Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_270b70bad151a515136f553e5bc880ac.exe
-
Size
344KB
-
MD5
270b70bad151a515136f553e5bc880ac
-
SHA1
77b7def336c7647c6faadaf7136d70ff1e9ba7fc
-
SHA256
db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
-
SHA512
c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f
-
SSDEEP
3072:v5sAzvcjE+lcO3zXgKRcP66BpwwB9RStc3Yfqr:v5jvc4+lcO3zQKSPfBJXv3YM
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/6B0A-58F1-344F-0073-132C
http://cerberhhyed5frqa.45tori.win/6B0A-58F1-344F-0073-132C
http://cerberhhyed5frqa.fkr84i.win/6B0A-58F1-344F-0073-132C
http://cerberhhyed5frqa.fkri48.win/6B0A-58F1-344F-0073-132C
http://cerberhhyed5frqa.djre89.win/6B0A-58F1-344F-0073-132C
http://cerberhhyed5frqa.onion/6B0A-58F1-344F-0073-132C
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2540 bcdedit.exe 2768 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" PkgMgr.exe -
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\PkgMgr.lnk VirusShare_270b70bad151a515136f553e5bc880ac.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\PkgMgr.lnk PkgMgr.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 PkgMgr.exe -
Loads dropped DLL 3 IoCs
pid Process 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 2948 PkgMgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\PkgMgr = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\PkgMgr = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" PkgMgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\PkgMgr = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" PkgMgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\PkgMgr = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PkgMgr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3784.bmp" PkgMgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2644 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2604 taskkill.exe 1092 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" PkgMgr.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop VirusShare_270b70bad151a515136f553e5bc880ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{13610826-3503-134D-4C2C-C16FE04D06AA}\\PkgMgr.exe\"" VirusShare_270b70bad151a515136f553e5bc880ac.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop PkgMgr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f053da7b02b9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B797D841-24F5-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002ea218f16a04b249824b86ebb30b0962000000000200000000001066000000010000200000000bfb059ee1734b501e6ed95496cc3cda23706abb32fa3582b9e634cacd27b4bf000000000e8000000002000020000000cd9ec7de871edfccaa2354d0e318aeabe930339fc346e0f18246bf8849fb3e7320000000ea49c7cf29b6318d793161536fe885b067b075ca88a3ba5521fed0b49824c35d40000000a50aa306a3a454f793cb15b8d1e0ec21c8e7a0a9aa875b07ff4521f988d540a1f95120c958644786f4592eaaa10811aad720a7e4d988902d3f19b6d0196c19b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2912 PING.EXE 2204 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe 2948 PkgMgr.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe Token: SeDebugPrivilege 2948 PkgMgr.exe Token: SeBackupPrivilege 2636 vssvc.exe Token: SeRestorePrivilege 2636 vssvc.exe Token: SeAuditPrivilege 2636 vssvc.exe Token: SeDebugPrivilege 2604 taskkill.exe Token: SeIncreaseQuotaPrivilege 1348 wmic.exe Token: SeSecurityPrivilege 1348 wmic.exe Token: SeTakeOwnershipPrivilege 1348 wmic.exe Token: SeLoadDriverPrivilege 1348 wmic.exe Token: SeSystemProfilePrivilege 1348 wmic.exe Token: SeSystemtimePrivilege 1348 wmic.exe Token: SeProfSingleProcessPrivilege 1348 wmic.exe Token: