Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
-
Size
392KB
-
MD5
6653ef20d2a3a6ef656d9c886ebabd93
-
SHA1
bb0cc0b05bb70a3d347faa94fb36a35c771b0692
-
SHA256
48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
-
SHA512
b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
-
SSDEEP
3072:viHZTdn6oWzjNtxPPnGau7GMuOYHAifZEeKPi6u7KzrN7ivE5oY4KppRsqYaefiU:QZqPtvGauSM4HAifkGOzrN+HKkalM
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/7F0B-5DAC-C444-0291-9CC6
http://cerberhhyed5frqa.slr849.win/7F0B-5DAC-C444-0291-9CC6
http://cerberhhyed5frqa.ret5kr.win/7F0B-5DAC-C444-0291-9CC6
http://cerberhhyed5frqa.zgf48j.win/7F0B-5DAC-C444-0291-9CC6
http://cerberhhyed5frqa.xltnet.win/7F0B-5DAC-C444-0291-9CC6
http://cerberhhyed5frqa.onion/7F0B-5DAC-C444-0291-9CC6
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16396) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" rdrleakdiag.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation rdrleakdiag.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rdrleakdiag.lnk VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rdrleakdiag.lnk rdrleakdiag.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 rdrleakdiag.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" rdrleakdiag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" rdrleakdiag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC213.bmp" rdrleakdiag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4304 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2224 taskkill.exe 1376 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop rdrleakdiag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" rdrleakdiag.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\\rdrleakdiag.exe\"" VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings rdrleakdiag.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 748 PING.EXE 4296 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 4528 rdrleakdiag.exe 2868 msedge.exe 2868 msedge.exe 540 msedge.exe 540 msedge.exe 4728 identity_helper.exe 4728 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe Token: SeDebugPrivilege 4528 rdrleakdiag.exe Token: SeDebugPrivilege 1376 taskkill.exe Token: SeBackupPrivilege 2928 vssvc.exe Token: SeRestorePrivilege 2928 vssvc.exe Token: SeAuditPrivilege 2928 vssvc.exe Token: SeIncreaseQuotaPrivilege 4692 wmic.exe Token: SeSecurityPrivilege 4692 wmic.exe Token: SeTakeOwnershipPrivilege 4692 wmic.exe Token: SeLoadDriverPrivilege 4692 wmic.exe Token: SeSystemProfilePrivilege 4692 wmic.exe Token: SeSystemtimePrivilege 4692 wmic.exe Token: SeProfSingleProcessPrivilege 4692 wmic.exe Token: SeIncBasePriorityPrivilege 4692 wmic.exe Token: SeCreatePagefilePrivilege 4692 wmic.exe Token: SeBackupPrivilege 4692 wmic.exe Token: SeRestorePrivilege 4692 wmic.exe Token: SeShutdownPrivilege 4692 wmic.exe Token: SeDebugPrivilege 4692 wmic.exe Token: SeSystemEnvironmentPrivilege 4692 wmic.exe Token: SeRemoteShutdownPrivilege 4692 wmic.exe Token: SeUndockPrivilege 4692 wmic.exe Token: SeManageVolumePrivilege 4692 wmic.exe Token: 33 4692 wmic.exe Token: 34 4692 wmic.exe Token: 35 4692 wmic.exe Token: 36 4692 wmic.exe Token: SeIncreaseQuotaPrivilege 4692 wmic.exe Token: SeSecurityPrivilege 4692 wmic.exe Token: SeTakeOwnershipPrivilege 4692 wmic.exe Token: SeLoadDriverPrivilege 4692 wmic.exe Token: SeSystemProfilePrivilege 4692 wmic.exe Token: SeSystemtimePrivilege 4692 wmic.exe Token: SeProfSingleProcessPrivilege 4692 wmic.exe Token: SeIncBasePriorityPrivilege 4692 wmic.exe Token: SeCreatePagefilePrivilege 4692 wmic.exe Token: SeBackupPrivilege 4692 wmic.exe Token: SeRestorePrivilege 4692 wmic.exe Token: SeShutdownPrivilege 4692 wmic.exe Token: SeDebugPrivilege 4692 wmic.exe Token: SeSystemEnvironmentPrivilege 4692 wmic.exe Token: SeRemoteShutdownPrivilege 4692 wmic.exe Token: SeUndockPrivilege 4692 wmic.exe Token: SeManageVolumePrivilege 4692 wmic.exe Token: 33 4692 wmic.exe Token: 34 4692 wmic.exe Token: 35 4692 wmic.exe Token: 36 4692 wmic.exe Token: 33 4524 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4524 AUDIODG.EXE Token: SeDebugPrivilege 2224 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4528 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 82 PID 4708 wrote to memory of 4528 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 82 PID 4708 wrote to memory of 4528 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 82 PID 4708 wrote to memory of 3016 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 83 PID 4708 wrote to memory of 3016 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 83 PID 4708 wrote to memory of 3016 4708 VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe 83 PID 4528 wrote to memory of 4304 4528 rdrleakdiag.exe 85 PID 4528 wrote to memory of 4304 4528 rdrleakdiag.exe 85 PID 3016 wrote to memory of 1376 3016 cmd.exe 87 PID 3016 wrote to memory of 1376 3016 cmd.exe 87 PID 3016 wrote to memory of 1376 3016 cmd.exe 87 PID 4528 wrote to memory of 4692 4528 rdrleakdiag.exe 91 