51207e1a266192bdce10f872b5ffcdbd62363ad0a98ce0c96242d50a7f22e3adef023f2cbcead50562bf7945c04bf3f2d5008fd8e013726198b19906829f3027951
-
Filesize
6KB
MD5e7fd3d5dd5f9e5e91f5b4963eba58035
SHA111197569e5c4bd49209f9fb930ac7ac5c59e865a
SHA256868b1d17d17e76f188133a206f3f6cd69a0e2961fd3295bda9580a6a14fa36e0
SHA51218bf8e17ed5e012e4cf5f8eedd441c25f75f352a95d3af5daed1f343bf9f03f033cad26c7fb62288521d7bce14b22c541e133be26015444053bcf3c80554b859
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e9b3db11928285785fe73562409fc9fc
SHA11bd0f815ab6cb78267270ebb7821815f20ca9831
SHA25635e683e37eb07b9cd59c8094f56eb1425608ee5dc12e7d31fa920734c15e763a
SHA512194a033079415299c4597c9af36645ef2664d7825f2addd2dadef8f3ec698ae47f106c13652226cd23ebc84c8403f34fbb91b2ad2e8d99f687a5ebe365276ceb
-
Filesize
12KB
MD54854aecc95bbac4af795138517f4de64
SHA143a8cb0114a3c658ae77cc0c2eec07d07df421a6
SHA2562f36d67667dca1ace21d6e9ab856ea50b6c316bdfce21123eb3572dd8b7f9974
SHA512ab10d2647c2d1ef414287753d65607c6ccaacb1f0597f1a64f24d3ab05d76146796c518266139677efca461ec5e4015d1025aa213878e138970aebabc375bb23
-
Filesize
10KB
MD5fd3474e456107ee3dff22e353a2e09ca
SHA1ad76ceba703ec4f1a8589398ec4a094bfd3f649d
SHA2561f8061f9dafa733497557abb2f2530e713a40d865c3f38ca4717a11426a96aab
SHA512371d5614a369fb04cd7519545453e2de4a8e8428f2a27010be0adba9a21dc97ae0d1c14cd6e0444fb0f1abcf51d6af5af7ae458e7c1bb16609d08eb990fda9ab
-
Filesize
1KB
MD50d3630c4e14de6f6f07f2af0756e0d15
SHA15fe5fd68f61a3b4ce43f3f231983e8575075c418
SHA25677c0a28509e5d3ffd63bab14976c706b303c3ef5956703207cd2fdfad8007a2b
SHA5120b7896617a8c1baa082eaec1543c00d02f52cd4c3263013cf370825a06f8811b5a8ccdc02bc94d598044358f7bfc8342db4e90c119d849ae807a7343b967ab8f
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684