Analysis
-
max time kernel
127s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_270b70bad151a515136f553e5bc880ac.exe
-
Size
344KB
-
MD5
270b70bad151a515136f553e5bc880ac
-
SHA1
77b7def336c7647c6faadaf7136d70ff1e9ba7fc
-
SHA256
db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
-
SHA512
c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f
-
SSDEEP
3072:v5sAzvcjE+lcO3zXgKRcP66BpwwB9RStc3Yfqr:v5jvc4+lcO3zQKSPfBJXv3YM
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/F7B5-1FAC-49A0-0073-17FA
http://cerberhhyed5frqa.45tori.win/F7B5-1FAC-49A0-0073-17FA
http://cerberhhyed5frqa.fkr84i.win/F7B5-1FAC-49A0-0073-17FA
http://cerberhhyed5frqa.fkri48.win/F7B5-1FAC-49A0-0073-17FA
http://cerberhhyed5frqa.djre89.win/F7B5-1FAC-49A0-0073-17FA
http://cerberhhyed5frqa.onion/F7B5-1FAC-49A0-0073-17FA
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1164 bcdedit.exe 564 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" mshta.exe -
Deletes itself 1 IoCs
pid Process 2148 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\mshta.lnk VirusShare_270b70bad151a515136f553e5bc880ac.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 mshta.exe -
Loads dropped DLL 3 IoCs
pid Process 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 2188 mshta.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\mshta = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\mshta = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\mshta = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\mshta = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" mshta.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4BB0.bmp" mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2468 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2772 taskkill.exe 2096 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\mshta.exe\"" mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80AE1001-24F1-11EF-8C47-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eca4f87ae28de6428855bc58dbabfa07000000000200000000001066000000010000200000006fa738baf7e525fede98d1d4dd8b3bd6b8cc0b6759c3bf43a577b27e4594757b000000000e8000000002000020000000a3cf863737d5f3b1df4f80861ba1c54da21e91675286d0c98f6f20ad51d253292000000062b3f69365d649c3c16965524b64ac646e52aabae9bc788fb5d9941cafb7067540000000be8317a407fb1664de91ef568e187125e41965b84bcce2452c825d01512a97135e353f5f04c0321babcb12f832a98741d435d6b404fbe56c75fe5f9ac89e7b21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eca4f87ae28de6428855bc58dbabfa0700000000020000000000106600000001000020000000b8f8d07258e2844403d51743df77872a74869ae35b708f70608606cc8c8a35cc000000000e8000000002000020000000891c73be6cc7d0e8b16927fddfbafb1cd83223f20f5abac31d8d1ec2f5959e7f90000000faa5a25edc1e106aa3f7713f722230d519b20ddf0368ff21f6e408f9f9d255941e8ca9290f88cf63ab1bdf7cb0179db4e5d6a35fe50fd935c4842efe85b39136e621da3d91d1166210716afec7b395c23ced924deb81cac7aebc1198604630e0568e7260b813e0e8f369cb6a9f64f8a9df3df2c4d55005fb748258c0aa265cbb8638b7c315903382b2784a6e47c3c89b400000008db69d82d3c7e401303af959141bc38d6519e6f218c5ebabf25996dd34d7e9d723aca2495448291d17f12ce7e758141fed99844ffe28d918c5f56cd91ba00aab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60175144feb8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80C37C61-24F1-11EF-8C47-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2380 PING.EXE 2528 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe 2188 mshta.