Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/838D-811E-A0C2-029E-D3DC
http://cerberhhyed5frqa.qor499.top/838D-811E-A0C2-029E-D3DC
http://cerberhhyed5frqa.gkfit9.win/838D-811E-A0C2-029E-D3DC
http://cerberhhyed5frqa.305iot.win/838D-811E-A0C2-029E-D3DC
http://cerberhhyed5frqa.dkrti5.win/838D-811E-A0C2-029E-D3DC
http://cerberhhyed5frqa.onion/838D-811E-A0C2-029E-D3DC
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16397) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" label.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation label.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\label.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\label.lnk label.exe -
Executes dropped EXE 3 IoCs
pid Process 4568 label.exe 3316 label.exe 1628 label.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\label = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\label = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" label.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\label = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" label.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\label = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpFD56.bmp" label.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3956 taskkill.exe 868 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" label.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\label.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop label.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings label.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2520 PING.EXE 4348 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe 4568 label.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 4568 label.exe Token: SeDebugPrivilege 3956 taskkill.exe Token: SeDebugPrivilege 3316 label.exe Token: 33 1220 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1220 AUDIODG.EXE Token: SeDebugPrivilege 1628 label.exe Token: SeDebugPrivilege 868 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4568 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1560 wrote to memory of 4568 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1560 wrote to memory of 4568 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 1560 wrote to memory of 1636 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 1560 wrote to memory of 1636 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 1560 wrote to memory of 1636 1560 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 84 PID 1636 wrote to memory of 3956 1636 cmd.exe 87 PID 1636 wrote to memory of 3956 1636 cmd.exe 87 PID 1636 wrote to memory of 3956 1636 cmd.exe 87 PID 1636 wrote to memory of 2520 1636 cmd.exe 89 PID 1636 wrote to memory of 2520 1636 cmd.exe 89 PID 1636 wrote to memory of 2520 1636 cmd.exe 89 PID 4568 wrote to memory of 4148 4568 label.exe 101 PID 4568 wrote to memory of 4148 4568 label.exe 101 PID 4148 wrote to memory of 2024 4148 msedge.exe 102 PID 4148 wrote to memory of 2024 4148 msedge.exe 102 PID 4568 wrote to memory of 4624 4568 label.exe 103 PID 4568 wrote to memory of 4624 4568 label.exe 103 PID 4568 wrote to memory of 3040 4568 label.exe 104 PID 4568 wrote to memory of 3040 4568 label.exe 104 PID 4568 wrote to memory of 1492 4568 label.exe 107 PID 4568 wrote to memory of 1492 4568 label.exe 107 PID 3040 wrote to memory of 1948 3040 msedge.exe 106 PID 3040 wrote to memory of 1948 3040 msedge.exe 106 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108 PID 3040 wrote to memory of 408 3040 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exe"C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffdbd5146f8,0x7ffdbd514708,0x7ffdbd5147184⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16791684674381951836,3524907540919549691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:24⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16791684674381951836,3524907540919549691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:34⤵PID:4076
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/838D-811E-A0C2-029E-D3DC3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd5146f8,0x7ffdbd514708,0x7ffdbd5147184⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:24⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:34⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:84⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:14⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:14⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:84⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:84⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:14⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:14⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14532101295377921664,4351991115222978147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:14⤵PID:3368
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1492
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "label.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exe" > NUL3⤵PID:2756
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "label.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4348
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2520
-
-
-
C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exeC:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x494 0x4a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2544
-
C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exeC:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\label.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
5KB
MD5e97b58437e5c9d05ca08ddd73d0a422e
SHA1b621a8c2c25eb123047c96fde63064ba71f31933
SHA2561394e8543d1301156dc527ba7f659399102d3f81c94c06a6d8eda91214553f94
SHA5129910d5ac6ed93b7cff5c2ece358c64e427c085c7b27769db8cf899e6373f06b89623e3bbfeaabafa9431004d31b7b475342b1ce02affea9637f6905e98a723bb
-
Filesize
6KB
MD552af61b326d18960c337b22f7d814058
SHA17d84b47276affc694f24d743feaab2be145439ad
SHA256fce3c790c8ad92611c3113c860c2228e73731e11575475bc1c7644301ddd58ca
SHA51227afcd55a2182fb0b228ac6391c2286a2f0340a7e6cbce7a149660c9d743ff62c095d51bbbae2061845265568af86c5fe146a6412542b016ef54e5e1351e2daa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5a26be1b2db324da73b53a8956932bf93
SHA15b7347c21bbcc52f13a7d8439f1b673843be64e6
SHA25635a39d4233450419387beadc4a7f84117863bb114947a1e406442434023b269c
SHA51212a4c5e1bb30385ad8ba30e93bdbfa0c17add476514cdfb7d49d77f7620a50a2e568d76c82bc97787bf7447ac2d8c4738af9ed152e35b98a7d376d7c7a7a5e81
-
Filesize
11KB
MD5fb781edb7b215b84f4df0e22af50bd26
SHA11d4a72789fdc799b6cac7c90a051694b1375e2ce
SHA256482ae69a3eafc79f4b33633d5859fc967e0c145fafc29a7083e8130350910e1f
SHA512fac4b2471aefb644495d2b80672cd6128ca9882e0213f334448c0ea541e38b04e10982306dcf8a549cfa0e39ba859e29f5cbcd61ab7ea26adedf16c3403526be
-
Filesize
12KB
MD5e779198d773b80ed9c48f026e6aebe38
SHA1845321f6dcdaf4038a79e8f68b552d48c870b4b3
SHA256d45bc55fc0b7854797125d824404971dfcf0adc8b754e9ba8421f8f60473af5d
SHA51274eea3816383950079b96987220e9cea309bb69add916cdaf85e6b3d9e742d9a89dc636cfbcaa3746aaf80b9dd7c35332cb13cf52868fbabcae4d8473a4292b5
-
Filesize
10KB
MD58f75d64a4421df6cb55a13f228a54d44
SHA14436c9bc90d4436bc2dfbbc7fa0ebfdae250c470
SHA256541c28887e8f1a1a05e6e7ad8e631094e4e52aacee877677448e896ce94ba76b
SHA5123200d33a2bdcdfd907096acf86a63df328702a2e85108f0e1eea13df39bf18917454cec920592c68ea260d8cc68ac38da18709626ff95798cbdc49e4b34b2b8e
-
Filesize
85B
MD540ce4de1e051e9d72f0e23a36c9038da
SHA17aca4cd5ca19648f99caba5ebb6a4c2802578427
SHA25627eb1de776e4d7afb28aac9a5f8a73f653493921d08600a5b286a9fdf8b5455c
SHA512e04af9c4b9c88c1a0256aa440f153a07d7ad18c6de0dde4b89926e59b4ebb1a7caeba7b0dc3df88ae67881b98d8740465fcaab82d65a7eb17d8aced20e0eaa53
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
1KB
MD55aa6aa7b5fd31f164b8aa30d6ab816ef
SHA10e4adae475f8aee545a6428363c9c3e61da0d4e0
SHA256ca7b34293183d3d944b2ac04a8f0614d16c216c2f565ca2b02678b468c7df61f
SHA512e3e16c635b3feb69bb5af543b535e3cf865e21b5bcf9fcb1bfa9179bbecd33652ac5301c29f2de6f0d3eca1cfd7e6430b4518c07e6e79b40e6d42cf4707e424c
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684