Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
-
Size
382KB
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
SSDEEP
6144:n0Ly6qr9+br6u1yvZgQHhEaBTuPwyQ9Hmdy1MsZ:nxF9FZhH+aBaPUGY1M+
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/59FA-CEA1-0DDD-0078-140A
http://4kqd3hmqgptupi3p.we34re.top/59FA-CEA1-0DDD-0078-140A
http://4kqd3hmqgptupi3p.5kti58.top/59FA-CEA1-0DDD-0078-140A
http://4kqd3hmqgptupi3p.vmckfi.top/59FA-CEA1-0DDD-0078-140A
http://4kqd3hmqgptupi3p.onion.to/59FA-CEA1-0DDD-0078-140A
http://4kqd3hmqgptupi3p.onion/59FA-CEA1-0DDD-0078-140A
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" DWWIN.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation DWWIN.EXE -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\DWWIN.lnk VirusShare_41dd108ada487cb93a6e099e074f605b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\DWWIN.lnk DWWIN.EXE -
Executes dropped EXE 3 IoCs
pid Process 4008 DWWIN.EXE 4380 DWWIN.EXE 848 DWWIN.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DWWIN = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\DWWIN = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DWWIN = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" DWWIN.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\DWWIN = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" DWWIN.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpDEE2.bmp" DWWIN.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4548 taskkill.exe 2560 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop VirusShare_41dd108ada487cb93a6e099e074f605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" VirusShare_41dd108ada487cb93a6e099e074f605b.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop DWWIN.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\DWWIN.EXE\"" DWWIN.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings DWWIN.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4920 PING.EXE 4860 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE 4008 DWWIN.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 4008 DWWIN.EXE Token: SeDebugPrivilege 4380 DWWIN.EXE Token: 33 4264 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4264 AUDIODG.EXE Token: SeDebugPrivilege 848 DWWIN.EXE Token: SeDebugPrivilege 4548 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 4008 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 86 PID 812 wrote to memory of 4008 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 86 PID 812 wrote to memory of 4008 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 86 PID 812 wrote to memory of 3716 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 87 PID 812 wrote to memory of 3716 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 87 PID 812 wrote to memory of 3716 812 VirusShare_41dd108ada487cb93a6e099e074f605b.exe 87 PID 3716 wrote to memory of 2560 3716 cmd.exe 89 PID 3716 wrote to memory of 2560 3716 cmd.exe 89 PID 3716 wrote to memory of 2560 3716 cmd.exe 89 PID 3716 wrote to memory of 4920 3716 cmd.exe 91 PID 3716 wrote to memory of 4920 3716 cmd.exe 91 PID 3716 wrote to memory of 4920 3716 cmd.exe 91 PID 4008 wrote to memory of 1792 4008 DWWIN.EXE 100 PID 4008 wrote to memory of 1792 4008 DWWIN.EXE 100 PID 1792 wrote to memory of 4056 1792 msedge.exe 101 PID 1792 wrote to memory of 4056 1792 msedge.exe 101 PID 4008 wrote to memory of 1812 4008 DWWIN.EXE 102 PID 4008 wrote to memory of 1812 4008 DWWIN.EXE 102 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1420 1792 msedge.exe 103 PID 1792 wrote to memory of 1660 1792 msedge.exe 104 PID 1792 wrote to memory of 1660 1792 msedge.exe 104 PID 1792 wrote to memory of 2252 1792 msedge.exe 105 PID 1792 wrote to memory of 2252 1792 msedge.exe 105 PID 1792 wrote to memory of 2252 1792 msedge.exe 105 PID 1792 wrote to memory of 2252 1792 