Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/7549-493E-CBB9-029E-DBFE
http://cerberhhyed5frqa.qor499.top/7549-493E-CBB9-029E-DBFE
http://cerberhhyed5frqa.gkfit9.win/7549-493E-CBB9-029E-DBFE
http://cerberhhyed5frqa.305iot.win/7549-493E-CBB9-029E-DBFE
http://cerberhhyed5frqa.dkrti5.win/7549-493E-CBB9-029E-DBFE
http://cerberhhyed5frqa.onion/7549-493E-CBB9-029E-DBFE
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16397) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" TapiUnattend.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TapiUnattend.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\TapiUnattend.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\TapiUnattend.lnk TapiUnattend.exe -
Executes dropped EXE 3 IoCs
pid Process 3524 TapiUnattend.exe 1628 TapiUnattend.exe 2228 TapiUnattend.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" TapiUnattend.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" TapiUnattend.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpCBE6.bmp" TapiUnattend.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2416 taskkill.exe 672 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" TapiUnattend.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{37345610-6239-7F1B-59F5-99D852E1D980}\\TapiUnattend.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\Desktop TapiUnattend.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings TapiUnattend.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1036 PING.EXE 432 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe 3524 TapiUnattend.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 3524 TapiUnattend.exe Token: SeDebugPrivilege 2416 taskkill.exe Token: SeDebugPrivilege 1628 TapiUnattend.exe Token: SeDebugPrivilege 2228 TapiUnattend.exe Token: 33 4824 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4824 AUDIODG.EXE Token: SeDebugPrivilege 672 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 424 wrote to memory of 3524 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 424 wrote to memory of 3524 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 424 wrote to memory of 3524 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 424 wrote to memory of 1752 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 424 wrote to memory of 1752 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 424 wrote to memory of 1752 424 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 1752 wrote to memory of 2416 1752 cmd.exe 86 PID 1752 wrote to memory of 2416 1752 cmd.exe 86 PID 1752 wrote to memory of 2416 1752 cmd.exe 86 PID 1752 wrote to memory of 1036 1752 cmd.exe 89 PID 1752 wrote to memory of 1036 1752 cmd.exe 89 PID 1752 wrote to memory of 1036 1752 cmd.exe 89 PID 3524 wrote to memory of 3800 3524 TapiUnattend.exe 99 PID 3524 wrote to memory of 3800 3524 TapiUnattend.exe 99 PID 3800 wrote to memory of 5092 3800 msedge.exe 100 PID 3800 wrote to memory of 5092 3800 msedge.exe 100 PID 3524 wrote to memory of 2004 3524 TapiUnattend.exe 101 PID 3524 wrote to memory of 2004 3524 TapiUnattend.exe 101 PID 3524 wrote to memory of 1668 3524 TapiUnattend.exe 103 PID 3524 wrote to memory of 1668 3524 TapiUnattend.exe 103 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 2028 3800 msedge.exe 102 PID 3800 wrote to memory of 4832 3800 msedge.exe 105 PID 3800 wrote to memory of 4832 3800 msedge.exe 105 PID 3800 wrote to memory of 2460 3800 msedge.exe 106 PID 3800 wrote to memory of 2460 3800 msedge.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exe"C:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa26cb46f8,0x7ffa26cb4708,0x7ffa26cb47184⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:24⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:34⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:84⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:14⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:14⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:14⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:14⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:14⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:14⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:14⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:84⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:84⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:14⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:14⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10047261684833551618,9452555070823813938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:14⤵PID:672
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/7549-493E-CBB9-029E-DBFE3⤵PID:1668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa26cb46f8,0x7ffa26cb4708,0x7ffa26cb47184⤵PID:4768
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2272
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "TapiUnattend.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exe" > NUL3⤵PID:3488
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "TapiUnattend.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:432
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1036
-
-
-
C:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exeC:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
C:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exeC:\Users\Admin\AppData\Roaming\{37345610-6239-7F1B-59F5-99D852E1D980}\TapiUnattend.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x520 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
5KB
MD58b5b0529f454dff24fb635a1934ebc9d
SHA1380eec7516b4799bf1a3c79e5b7dd6b29ec55b20
SHA25601dc18fc5ce5b301978497427b5e375fa1d9b641248d3cac8708cc79678a8b9d
SHA5121be4598e0757467c2002876267c549bfc5c8b89ebdb90840147f2c2b675aa3aaa3f380e35cff9045b2f68f0f71e744ca1a33f4bd74c75f7a08df02c24ec9ceed
-
Filesize
6KB
MD5ed7be7f9c12beec36b546e7627f17b3c
SHA10c18ca0ab97f91ad5ade859bed777a327199e331
SHA256d956dedab38b023939c2e14185dfc1b45033b4c9d703779ffec3123dae537751
SHA512d56d6d212f40e5761258b1c15282f33e2c775ec1ac3fc53780ce026b5d6412e6fdd265cd305a39ffa4ce34cd83cb66b5456c5b182d9eb5b67fd50e398f58fc0c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57673b24c2aa52992d18b1157c0c0591d
SHA1e12111b97a92cc10eb2839e6dead80e9ceb26b04
SHA25642047f49b4dc291a23a0f7960292e0c7e1936d2606437f4371e9a5e44585ecdd
SHA512e3f0f234301538ce09d2b0c0f44846069f8b55dc05c6e6ea119e30b00b60c07b88ec2ac54dec480bcbd20ffa6201cd5cd8f906ecc4db6dc3e3b101d89fba2278
-
Filesize
12KB
MD55046a119dfdccaafebb5cb26169d2bf5
SHA128498a565e1d542c6c9c15208a6afd3aea6a25bd
SHA25608e8ad24a6b7fa190f553e62d95f4a686982d1c7a8d84620692ba901d319608f
SHA512961f6b380d64baee4d3f9f70043c7a28f6e60656308374e3f5da821c7da061fd0cf5bd7a64480cab84cb9b4125ab8e904ad86fe6c6e79531c30d42a7d7c16557
-
Filesize
10KB
MD5f16d5ceb8545344cc5c74a298a33294e
SHA100e9150993bc0a91315f42d751fb6e5874d247b7
SHA2566cd4a8e5ecde653cdb76ba1a89924d926f070b4cc2007b1d96bc8c5ad0ffb6d0
SHA512c49494cd722cfaca971a016516de484678ea1f61b12dd61e58bdb6d2eda98ed6839ea974dd3936bfa8ba70f869d9204e8952211448fc8dee4bce5f4e31c70c6f
-
Filesize
85B
MD58f41325af93f5b2fc83561168b1c9dee
SHA13e65455317ea2a6041fba770ecd14c2e267425af
SHA25667223ecfcf9bbdd09da02d8fb454912dae66853d469fc0b06faecefdaac4c7f5
SHA512c9e1c61652cf542a81338556d797b299faaa44e858ba2746cb102758ac4947a900632f03c3b2a3da7d18ba9909c1baf850d9fd10417d12614a4a32dcd300decd
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
1KB
MD5af8edf98e568fa55732e41ebcfb5e7c5
SHA1c7864668444fabb946cc75f0fc1b0c6dc29deb6a
SHA2567beae82a3073471596d45f722f4f2a67f9cd657da7a6569ac8600050e8b84514
SHA5121ea04e0ee0cc156ada717519a4e829fe8f1deb6d684238f1dd0518f4c4fbe9d79453dcb44cc079d192e9bb90bebf33f9259533128373c09e348e626dc6e2abdb
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684