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe Token: SeDebugPrivilege 2188 mshta.exe Token: SeBackupPrivilege 2588 vssvc.exe Token: SeRestorePrivilege 2588 vssvc.exe Token: SeAuditPrivilege 2588 vssvc.exe Token: SeDebugPrivilege 2772 taskkill.exe Token: SeIncreaseQuotaPrivilege 572 wmic.exe Token: SeSecurityPrivilege 572 wmic.exe Token: SeTakeOwnershipPrivilege 572 wmic.exe Token: SeLoadDriverPrivilege 572 wmic.exe Token: SeSystemProfilePrivilege 572 wmic.exe Token: SeSystemtimePrivilege 572 wmic.exe Token: SeProfSingleProcessPrivilege 572 wmic.exe Token: SeIncBasePriorityPrivilege 572 wmic.exe Token: SeCreatePagefilePrivilege 572 wmic.exe Token: SeBackupPrivilege 572 wmic.exe Token: SeRestorePrivilege 572 wmic.exe Token: SeShutdownPrivilege 572 wmic.exe Token: SeDebugPrivilege 572 wmic.exe Token: SeSystemEnvironmentPrivilege 572 wmic.exe Token: SeRemoteShutdownPrivilege 572 wmic.exe Token: SeUndockPrivilege 572 wmic.exe Token: SeManageVolumePrivilege 572 wmic.exe Token: 33 572 wmic.exe Token: 34 572 wmic.exe Token: 35 572 wmic.exe Token: SeIncreaseQuotaPrivilege 572 wmic.exe Token: SeSecurityPrivilege 572 wmic.exe Token: SeTakeOwnershipPrivilege 572 wmic.exe Token: SeLoadDriverPrivilege 572 wmic.exe Token: SeSystemProfilePrivilege 572 wmic.exe Token: SeSystemtimePrivilege 572 wmic.exe Token: SeProfSingleProcessPrivilege 572 wmic.exe Token: SeIncBasePriorityPrivilege 572 wmic.exe Token: SeCreatePagefilePrivilege 572 wmic.exe Token: SeBackupPrivilege 572 wmic.exe Token: SeRestorePrivilege 572 wmic.exe Token: SeShutdownPrivilege 572 wmic.exe Token: SeDebugPrivilege 572 wmic.exe Token: SeSystemEnvironmentPrivilege 572 wmic.exe Token: SeRemoteShutdownPrivilege 572 wmic.exe Token: SeUndockPrivilege 572 wmic.exe Token: SeManageVolumePrivilege 572 wmic.exe Token: 33 572 wmic.exe Token: 34 572 wmic.exe Token: 35 572 wmic.exe Token: 33 1164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1164 AUDIODG.EXE Token: 33 1164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1164 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1324 iexplore.exe 1324 iexplore.exe 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1324 iexplore.exe 1324 iexplore.exe 1324 iexplore.exe 1324 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1664 iexplore.exe 1664 iexplore.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 2188 mshta.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2188 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 1928 wrote to memory of 2188 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 1928 wrote to memory of 2188 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 1928 wrote to memory of 2188 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 1928 wrote to memory of 2148 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 1928 wrote to memory of 2148 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 1928 wrote to memory of 2148 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 1928 wrote to memory of 2148 1928 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 2188 wrote to memory of 2468 2188 mshta.exe 30 PID 2188 wrote to memory of 2468 2188 mshta.exe 30 PID 2188 wrote to memory of 2468 2188 mshta.exe 30 PID 2188 wrote to memory of 2468 2188 mshta.exe 30 PID 2148 wrote to memory of 2772 2148 cmd.exe 33 PID 2148 wrote to memory of 2772 2148 cmd.exe 33 PID 2148 wrote to memory of 2772 2148 cmd.exe 33 PID 2148 wrote to memory of 2772 2148 cmd.exe 33 PID 2148 wrote to memory of 2380 2148 cmd.exe 37 PID 2148 wrote to memory of 2380 2148 cmd.exe 37 PID 2148 wrote to memory of 2380 2148 cmd.exe 37 PID 2148 wrote to memory of 2380 2148 cmd.exe 37 PID 2188 wrote to memory of 572 2188 mshta.exe 38 PID 2188 wrote to memory of 572 2188 mshta.exe 