SeIncBasePriorityPrivilege 1348 wmic.exe Token: SeCreatePagefilePrivilege 1348 wmic.exe Token: SeBackupPrivilege 1348 wmic.exe Token: SeRestorePrivilege 1348 wmic.exe Token: SeShutdownPrivilege 1348 wmic.exe Token: SeDebugPrivilege 1348 wmic.exe Token: SeSystemEnvironmentPrivilege 1348 wmic.exe Token: SeRemoteShutdownPrivilege 1348 wmic.exe Token: SeUndockPrivilege 1348 wmic.exe Token: SeManageVolumePrivilege 1348 wmic.exe Token: 33 1348 wmic.exe Token: 34 1348 wmic.exe Token: 35 1348 wmic.exe Token: SeIncreaseQuotaPrivilege 1348 wmic.exe Token: SeSecurityPrivilege 1348 wmic.exe Token: SeTakeOwnershipPrivilege 1348 wmic.exe Token: SeLoadDriverPrivilege 1348 wmic.exe Token: SeSystemProfilePrivilege 1348 wmic.exe Token: SeSystemtimePrivilege 1348 wmic.exe Token: SeProfSingleProcessPrivilege 1348 wmic.exe Token: SeIncBasePriorityPrivilege 1348 wmic.exe Token: SeCreatePagefilePrivilege 1348 wmic.exe Token: SeBackupPrivilege 1348 wmic.exe Token: SeRestorePrivilege 1348 wmic.exe Token: SeShutdownPrivilege 1348 wmic.exe Token: SeDebugPrivilege 1348 wmic.exe Token: SeSystemEnvironmentPrivilege 1348 wmic.exe Token: SeRemoteShutdownPrivilege 1348 wmic.exe Token: SeUndockPrivilege 1348 wmic.exe Token: SeManageVolumePrivilege 1348 wmic.exe Token: 33 1348 wmic.exe Token: 34 1348 wmic.exe Token: 35 1348 wmic.exe Token: 33 2704 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2704 AUDIODG.EXE Token: 33 2704 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2704 AUDIODG.EXE Token: SeDebugPrivilege 1092 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 2944 iexplore.exe 2944 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 2948 PkgMgr.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2948 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 2892 wrote to memory of 2948 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 2892 wrote to memory of 2948 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 2892 wrote to memory of 2948 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 28 PID 2948 wrote to memory of 2644 2948 PkgMgr.exe 30 PID 2948 wrote to memory of 2644 2948 PkgMgr.exe 30 PID 2948 wrote to memory of 2644 2948 PkgMgr.exe 30 PID 2948 wrote to memory of 2644 2948 PkgMgr.exe 30 PID 2892 wrote to memory of 2616 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 2892 wrote to memory of 2616 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 2892 wrote to memory of 2616 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 2892 wrote to memory of 2616 2892 VirusShare_270b70bad151a515136f553e5bc880ac.exe 29 PID 2616 wrote to memory of 2604 2616 cmd.exe 34 PID 2616 wrote to memory of 2604 2616 cmd.exe 34 PID 2616 wrote to memory of 2604 2616 cmd.exe 34 PID 2616 wrote to memory of 2604 2616 cmd.exe 34 PID 2616 wrote to memory of 2912 2616 cmd.exe 37 PID 2616 wrote to memory of 2912 2616 cmd.exe 37 PID 2616 wrote to memory of 2912 2616 cmd.exe 37 PID 2616 wrote to memory of 2912 2616 cmd.exe 37 PID 2948 wrote to memory of 1348 2948 PkgMgr.exe 38 PID 2948 wrote to memory of 1348 2948 PkgMgr.exe 38 PID 2948 wrote to memory of 1348 2948 PkgMgr.exe 38 PID 2948 wrote to memory of 1348 2948 PkgMgr.exe 38 PID 2948 wrote to memory of 2540 2948 PkgMgr.exe 40 PID 2948 wrote to memory of 2540 2948 PkgMgr.exe 40 PID 2948 wrote to memory of 2540 2948 PkgMgr.exe 40 PID 2948 wrote to memory of 2540 2948 PkgMgr.exe 40 PID 2948 wrote to memory of 2768 2948 PkgMgr.exe 42 PID 2948 wrote to memory of 2768 2948 PkgMgr.exe 42 PID 2948 wrote to memory of 2768 2948 PkgMgr.exe 42 PID 2948 wrote to memory of 2768 2948 PkgMgr.exe 42 PID 2948 wrote to memory