Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/175F-077F-8DCE-029E-D0A8
http://cerberhhyed5frqa.qor499.top/175F-077F-8DCE-029E-D0A8
http://cerberhhyed5frqa.gkfit9.win/175F-077F-8DCE-029E-D0A8
http://cerberhhyed5frqa.305iot.win/175F-077F-8DCE-029E-D0A8
http://cerberhhyed5frqa.dkrti5.win/175F-077F-8DCE-029E-D0A8
http://cerberhhyed5frqa.onion/175F-077F-8DCE-029E-D0A8
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16400) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation newdev.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\newdev.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\newdev.lnk newdev.exe -
Executes dropped EXE 3 IoCs
pid Process 4908 newdev.exe 2128 newdev.exe 3156 newdev.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC33B.bmp" newdev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 5004 taskkill.exe 5992 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\newdev.exe\"" newdev.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings newdev.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 464 PING.EXE 6036 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe 4908 newdev.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 4908 newdev.exe Token: SeDebugPrivilege 5004 taskkill.exe Token: SeDebugPrivilege 2128 newdev.exe Token: SeDebugPrivilege 3156 newdev.exe Token: 33 4292 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4292 AUDIODG.EXE Token: SeDebugPrivilege 5992 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4908 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1412 wrote to memory of 4908 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1412 wrote to memory of 4908 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1412 wrote to memory of 4328 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 1412 wrote to memory of 4328 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 1412 wrote to memory of 4328 1412 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 85 PID 4328 wrote to memory of 5004 4328 cmd.exe 87 PID 4328 wrote to memory of 5004 4328 cmd.exe 87 PID 4328 wrote to memory of 5004 4328 cmd.exe 87 PID 4328 wrote to memory of 464 4328 cmd.exe 89 PID 4328 wrote to memory of 464 4328 cmd.exe 89 PID 4328 wrote to memory of 464 4328 cmd.exe 89 PID 4908 wrote to memory of 4652 4908 newdev.exe 103 PID 4908 wrote to memory of 4652 4908 newdev.exe 103 PID 4652 wrote to memory of 3156 4652 msedge.exe 104 PID 4652 wrote to memory of 3156 4652 msedge.exe 104 PID 4908 wrote to memory of 2660 4908 newdev.exe 105 PID 4908 wrote to memory of 2660 4908 newdev.exe 105 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 2528 4652 msedge.exe 106 PID 4652 wrote to memory of 4336 4652 msedge.exe 107 PID 4652 wrote to memory of 4336 4652 msedge.exe 107 PID 4652 wrote to memory of 2444 4652 msedge.exe 108 PID 4652 wrote to memory of 2444 4652 msedge.exe 108 PID 4652 wrote to memory of 2444 4652 msedge.exe 108 PID 4652 wrote to memory of 2444 4652 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exe"C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa45bf46f8,0x7ffa45bf4708,0x7ffa45bf47184⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:24⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:34⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:84⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:14⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:14⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:14⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:84⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:84⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:14⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:14⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:14⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:14⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9495203735037521166,1275112909432272006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:14⤵PID:1400
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/175F-077F-8DCE-029E-D0A83⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa45bf46f8,0x7ffa45bf4708,0x7ffa45bf47184⤵PID:4360
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3872
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "newdev.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exe" > NUL3⤵PID:5940
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "newdev.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:6036
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:464
-
-
-
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exeC:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exeC:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\newdev.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD59e105e4937892bd0b059599ca55f170c
SHA1e0f9f4eaa8d3aab91e6ed0f0f108e902d291dc9b
SHA256e712b6b476df48841e2ad21fdc15f26b4705e8ca867af6b24c32124169b676de
SHA51296cfe4412ca63a8d83370aba806c6463cc2b1d05ed1184815f438d7c04253a5d7b6df42d3866db77ca144b4cc9e678e65b08aed190cb87cd2f8427210c60f4db
-
Filesize
10KB
MD586681abb67fe5e2ef964a78e4f399eb3
SHA16db616825752c3f820afd09e5ef97e2b0c71460b
SHA256e232dc91194fa4df0dcb3acabf4b9a5e1dff128b80c9ae687c76d1b1db2e7057
SHA512ebdabb0d5d066f9d47d90eaedddc8310b49fee99df09ffe072427b54e591c2a382bf8d9d411f17ee13146970bab2d5afc1231ed2165c74a1f16b11fff8d424fa
-
Filesize
85B
MD591b86c3a985a410c552c7f6f33c1a033
SHA13ab9a929defb6d486dc3d7beeb96359e79cfae5b
SHA2568d5e3eb5412c8e5a85b82a6222b43e7e57373a7d5bfd4c07f7ede7206751b606
SHA512cc260d0b4e127ccccdd741ae872eab0a944f3744381fb888f6e6de95963491d47c9e5fad2c715abcca57612688d9baf4e1cfa0fb438d9ee4f078aa1771a7e092
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD5d11f5c357e13322a30d53bb2ffcb9cbe
SHA1e9593227b413646290675d0d84f3cf5ab6d02828
SHA256abf58844d198aec6e263b2f8cbb741946d283bfc5578ab7cb977710bdd843a9e
SHA51221eb46e9fc66f9cecec7b513e6d2198008601ceccf7a534c129e8c6cb68cd674fb1767898231f9333ce6f8a5449d6729529d71f17ee7569bac496ad4ae1e2538
-
Filesize
6KB
MD51a5b31e4ae0decc72dfe36a4f7d5a51a
SHA1927c3e9a7cb9b17e1f4cbae4a5327250d23bf296
SHA256ee355655a5a5b3ced139ef9e9dd969efa52e72e48a78f711033fd73897c13047
SHA512ea6b014ea017187e76a6dac63fab672e4283b88dca124718c2cc18a6dbaabaf82ff318b44422781b8fb1c7b74267c4420f97611866a7a5bacd7c1c93c66d1f7a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f7efdcac1664a7c8cc8976e2375464fc
SHA17ec46618f9bc2fcdb15499b63fd6a76b929252a1
SHA25605aaab21f5e98203a9aaa2b6b702ce7dbb7800666589e19fad2f69e032f5b72b
SHA51227ab16fa9db212cdc45681546d3ca3468cee2b678437208ddc4a65c6220550bcf255e64d44a1516ddbb51ea3532b5fa008866e555cafbc6599b35d9c48197ded
-
Filesize
1KB
MD5255078a85955d9356f89de73fc68309c
SHA186a843b9f6f1db643ac7f32571fc7e2df7874950
SHA256661386abc2150c7e3e3d1cf5b4c77fcc83d113b572d30d0fe7aa2467631b4898
SHA51208458985d66ea1c79f3a55b8c65192c3c361815bb3851d155c02f1cb57ea3ba9f3023c57157e39e5b6dc1a794eb4f75414af15f20a5b642e96c496ba27353715
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684