38 PID 2188 wrote to memory of 572 2188 mshta.exe 38 PID 2188 wrote to memory of 572 2188 mshta.exe 38 PID 2188 wrote to memory of 1164 2188 mshta.exe 40 PID 2188 wrote to memory of 1164 2188 mshta.exe 40 PID 2188 wrote to memory of 1164 2188 mshta.exe 40 PID 2188 wrote to memory of 1164 2188 mshta.exe 40 PID 2188 wrote to memory of 564 2188 mshta.exe 42 PID 2188 wrote to memory of 564 2188 mshta.exe 42 PID 2188 wrote to memory of 564 2188 mshta.exe 42 PID 2188 wrote to memory of 564 2188 mshta.exe 42 PID 2188 wrote to memory of 1324 2188 mshta.exe 48 PID 2188 wrote to memory of 1324 2188 mshta.exe 48 PID 2188 wrote to memory of 1324 2188 mshta.exe 48 PID 2188 wrote to memory of 1324 2188 mshta.exe 48 PID 2188 wrote to memory of 1680 2188 mshta.exe 49 PID 2188 wrote to memory of 1680 2188 mshta.exe 49 PID 2188 wrote to memory of 1680 2188 mshta.exe 49 PID 2188 wrote to memory of 1680 2188 mshta.exe 49 PID 1324 wrote to memory of 1932 1324 iexplore.exe 50 PID 1324 wrote to memory of 1932 1324 iexplore.exe 50 PID 1324 wrote to memory of 1932 1324 iexplore.exe 50 PID 1324 wrote to memory of 1932 1324 iexplore.exe 50 PID 1324 wrote to memory of 584 1324 iexplore.exe 52 PID 1324 wrote to memory of 584 1324 iexplore.exe 52 PID 1324 wrote to memory of 584 1324 iexplore.exe 52 PID 1324 wrote to memory of 584 1324 iexplore.exe 52 PID 1664 wrote to memory of 2916 1664 iexplore.exe 53 PID 1664 wrote to memory of 2916 1664 iexplore.exe 53 PID 1664 wrote to memory of 2916 1664 iexplore.exe 53 PID 1664 wrote to memory of 2916 1664 iexplore.exe 53 PID 2188 wrote to memory of 520 2188 mshta.exe 54 PID 2188 wrote to memory of 520 2188 mshta.exe 54 PID 2188 wrote to memory of 520 2188 mshta.exe 54 PID 2188 wrote to memory of 520 2188 mshta.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\{13610826-3503-134D-4C2C-C16FE04D06AA}\mshta.exe"C:\Users\Admin\AppData\Roaming\{13610826-3503-134D-4C2C-C16FE04D06AA}\mshta.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2468
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1164
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:537601 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:584
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1680
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:520
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "mshta.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{13610826-3503-134D-4C2C-C16FE04D06AA}\mshta.exe" > NUL3⤵PID:1696
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "mshta.exe"4⤵
- Kills process with taskkill
PID:2096
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2528
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_270b70bad151a515136f553e5bc880ac.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_270b70bad151a515136f553e5bc880ac.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2380
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2348
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD545d3807743dbb13b9cb061b39d118ba8
SHA17ca7d7e8522b999a401971fa3928b1acbd8efa24
SHA2560672cc09bd67495e96e4ef733271121afd3eecb18c1a440793622a20d23136a6
SHA5121c0dc98bf7e63d2e5e9df2ee839025c38098de578a2bb0c3c4f225c6440da246b6b43815be45c9f4ebe31069604d3ee1dab7d5d5d2cf04b57617cbc808dae391
-
Filesize
10KB
MD516f8f08e7690226839971ac2cdbc1dc9
SHA1a4700637f16074479e5c0c96029f5f4274ac1f15
SHA2569ed59a59ecb5a685054c0c1c68a28002f8afba0d6a3dc42cdef59c1e1029b51a
SHA512cfed12502c166c4f929e6d249930d4320758266054b7db3ed1e996dbd6e2f74e08931fbe030d64c5e7a4bc2e7dcad8fd2548865849ab6c08a848738805c83b3a
-
Filesize
85B
