Analysis
-
max time kernel
107s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/2619-C757-C183-029E-DB69
http://cerberhhyed5frqa.qor499.top/2619-C757-C183-029E-DB69
http://cerberhhyed5frqa.gkfit9.win/2619-C757-C183-029E-DB69
http://cerberhhyed5frqa.305iot.win/2619-C757-C183-029E-DB69
http://cerberhhyed5frqa.dkrti5.win/2619-C757-C183-029E-DB69
http://cerberhhyed5frqa.onion/2619-C757-C183-029E-DB69
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16397) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" proquota.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation proquota.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\proquota.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Executes dropped EXE 3 IoCs
pid Process 4660 proquota.exe 1304 proquota.exe 2868 proquota.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\proquota = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\proquota = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\proquota = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" proquota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\proquota = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" proquota.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE77D.bmp" proquota.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 5040 taskkill.exe 3756 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop proquota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\proquota.exe\"" proquota.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings proquota.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1704 PING.EXE 2540 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe 4660 proquota.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 4660 proquota.exe Token: SeDebugPrivilege 5040 taskkill.exe Token: SeDebugPrivilege 1304 proquota.exe Token: SeDebugPrivilege 2868 proquota.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4660 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 82 PID 3332 wrote to memory of 4660 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 82 PID 3332 wrote to memory of 4660 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 82 PID 3332 wrote to memory of 2992 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 3332 wrote to memory of 2992 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 3332 wrote to memory of 2992 3332 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 83 PID 2992 wrote to memory of 5040 2992 cmd.exe 85 PID 2992 wrote to memory of 5040 2992 cmd.exe 85 PID 2992 wrote to memory of 5040 2992 cmd.exe 85 PID 2992 wrote to memory of 1704 2992 cmd.exe 88 PID 2992 wrote to memory of 1704 2992 cmd.exe 88 PID 2992 wrote to memory of 1704 2992 cmd.exe 88 PID 4660 wrote to memory of 1884 4660 proquota.exe 101 PID 4660 wrote to memory of 1884 4660 proquota.exe 101 PID 1884 wrote to memory of 4540 1884 msedge.exe 102 PID 1884 wrote to memory of 4540 1884 msedge.exe 102 PID 4660 wrote to memory of 3480 4660 proquota.exe 103 PID 4660 wrote to memory of 3480 4660 proquota.exe 103 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 2940 1884 msedge.exe 104 PID 1884 wrote to memory of 844 1884 msedge.exe 105 PID 1884 wrote to memory of 844 1884 msedge.exe 105 PID 4660 wrote to memory of 4308 4660 proquota.exe 106 PID 4660 wrote to memory of 4308 4660 proquota.exe 106 PID 1884 wrote to memory of 996 1884 msedge.exe 107 PID 1884 wrote to memory of 996 1884 msedge.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exe"C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb33f846f8,0x7ffb33f84708,0x7ffb33f847184⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:24⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:34⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:84⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:14⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:14⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:14⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:14⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3368 /prefetch:84⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3368 /prefetch:84⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:14⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:14⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:14⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:14⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15311529066461020991,5517134576444076327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:14⤵PID:5072
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/2619-C757-C183-029E-DB693⤵PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb33f846f8,0x7ffb33f84708,0x7ffb33f847184⤵PID:4412
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3892
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "proquota.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exe" > NUL3⤵PID:3048
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "proquota.exe"4⤵
- Kills process with taskkill
PID:3756
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2540
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1704
-
-
-
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exeC:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exeC:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\proquota.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1628
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x3081⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD51eb41aca955a0bf713451b300a228875
SHA15109c1207297f2dacefd1b070141ce13d240a60c
SHA256ead74c8675d42329ed3e327ce126c07ea33c035ae93907fabd266e1cbe001a7f
SHA512ead02ccef20c022724ccf98f0dc9154cadd956b0b4ec21be771415a3f86ce78d8fc3e289675720f2bee0102a42aee9ed1844ae5a994e13712429bea9427d6937
-
Filesize
10KB
MD557645e620adfa2ec1701acfdc1f1d90d
SHA162123d7f54d1a630d6f710f2ce65aa8dfda869fb
SHA2562e8ee083b669f6cea23c0759087c0e783e15c33ac7d0897278f4748019bfa6f5
SHA512dbc859aa0d7303bd2ab2db16ae81bb8b589184c448e3aca38b85628438e04590a59d8cf2a69ba7d7bd9c205f843806102e505d8e4294998c83f138a99ffa6f94
-
Filesize
85B
MD5a0f79e1a5b7315da7fb52e1ddbf33efb
SHA1639c74ea838366dacf99ffb0502f1023ca8d249a
SHA2561503c237077f3605fd974ccefd049cb959b8d92332dc75f248e899c5caf46be3
SHA512a525a564df56d80f83c3d3aa913e815c938da0de26c112799f3608170875d4b4bfec51fb686a653e64942dca5217d42c1d6eaa82c3f50e56568cbf7b97173dad
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
5KB
MD5fad07f94477063df91164f0a934eca03
SHA163ce9fe82ce8639c6ddbc1457642bb30fb8226c8
SHA25640c7fff62c4cad47134d3e4e4082ec8980257450433473f58652ea2237b9ab6e
SHA512b9f8ed2889b787a989bab381cdac582727596cf006326904f8c6751cb3d8307147a8e32cb011f758e2cb0437cef961b544ed991804d35dc2482fb8f6dfd8e61d
-
Filesize
6KB
MD5c5556646335406cbfc004ed5c7642b2b
SHA1a771689bf0b59a5fc160bfc8fff7119ee9122c20
SHA256c5d1be4ef67ea00b20ed310b7b0738f3a68959291ff5a9c679403a3dbe169401
SHA5120a2d07c55383968125fe09a4faf57560b2669745e9cef1b0f36d9e05d2b8e1355ace0d4205e47ce6c4e9637d7f138badf527ea2e1f5fab1c5dbdfb8d7ad872b3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50d9968803cb2d09e4082f7f1f5fa84aa
SHA19372a41c9f0da99770d9fe0f9ff5240f066d2ec8
SHA256d072ff65fb772dfbd86ffd0fb5b6f944c35aaff8e311b49236faaf746ac0ba59
SHA512a3d3fdaf3b4b4b1509e23ec00e6b5d4b2405bbffdcc86c869af2add5db10d2cc244735404b73fb849e0b66dbd9c910b572898facd5530681642b622bae075a03
-
Filesize
1KB
MD53a4c1060b374838bddaa0766754d05ce
SHA1f992678525d821c1cb33a396eb8b6dabfdbd5bae
SHA256580535ec2b1faab365607ffbd4aeabb32385e1abf28395747336846f984742e9
SHA512e091cccf759bba48d957d77e91cad8695dd0f8a5f485d18ef3860b1fee5292dbec29f620e1a181a6d5cf0bb286e5e0acde12b2c65f0a3ee37fc94f6f360fba6f
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684