of 2944 2948 PkgMgr.exe 48 PID 2948 wrote to memory of 2944 2948 PkgMgr.exe 48 PID 2948 wrote to memory of 2944 2948 PkgMgr.exe 48 PID 2948 wrote to memory of 2944 2948 PkgMgr.exe 48 PID 2948 wrote to memory of 2496 2948 PkgMgr.exe 49 PID 2948 wrote to memory of 2496 2948 PkgMgr.exe 49 PID 2948 wrote to memory of 2496 2948 PkgMgr.exe 49 PID 2948 wrote to memory of 2496 2948 PkgMgr.exe 49 PID 2944 wrote to memory of 3040 2944 iexplore.exe 50 PID 2944 wrote to memory of 3040 2944 iexplore.exe 50 PID 2944 wrote to memory of 3040 2944 iexplore.exe 50 PID 2944 wrote to memory of 3040 2944 iexplore.exe 50 PID 2944 wrote to memory of 1644 2944 iexplore.exe 51 PID 2944 wrote to memory of 1644 2944 iexplore.exe 51 PID 2944 wrote to memory of 1644 2944 iexplore.exe 51 PID 2944 wrote to memory of 1644 2944 iexplore.exe 51 PID 2948 wrote to memory of 1072 2948 PkgMgr.exe 52 PID 2948 wrote to memory of 1072 2948 PkgMgr.exe 52 PID 2948 wrote to memory of 1072 2948 PkgMgr.exe 52 PID 2948 wrote to memory of 1072 2948 PkgMgr.exe 52 PID 2948 wrote to memory of 1200 2948 PkgMgr.exe 56 PID 2948 wrote to memory of 1200 2948 PkgMgr.exe 56 PID 2948 wrote to memory of 1200 2948 PkgMgr.exe 56 PID 2948 wrote to memory of 1200 2948 PkgMgr.exe 56 PID 1200 wrote to memory of 1092 1200 cmd.exe 58 PID 1200 wrote to memory of 1092 1200 cmd.exe 58 PID 1200 wrote to memory of 1092 1200 cmd.exe 58 PID 1200 wrote to memory of 2204 1200 cmd.exe 60 PID 1200 wrote to memory of 2204 1200 cmd.exe 60 PID 1200 wrote to memory of 2204 1200 cmd.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\{13610826-3503-134D-4C2C-C16FE04D06AA}\PkgMgr.exe"C:\Users\Admin\AppData\Roaming\{13610826-3503-134D-4C2C-C16FE04D06AA}\PkgMgr.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2644
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2540
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:537601 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2496
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1072
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "PkgMgr.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{13610826-3503-134D-4C2C-C16FE04D06AA}\PkgMgr.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "PkgMgr.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2204
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_270b70bad151a515136f553e5bc880ac.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_270b70bad151a515136f553e5bc880ac.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_270b70bad151a515136f553e5bc880ac.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2912
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2572
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5401⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5090bb2fa12ab8b3b4c2d6d1c114f62bf
SHA1670e394e199845e0575788bb38f2aad10866e086
SHA2561dbc131c08bf3225c122c5d7bb431d8968243ffce3f8661b5ce4ee47c94c6a6a
SHA5128ff46bab90ac73daae9b48aac7cf68b6b4b0da63d866c5a906033014350531878954e4fbafb189cdcb8e86fbb51f470ed14e74a6026476c4d2ca569bcab77136
-
Filesize
10KB
MD53003fde73a913310389b987e80363e88
SHA1c84c9665c76b71e93d28db12da719f6696908912
SHA256af46bd0e86ac51884baa4d3080d5886d29b6434827e0a854b375602d9f8cecff
SHA51252b1fa8fc84bab90c38261f3b166b111241a7f5f58a4cecffe4d45b158541a242b0065b58747d8d4257db4bd46ce66bb42e8e910d8baaafa83cc24d25add39c8
-
Filesize
85B
MD5b1d716445a60efdfb1647940ca3e9bc2
SHA1930a4bebbbfa56edd50719d5c52c9da7bca6d294
SHA2565be73448a386119c09110d0c45af0a5209b61b4dd48940807289ae9755511250
SHA5129530ca09865b5ded1dcb143326183daf0433f18b2a7476b131180aaadf642d413aab79d64c12bd248b761e8c0813bfb073ae75a2e544017a50d7b7277e9ff081
