Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/FF79-1A3C-7BD0-029E-D1F6
http://cerberhhyed5frqa.qor499.top/FF79-1A3C-7BD0-029E-D1F6
http://cerberhhyed5frqa.gkfit9.win/FF79-1A3C-7BD0-029E-D1F6
http://cerberhhyed5frqa.305iot.win/FF79-1A3C-7BD0-029E-D1F6
http://cerberhhyed5frqa.dkrti5.win/FF79-1A3C-7BD0-029E-D1F6
http://cerberhhyed5frqa.onion/FF79-1A3C-7BD0-029E-D1F6
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16396) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" upnpcont.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation upnpcont.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\upnpcont.lnk 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\upnpcont.lnk upnpcont.exe -
Executes dropped EXE 3 IoCs
pid Process 1124 upnpcont.exe 3928 upnpcont.exe 3492 upnpcont.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upnpcont = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\upnpcont = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upnpcont = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" upnpcont.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\upnpcont = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" upnpcont.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC908.bmp" upnpcont.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3660 taskkill.exe 1972 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop upnpcont.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\upnpcont.exe\"" upnpcont.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings upnpcont.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2912 PING.EXE 5112 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe 1124 upnpcont.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Token: SeDebugPrivilege 1124 upnpcont.exe Token: SeDebugPrivilege 3660 taskkill.exe Token: SeDebugPrivilege 3928 upnpcont.exe Token: SeDebugPrivilege 3492 upnpcont.exe Token: 33 984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 984 AUDIODG.EXE Token: SeDebugPrivilege 1972 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3760 wrote to memory of 1124 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 83 PID 3760 wrote to memory of 1124 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 83 PID 3760 wrote to memory of 1124 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 83 PID 3760 wrote to memory of 2156 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 85 PID 3760 wrote to memory of 2156 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 85 PID 3760 wrote to memory of 2156 3760 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 85 PID 2156 wrote to memory of 3660 2156 cmd.exe 87 PID 2156 wrote to memory of 3660 2156 cmd.exe 87 PID 2156 wrote to memory of 3660 2156 cmd.exe 87 PID 2156 wrote to memory of 2912 2156 cmd.exe 90 PID 2156 wrote to memory of 2912 2156 cmd.exe 90 PID 2156 wrote to memory of 2912 2156 cmd.exe 90 PID 1124 wrote to memory of 1404 1124 upnpcont.exe 100 PID 1124 wrote to memory of 1404 1124 upnpcont.exe 100 PID 1404 wrote to memory of 880 1404 msedge.exe 101 PID 1404 wrote to memory of 880 1404 msedge.exe 101 PID 1124 wrote to memory of 2956 1124 upnpcont.exe 102 PID 1124 wrote to memory of 2956 1124 upnpcont.exe 102 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 4440 1404 msedge.exe 103 PID 1404 wrote to memory of 1540 1404 msedge.exe 104 PID 1404 wrote to memory of 1540 1404 msedge.exe 104 PID 1404 wrote to memory of 4252 1404 msedge.exe 105 PID 1404 wrote to memory of 4252 1404 msedge.exe 105 PID 1404 wrote to memory of 4252 1404 msedge.exe 105 PID 1404 wrote to memory of 4252 1404 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exe"C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf4b446f8,0x7ffbf4b44708,0x7ffbf4b447184⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:34⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:84⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:14⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:14⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:14⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:14⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:14⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:84⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:84⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:14⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:14⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:14⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:14⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10150066922144240284,7252743445821083856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1296 /prefetch:14⤵PID:2740
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/FF79-1A3C-7BD0-029E-D1F63⤵PID:3632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf4b446f8,0x7ffbf4b44708,0x7ffbf4b447184⤵PID:3724
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1952
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "upnpcont.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exe" > NUL3⤵PID:2620
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "upnpcont.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:5112
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2912
-
-
-
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exeC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exeC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\upnpcont.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:888
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x408 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD542db40f7e313939515b8d2fba048f2d6
SHA1e5e173804b682cfe2e461d6c0dc801e48738c568
SHA2565a35a47f15225ca053942d393a0025382796fec3ac4f761aef5fd34ea42b1119
SHA512d56424abf43bf683da76a1897331852e1376a7afd307baa621bf0cdc50f32b939f4e6509defd7a7789a978e806c97d4d01045d75ebc417850a4f08bcbbf2ee09
-
Filesize
10KB
MD58813412ea136f3497241a74fba6eb90a
SHA13e6afbc1c6ee97e1c6bc4d3d172db5d9c08dae4e
SHA25699902392fb61a0a31413a9b74415ddf5a791a6bdc0d6f8b5b47f637501e96bf7
SHA512dab6715c17971608f37ed25383d247f29b71639d73bf23f6e1bd8c4dc2cc21be8ae97e5568edabbc6e387e8dcb4a47a0e94ec3f20f40fa652076bd82a872b1b7
-
Filesize
85B
MD5d7e3aa26da002292c72b254709a6d401
SHA1806da9ab70db4ea38153090441c090a69175c89c
SHA25644098316ff53e8154ab9031255f1e6fd7d25083040b4a47b6e9974545a87ccfb
SHA51272369d4c9bc04a4eb10a4d62a50612606b12e2faf59a1a13f12ab9809a898fa5d7a05f221a3f07cd3acef056364ad6bb066d06ec61b7a7ae8b669250d3409e3b
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
5KB
MD57a9c4d5f90a46ba1a50fd548039e85df
SHA1db28df928480f5e980ede0937fa40f487a5aba1d
SHA256893dcd1adff6c6fae7f54e6110bdb2fba25a5c5207e897fbe7dc6f933ec50f53
SHA512d5cf877a4695d3f3e97754e9ef66b71a714da814616b4eadb9610db50ce52fa6d83decd699ef707ae37e6f7a581426cb0cf0f55230cc0a53462341f79acd567a
-
Filesize
6KB
MD5fe17912aa41b89787ae0c02140506532
SHA198562ce07583bdae26afc7c294fe0d64daa9cb85
SHA25603e7da355eb65409984dd255871d90e0ba14ce1a7d581a7cdfac16e81490624a
SHA512f83a6b892fec1f6acd6578cd2fdd569d0e35a074efc005d135745ccc952d8c4c60c4aa001d7be915782828fdcbd24d7f190e0020a10d767dfe5ca12b480acfd5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56d1adecf5a505ae85a9d6aa7c5364c6e
SHA1ca852ef13c87b55a6a2fbd66effb93ec77610998
SHA25693f2cb2fa94060fcc749f93f404d8bc43caf410649e1724a0028723b0d935af9
SHA512e20497e54a4a9aeae501a8af831e40765d53871fadaaea278b53a9c83ff5446b4e690b7f6d7c15727a58c16196ac730d8c35ae78fc16a2cd79d0efbfa5715df0
-
Filesize
1KB
MD5efa8bd24833daf19850980ee5cc1672b
SHA1ea069e68f10fcaf4d303502fd15a274c764c9b15
SHA25642b75f6c947c8be259f47d7295474ab04e17bf8373ad6fd653cd166f6422d778
SHA51231410356116d4c40041c11eaccfba363e663b1402b397b442221b0ae1a7bbbd54ade8ae11baa31151cefa5c906978aa305a01ab0f9cb612796d2badd0dc7f7ca
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684