MD53e04dd65fd2f3a6e7481decd05934ef6
SHA1cebca1ad2d9c3417ed5b9c8340c4095756941044
SHA256d6537b0581a65a4c5d6cb701bb1e7ae76f65b238816d1d697a7948a86caba47a
SHA5122de5abaec04feb8a71b82787889743cff4c043286edfd18e3e6aec23a6d511679fc9833930e9bf2f52e12077661c752acc3621fe1bbd462ad4200b771b179769
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfcd1f20ca066fda2d35336bd9676139
SHA123e0212ff0968fc51375d6ba588631a0f1662a6a
SHA2569b2d913aed2f030088385eef1016424a60f0f4cad2511c052013bb2e318f8c1c
SHA512e2ad8cac951e049fc1e1944cdc45dbc6934b2afe4cefe45b64d50e345034ab3f93977c8aa2b5c1cb2fd792873e6e3402b4445e9c2263ef9ba6c00aa6517ad26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550111e0aa60f96984ef14b713cf62de2
SHA1258416479ff6ce196f4f016ab22c522f250df5e6
SHA25635fa6274e553a29d0c980c4f4e6b71b93f222cd357972a37e0564edee1edafa9
SHA5121f2e719911f582d3614f5f9a3fc1ce2ad0323138a968af5647cbe3a44d57c3feccf4254f0c33d8a047a3ff0670c929c750387e55fea142fa5a714dded29820a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8701a1333c58c428333692939893d8b
SHA1ee161ef6e8930e90e282819fe4213422780861a3
SHA25652192eb4199060cf3942d06858eed7c26c0f8f749b21695663847d8fcf5e32ae
SHA512023b7f08fdbf63c47da72ea1d6c4a551b6b156c23b673385fb951c799a67ec3f69e69445586a147e7849bddedc409aee49ef49caf9935ee1fb7726e144f23e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885fd1595fe5ddd8937a0ec743baf4bc
SHA1decbf14fd8d44fe0abf3ebdf8337a89c3079913c
SHA256a86658e0e922a90ff867bbd54859d23f67c4f3ac384ea2289d55bf60c4f3dde5
SHA512bdc73fdb5d7f02373d7bf9467b18e9065c22a55c38254fd81fbb8ee3c6653a35d8e16d47722373c051f54fd9a7c61385a05d7079a0f1abffa8f6ecb013516092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ed2307034f73a117d826b1f028b033
SHA1aecfa5ed3a904db9d0cc0f179e5ae47704a20904
SHA256bd20f19c408935551e7eba3dfa631f09280fa01bcd568cf61527168edbcc049f
SHA5124375b9eb786e220437ecf7a7e8f86d653591d62a81d2d992de3dfc9ce26a43683110d6028dfcc4b2f80669b1164e78f7092b0edca12410c03c3038934da56003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae6ffbdbffb0e8684f992d074b71a24
SHA1a33fda944cf84a9fd59b275d579e5502603f5a85
SHA256a0f0efeba1e4fb2941ebbd7eb65cce10deadcf8e5dc9dee0e59c5b79fedd36a1
SHA5125032da60060c8d03c9c2352fd2b2d11d8257b8e95d69689206156d00b3cbd0004eb913bbcc6b4b04b3be055319b716b31978f2b1a881f762abe99cd4fd6caf97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc03240d1b3ce13e3608a52312bbb55c
SHA10c393186cfaa10237239aa4df9f913e1bcb0ba92
SHA256ae2058da380aaeadfd64b7da1fdf9b9dc87e99261e77f916d75eb0b6d2ba8d34
SHA5125686b57b33ab5e08588f05054521e3791757deccb4fadc27dc5c33e9bb1e1ee2f421e42ead8bde99b07b74bb482705779db58fc214ec1d459e337c5983d7dee7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{80AE1001-24F1-11EF-8C47-FA8378BF1C4A}.dat
Filesize5KB
MD56fa1727cdb9c12f9dfbc5d78ae735a37
SHA1fb873ed38f84478f9dc21355eb537500a27857cc
SHA256c0318e4b13fe343dc9e3257667749328ee9490dfbb684926907a62c53a24b304
SHA512c30f731644a128394d40c10ab514510143e9824b6d8e852aca3cc114d03d1bc69d0de66d685de87b5a998c981266649d3ef826e1b0bf21bcc7e1f6c6bf161d0e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5774e3f25e78fcb4b3912fb318069393c
SHA1622a41e11b2f065d7162e1d46e529e38f77b916f
SHA25632f2f8949b8dd7fb5314d01e9d8399bc71f782bdeed5aa2ff97c44b30cf4c99b
SHA512eb7073f5c3f839e0301d7582759406d68432814cf259139773a0c160702830711e6d0bb3336dc9b90c619958ecadeed8c4bdd2bb11c4624231535bcbd09df526
-
Filesize
344KB
MD5270b70bad151a515136f553e5bc880ac
SHA177b7def336c7647c6faadaf7136d70ff1e9ba7fc
SHA256db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
SHA512c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f