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500fb3cfcee6ed9b3c0089a7858d86436
SHA1c6b4b78a84b8d6878fe4925e20879391bc692f22
SHA25663848d4b8f62e37e9bb89825af91317e59b8ef252b87bfabcc2f815bd1aff432
SHA5122dd609007a10ed08255c2b605db5fd29c2e233129cd3679f24979c4761a398430a972fbae7c367fa5079fc303b7a687b6a3538e55c707bd9d2057edc99b9f4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfbf91df473298f150499463020da30
SHA1adfd503ef47511fd6d9313b941e8eda181b76d8c
SHA256354d5ad1d09a893520de6d8ab078f3abee36b50f93c28471ea156b77e754eaa3
SHA512b3e7351141bf10f70aa2c06bd19050e67cf8571064a34b6c0db0a414d6ead43c09c7007b58ababa03712911a1a6beedfdc2ca44a9e9b3df9036c81ed22fd5cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569444637364cf2a8734706ac5bcfe196
SHA1d8128f919d64fe6e34365919a57d7ab57c141ed8
SHA256f84e34d0c0fc9965250bf19dce78b1a826d6d74cf4342ef61ca387a065968ae9
SHA512e9b28080f49c35241059f1dfe1cfeea506f6c62811c740dca54f61fba5739a85bb69916d74347b82eab4ad193e323f0fa7b5038b9179140e807c3cf886da3ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bcb9523ace2852e474abd86f8a1609
SHA1884ce219c018df7d7c53730119905904bc64c261
SHA256ec0341bea8155592bd3bfc9ee63ffd53665252a4364487a53595797cc78e4b93
SHA512e0ce4be0f27d68d015b04facb33cae9564fcb3557ade2ae492ca184028b828a0d3ce1d21a8c5c08260454c7e5d72599649246ef78ffc56da4d365bb0d03e8f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636150af56b5322299c774cad0946f40
SHA1c3fdc9a548a8057fe25f1447d6ab5dea89ddb896
SHA2567345020cbc257af2178806397c660b82ab9b026985711fd347c613c9321321ba
SHA5123af9ff530fb35e574e0d94929c7a13e178843f08c76e95069504016c428d21954716d3513fb2cfb51fef989c6eeece49ede71739e7e544adb34a3bd9e6e6bee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf9e5f8e61e78ae33e0711cd260b999
SHA1da34321ced57e6d1faedcaa7045fc7a2b43f75f0
SHA256571d399cad7f4fd3899d52d4dbf71a391793eb2db6e78fbfb703816227c71a17
SHA512a775272fb835b7605ef91f06310b21bf0ee5e945c13f9d0d43a2371c991701fe56698cbb6c592e3bb2a36fecfd444d83540b529bbd7e5dae6743233b77ea5f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f81a40722389ea398f7d048389b754
SHA1e4d45918c05f132d264595cb5c158a75d39f188b
SHA256def3f736d2e9d8bce6918dff9b99525cff5ab09d03eee04fff804760e1555927
SHA51202336b5ff445e9a8a99d87b09060e3247d159a213cf5bfbe25acd40df9e5779e07cf5f8c76e64eb8e53f6f2efd0269b8779bfb0d2bc35ec4915dfe305f789037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bdfdfca921ce2a9e924d028b5d252c
SHA1935244318734a87748d160473745a4e0d3e42443
SHA2566ba198c49397ae2352410a597da8bff031f4b4b4b1d9f60b3ad8b733315500e7
SHA512927a6cead33d51d465b46b7153b6eb48420f3404001a97e20ee310b871f1629ea6da2e06b000aa4cf6afebcb18472a604802e1b64ea79b4f3a203f3fb093e419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f297e2ce8a509cb253299f87f00a601c
SHA196fe11de5122f106b87adc1776a78c657db93358
SHA256f5b9927c329af6a98c2638b6d6c51cc36b45a9aaf48c2e0e1173a22de63ad9f0
SHA5129550be0e3d9b172f93f8dd7cf03dd76da291a7d811516a2f21c321c548cb9d405e2002d01aab8d200659d45ad7ce51d3a049163d822bff154c0de6d961d51b39
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD57490b21f17d8742a75ab24cb323aacd9
SHA128bbf3b5ae91e8df979450e2236a9a14be6e9aa4
SHA256b194cbfe4d912fddb7ecab6632a23f4a441cabf2471aa413405d6bbe8f9bea2c
SHA51222ce586888b6b968b0e05692cbbcdeda788497f84ac33815cf8562fb9b389de927c49414a60a3cc9485d2d4090fce86d50023a9a61d5c10503f4043224c8f836
-
Filesize
344KB
MD5270b70bad151a515136f553e5bc880ac
SHA177b7def336c7647c6faadaf7136d70ff1e9ba7fc
SHA256db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
SHA512c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f