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXE"C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXE"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6af646f8,0x7ffa6af64708,0x7ffa6af647184⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:24⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:34⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:84⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:14⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:14⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:14⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:14⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:14⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:84⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:84⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:14⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:14⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:14⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:14⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1624206502214626110,8329638357552036644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1900 /prefetch:14⤵PID:1980
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://4kqd3hmqgptupi3p.wins4n.win/59FA-CEA1-0DDD-0078-140A3⤵PID:716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6af646f8,0x7ffa6af64708,0x7ffa6af647184⤵PID:3288
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3776
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "DWWIN.EXE" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXE" > NUL3⤵PID:3280
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "DWWIN.EXE"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_41dd108ada487cb93a6e099e074f605b.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_41dd108ada487cb93a6e099e074f605b.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_41dd108ada487cb93a6e099e074f605b.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:4920
-
-
-
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXEC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXE1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1320
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4cc 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXEC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\DWWIN.EXE1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
5KB
MD5a344357f9382739b7561c811537cd491
SHA122ac853548a3260996364a42ff4b7c8811d0b905
SHA256c35e2b0648d8f0e72898bf1f710a546dffd70850568a946617eddb33243086e0
SHA5127fe20852629b01408b2859c8733c8bbc0bdf938ddecf3b0a70927f87df4581c0e68ccc91f4b30a292ccea45c764f5003dab84bdab33f8e82ba633b0374b0e6a0
-
Filesize
6KB
MD596df809861d3f7804755bb6c39742b95
SHA13b54f915fd4c3ffac2d9133663d38dca14be53af
SHA2564a2709ec0b8293af00935ef4a65e202d5b67a52846384f96d0915a87ce236ec1
SHA512378aa9a15c14aeb8d577f5ba9720a8d54aee0fdf8d44713c0a0a885bf318dcebd481c0a9b779aa09c7c14bd3596d28208085b6d7d73ba904d8eaf816b6747b19
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD50d9762d52a0c7fd452c2f9de64294750
SHA17f8fa42ba2e0115d2550c8059844be6052973dc0
SHA2568fe332ebe8353ffcce86083cd238892769b3a918e99bb577267a57066f7e94b9
SHA512a97e84a95c5dae7bd0e025292e1f09fceebc0bd58328a98e05780f5502a6807327b8c9832d53c88b93e3df450c74cc7128e0bae119b7d255b3613cb3e6973f5d
-
Filesize
1KB
MD5c493118e7c7b2ffda25847dd740adf04
SHA151dc135a7cbf54edd2891d36782038dfe5d586e2
SHA256743d6c19edbc6b0b4e4eeb405d19ae7aca9999ef13931e4cc26c392f149b333a
SHA51217779d2a6dc7d1238dead178175a62a3674bf74eb53131f31508bb9d6eb1ec9d370a8a032de965dc72252d437edcc4859a5a951149b0684fa91050017c3f1e4e
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Filesize
12KB
MD5232bc031950013cc30ee807c1d54e19b
SHA17c8c726723e5f2c8cd22f89b6488279a1d6d51b0
SHA25692d93983f93017f9bb04912bac61196ab6903a9bec4d978fcbf24e8f9ac61662
SHA51291982efa7bc867527f3997dd2ac09cad837a689fe93fe8d1fa696a931b13f875016a53a5db48bb46ff06cd4812981fb5b94acb880c8dcc7cbd224bc40f8a0ead
-
Filesize
10KB
MD5d495327c9fc56a99c0f06d6aaea9207b
SHA12424858ed6d87d757e720acbe22ad1040cc3ed93
SHA256a83cfd266282f24ef63ebd9e4b98e398341fe7a64a18f966506fef8daca8f003
SHA51287040f787b4eec7a1b77cd87adc6bd5d2ec707b6e58f2093bd915be60352c9722b38945b290defd985b0076f279ae805fbef51b03e118f374820cceeb8f2ba4e
-
Filesize
85B
MD5c5839d00092f96a4fc944dda005991ca
SHA11ed093d244eeba0eb9b9600404e4324eaa094a54
SHA2562eed9a9f397a0a3285436d428783759499a9a02316a840a330834b12607e76e2
SHA512d0ca87106294f7e2fd85496e64431f35be5a6999e218a4fc7bceffafb43485eb60f90e982814954961a5ce056eb8389959e241e7e6540892faa2d2520f425045
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f