Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/D84A-78CF-028E-029E-D95D
http://cerberhhyed5frqa.qor499.top/D84A-78CF-028E-029E-D95D
http://cerberhhyed5frqa.gkfit9.win/D84A-78CF-028E-029E-D95D
http://cerberhhyed5frqa.305iot.win/D84A-78CF-028E-029E-D95D
http://cerberhhyed5frqa.dkrti5.win/D84A-78CF-028E-029E-D95D
http://cerberhhyed5frqa.onion/D84A-78CF-028E-029E-D95D
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16399) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" CertEnrollCtrl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CertEnrollCtrl.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\CertEnrollCtrl.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\CertEnrollCtrl.lnk CertEnrollCtrl.exe -
Executes dropped EXE 3 IoCs
pid Process 1780 CertEnrollCtrl.exe 3772 CertEnrollCtrl.exe 2868 CertEnrollCtrl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CertEnrollCtrl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\CertEnrollCtrl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CertEnrollCtrl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" CertEnrollCtrl.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\CertEnrollCtrl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" CertEnrollCtrl.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB63B.bmp" CertEnrollCtrl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2060 taskkill.exe 6032 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop CertEnrollCtrl.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\CertEnrollCtrl.exe\"" CertEnrollCtrl.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings CertEnrollCtrl.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4088 PING.EXE 6088 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe 1780 CertEnrollCtrl.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 1780 CertEnrollCtrl.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 3772 CertEnrollCtrl.exe Token: SeDebugPrivilege 2868 CertEnrollCtrl.exe Token: 33 1916 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1916 AUDIODG.EXE Token: SeDebugPrivilege 6032 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1780 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1172 wrote to memory of 1780 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1172 wrote to memory of 1780 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1172 wrote to memory of 388 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 1172 wrote to memory of 388 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 1172 wrote to memory of 388 1172 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 388 wrote to memory of 2060 388 cmd.exe 87 PID 388 wrote to memory of 2060 388 cmd.exe 87 PID 388 wrote to memory of 2060 388 cmd.exe 87 PID 388 wrote to memory of 4088 388 cmd.exe 89 PID 388 wrote to memory of 4088 388 cmd.exe 89 PID 388 wrote to memory of 4088 388 cmd.exe 89 PID 1780 wrote to memory of 3672 1780 CertEnrollCtrl.exe 104 PID 1780 wrote to memory of 3672 1780 CertEnrollCtrl.exe 104 PID 3672 wrote to memory of 1404 3672 msedge.exe 105 PID 3672 wrote to memory of 1404 3672 msedge.exe 105 PID 1780 wrote to memory of 4084 1780 CertEnrollCtrl.exe 106 PID 1780 wrote to memory of 4084 1780 CertEnrollCtrl.exe 106 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 3620 3672 msedge.exe 107 PID 3672 wrote to memory of 5112 3672 msedge.exe 108 PID 3672 wrote to memory of 5112 3672 msedge.exe 108 PID 3672 wrote to memory of 4260 3672 msedge.exe 109 PID 3672 wrote to memory of 4260 3672 msedge.exe 109 PID 3672 wrote to memory of 4260 3672 msedge.exe 109 PID 3672 wrote to memory of 4260 3672 msedge.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exe"C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffada2f46f8,0x7ffada2f4708,0x7ffada2f47184⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:24⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:34⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2408 /prefetch:84⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:14⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:14⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:14⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:14⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:14⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:84⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:84⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:14⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:14⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:14⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:14⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8377500126076569066,13207919498979237981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2560 /prefetch:14⤵PID:4384
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/D84A-78CF-028E-029E-D95D3⤵PID:4652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffada2f46f8,0x7ffada2f4708,0x7ffada2f47184⤵PID:1924
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4956
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "CertEnrollCtrl.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exe" > NUL3⤵PID:5976
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "CertEnrollCtrl.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:6088
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:4088
-
-
-
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exeC:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exeC:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\CertEnrollCtrl.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1588
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD51831a44f793c7ef676715ffea3634704
SHA16891a212c4e1721f4ce8931f911a615df8a17798
SHA25637f050827b15da621a94b1927a393adaefb46a88bda44cc85c1fc6329830091b
SHA5128b164e3faf93a95784511f0071be33f09454a971d4da7a56050a6b3670d8c32e128f8eb20bab7894ab8daaabd97695577bc105f43595997cf67f9f7131b44d27
-
Filesize
10KB
MD5114ef86db9dadaad00b4b7f0fe771ebd
SHA12f40f86287abbac133aa66f5f53884f0573bf48e
SHA256bd510b6b186c4e8be00971c2d25ad1a0869204f0a9feafbce61f24da7e9b388a
SHA51286192d69017e7d53279598a9278772bea391987bb60fbeea942b7f23edef44cf2b6302e829cabdbaf722ec5e3c5fd3207f74994aaff5ed47afc6463783f50cc1
-
Filesize
85B
MD56b5f498b7891fb6e2302b3034cc962a6
SHA1796e50d79e382bbd5cf5c630437c3ef46a90557e
SHA256a8f1d6bc161b7ebb5773a427fef08472588869ff42f02ca77d349e34215ab6f6
SHA512706fb3dbe6e751d9798df589aa9a678d641744f2d01eb7849fb3024998f856a44a7d0eb5d507d9d5d8a1df7f37708d0578285d301fd095877e2dd1ce8eeb2d10
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD57343a5695d8f5edd6dc6c2146444d1fe
SHA13b5e26d39fdf25b53193b716f26982de1dde20e6
SHA256b7733d5f43c12612f6d5a42912eb14c76f8a70b62d4f65fac7f609f226303a4c
SHA512efe79fbc2f05dbb922ad501b5068cf595e904dcbc845bbb866a892203b7985d0a815fa8193744777b40a4ea32d713013dd50d16eb9d7d4f4ad6d7f669a10516b
-
Filesize
6KB
MD59500ed51e07c52610f9ada9ebdcc0394
SHA1f6ec83ec067c70ed83cc1ccd1b951898e386ff19
SHA2563c1e9a783af0f9c8ca257f842d48a9b74abc8ce8625a7ea1d7eb309d38974bfa
SHA51268741fd5c7456d1460192bf8c6e78c9b578382f8c5adc11ec574e57294db012eb05dfaf9507392a285bc4b301e36d1ed1471cabf95c1d6bbaae01c0b293f14d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53768b750695e5ca2cba3b48ede3b817d
SHA1419efd9c0b46358ec613decf0787b4c4a268bf08
SHA256fb1ff6c149853ecec9eda081e7bb478499618e96ed17b3e0e450133ed00fe1a1
SHA51215fb00841d3a67a818f70c47633fb92f4873910affd3e541c5c4cb0467c6062d39c73c31cecfe56ffb8f3647637a90c306d591542e84e402073b2aba96683aaa
-
Filesize
1KB
MD5e2566cb649a8796b98b0d740c2854889
SHA13b63b6ebc5d3db66579d3e5292c4530a6c58cb5b
SHA2569180674ec65972fe61d38855b613026caec2ddf90ddf9863817a69dbdd51845c
SHA51274eb09625f3cc7408d23cda4ac75dc979bb0fa4b203da12d7d6715af62c0c47292c76be3d632e5a2783cee25479f26772244e0e26091c0aa5ab1e9af9d9cbbd5
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684