PID 4528 wrote to memory of 4692 4528 rdrleakdiag.exe 91 PID 3016 wrote to memory of 748 3016 cmd.exe 93 PID 3016 wrote to memory of 748 3016 cmd.exe 93 PID 3016 wrote to memory of 748 3016 cmd.exe 93 PID 4528 wrote to memory of 540 4528 rdrleakdiag.exe 104 PID 4528 wrote to memory of 540 4528 rdrleakdiag.exe 104 PID 540 wrote to memory of 1924 540 msedge.exe 105 PID 540 wrote to memory of 1924 540 msedge.exe 105 PID 4528 wrote to memory of 3936 4528 rdrleakdiag.exe 106 PID 4528 wrote to memory of 3936 4528 rdrleakdiag.exe 106 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2940 540 msedge.exe 107 PID 540 wrote to memory of 2868 540 msedge.exe 108 PID 540 wrote to memory of 2868 540 msedge.exe 108 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\rdrleakdiag.exe"C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\rdrleakdiag.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4304
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0f0646f8,0x7ffd0f064708,0x7ffd0f0647184⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:24⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:84⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:14⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:14⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:14⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:14⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:14⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:14⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:14⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:84⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:14⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:14⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8235516619964404982,15931441423185707435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:14⤵PID:4452
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.xlfp45.win/7F0B-5DAC-C444-0291-9CC63⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0f0646f8,0x7ffd0f064708,0x7ffd0f0647184⤵PID:3700
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3688
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "rdrleakdiag.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{1B619EC1-DAC0-C86E-6BB6-7F9A1519E78F}\rdrleakdiag.exe" > NUL3⤵PID:208
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "rdrleakdiag.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4296
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:748
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x508 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
5KB
MD5eaeca8171205e3a93c5daa01e1574bec
SHA1f071febbb3ab52dad0c47461bfd186c2379597c1
SHA256f78f9c11294e148b38e2cdacd51ea2dc356e49b698155b9a017e5f8372faa9c0
SHA512de84afd6d930a631673a5a128d22547cf5cf9aed03276132bc62b75c0d38cdabf7995a1f4fab98c2ab54a7c20fd3e374f521e9a2e745122f44cbd203edf7325f
-
Filesize
6KB
MD5cb37cbb667048e0f7e68f6524fff2bb5
SHA19f567a509ebee6bbe93876cdf139b74538989d37
SHA256ce44f0fbef5f0276299abd8b2eed5618f3b368b6fe545f3cf29baea70ad6a8f0
SHA512ce56375b3788fc1bf9b4ab6c1587881129397b8aafd9aea2a31845271d5e713711b5a29144c5ae9ab730992b96dd61c3f9126c2041d2f30a90bab93b5220a157
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5240332db754c57824e7a2c7fa15cf07c
SHA1b5c7a55855a9a552ea196d9d0855e07e05c79328
SHA2562521f98d39820c39daddd7ab84bde6aa268cbd5df820e145beb88a77eb996f5d
SHA5125af66e66dfb97f75a3d63bc6ec08c36b171b5795060f6b3195b9474bb9dd77aa8c28a7c9a8d659d472edce951ec55f9a3b6ef3df7286b7f8236eddf68b3cdc97
-
Filesize
1KB
MD58988a07be540aeda8e01dcc1abba35c9
SHA1b5fb1c01208138bb1c301f8c26ef9626976c8b01
SHA2561b4a35e00ccf54fb275bbe116f63db58f5e8a3cd97281cc4aacd6abafac2d30c
SHA51238d44e3b2863fab925c51f5452ae733cdfcf310bbcb65f594ce652cff2ba78ed4cea8fca2b12156d30944a3fcd574c682c1c2e6206538383849e420016786b03
-
Filesize
392KB
MD56653ef20d2a3a6ef656d9c886ebabd93
SHA1bb0cc0b05bb70a3d347faa94fb36a35c771b0692
SHA25648ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
SHA512b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
-
Filesize
12KB
MD5fc9b023514bd1fc73e84f47a980b6d82
SHA1fc727f473537455c121df5092c42b9e40baa5452
SHA25698eeef65c3d1f6bdad90157127062895a47534e1c6f6fb949487564a70745407
SHA512ed9b93f1e0a885d7ae16aae8f90eb9bce8e4cc6cdd01c2c6a3e545d30792aed59cd5651f817a74aa888cc2ec173b87456a59f50016cdf4d6d9eb919bea7a70de
-
Filesize
10KB
MD5c0bb3bfbf546a51ea31670b72ae9c6c2
SHA1b07e777519b19aa4f96187f7841620c214b52402
SHA25658f92baa81f8332c6cedd1845bcd4b4cdc74c320f94f7c394f496763c3c6e5c5
SHA512b5b337a00c14544c70a7276c5668e15f51c76c0510193b867f7a42055e74066efb83ab4ea851447af672b4807c9a0b2917c556c5ee8ce236ee73a642cc093d3e
-
Filesize
85B
MD59932ebab0dbf408c2b6ac590021a63e1
SHA1736eadbdb76283bceaf303d30233c6253303adbd
SHA25600a7099f63363fb5e7a32be68869a487e0fa5910a381d47db9e2bf9d00e54bd8
SHA5120cfcffbb75a9dd3f393b727809f53330cec9e68d97b0f037f412dd6f9bd4b25ce6ebf352c613b39ccc7cb4e360b78dc2ff2d7e09480530050b65285d752a1885
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853