Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe
-
Size
262KB
-
MD5
aed7120328d1178bb11ae8a029fc6854
-
SHA1
a81d2fce8c1f7dcefde149f0ed53f36e9af6f062
-
SHA256
0167b5509d7491f76be962a85b4b2638aac06a4cef0fc3dbff155a63dc058d25
-
SHA512
9eef5728d823a12bc63010b64f6fb4c63bc144fd480d38547a93d48fa7e7d828f36537d21cab4a724f5caf810767b9d2b14c1abda0407d634cde01bb49a12f19
-
SSDEEP
6144:yeuqqTPZEnjdVF1pTsF1lVVBsVEiMTJeIBjFWLXx/:yEqTPKd71i6W4IBgLXl
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.sims6n.win/B5B1-9D1B-32CD-0044-3ADF
http://cerberhhyed5frqa.m5gid4.win/B5B1-9D1B-32CD-0044-3ADF
http://cerberhhyed5frqa.wewiso.win/B5B1-9D1B-32CD-0044-3ADF
http://cerberhhyed5frqa.moneu5.win/B5B1-9D1B-32CD-0044-3ADF
http://cerberhhyed5frqa.wins4n.win/B5B1-9D1B-32CD-0044-3ADF
http://cerberhhyed5frqa.onion/B5B1-9D1B-32CD-0044-3ADF
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16386) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" WerFault.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WerFault.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\WerFault.lnk aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\WerFault.lnk WerFault.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WerFault = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WerFault = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" WerFault.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WerFault = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" WerFault.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WerFault = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io 8 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3CF.bmp" WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1576 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 5024 taskkill.exe 2764 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop WerFault.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{5B76921C-F710-0C00-7C90-036FED3C4413}\\WerFault.exe\"" WerFault.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings WerFault.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4412 PING.EXE 2052 PING.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 4216 msedge.exe 4216 msedge.exe 4140 msedge.exe 4140 msedge.exe 2684 msedge.exe 2684 msedge.exe 2160 identity_helper.exe 2160 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Token: SeDebugPrivilege 5024 taskkill.exe Token: SeDebugPrivilege 1604 WerFault.exe Token: SeBackupPrivilege 5060 vssvc.exe Token: SeRestorePrivilege 5060 vssvc.exe Token: SeAuditPrivilege 5060 vssvc.exe Token: SeIncreaseQuotaPrivilege 5612 wmic.exe Token: SeSecurityPrivilege 5612 wmic.exe Token: SeTakeOwnershipPrivilege 5612 wmic.exe Token: SeLoadDriverPrivilege 5612 wmic.exe Token: SeSystemProfilePrivilege 5612 wmic.exe Token: SeSystemtimePrivilege 5612 wmic.exe Token: SeProfSingleProcessPrivilege 5612 wmic.exe Token: SeIncBasePriorityPrivilege 5612 wmic.exe Token: SeCreatePagefilePrivilege 5612 wmic.exe Token: SeBackupPrivilege 5612 wmic.exe Token: SeRestorePrivilege 5612 wmic.exe Token: SeShutdownPrivilege 5612 wmic.exe Token: SeDebugPrivilege 5612 wmic.exe Token: SeSystemEnvironmentPrivilege 5612 wmic.exe Token: SeRemoteShutdownPrivilege 5612 wmic.exe Token: SeUndockPrivilege 5612 wmic.exe Token: SeManageVolumePrivilege 5612 wmic.exe Token: 33 5612 wmic.exe Token: 34 5612 wmic.exe Token: 35 5612 wmic.exe Token: 36 5612 wmic.exe Token: SeIncreaseQuotaPrivilege 5612 wmic.exe Token: SeSecurityPrivilege 5612 wmic.exe Token: SeTakeOwnershipPrivilege 5612 wmic.exe Token: SeLoadDriverPrivilege 5612 wmic.exe Token: SeSystemProfilePrivilege 5612 wmic.exe Token: SeSystemtimePrivilege 5612 wmic.exe Token: SeProfSingleProcessPrivilege 5612 wmic.exe Token: SeIncBasePriorityPrivilege 5612 wmic.exe Token: SeCreatePagefilePrivilege 5612 wmic.exe Token: SeBackupPrivilege 5612 wmic.exe Token: SeRestorePrivilege 5612 wmic.exe Token: SeShutdownPrivilege 5612 wmic.exe Token: SeDebugPrivilege 5612 wmic.exe Token: SeSystemEnvironmentPrivilege 5612 wmic.exe Token: SeRemoteShutdownPrivilege 5612 wmic.exe Token: SeUndockPrivilege 5612 wmic.exe Token: SeManageVolumePrivilege 5612 wmic.exe Token: 33 5612 wmic.exe Token: 34 5612 wmic.exe Token: 35 5612 wmic.exe Token: 36 5612 wmic.exe Token: 33 3092 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3092 AUDIODG.EXE Token: SeDebugPrivilege 2764 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1604 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 81 PID 2156 wrote to memory of 1604 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 81 PID 2156 wrote to memory of 1604 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 81 PID 2156 wrote to memory of 4896 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 82 PID 2156 wrote to memory of 4896 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 82 PID 2156 wrote to memory of 4896 2156 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 82 PID 4896 wrote to memory of 5024 4896 cmd.exe 84 PID 4896 wrote to memory of 5024 4896 cmd.exe 84 PID 4896 wrote to memory of 5024 4896 cmd.exe 84 PID 1604 wrote to memory of 1576 1604 WerFault.exe 86 PID 1604 wrote to memory of 1576 1604 WerFault.exe 86 PID 4896 wrote to memory of 4412 4896 cmd.exe 88 PID 4896 wrote to memory of 4412 4896 cmd.exe 88 PID 4896 wrote to memory of 4412 4896 cmd.exe 88 PID 1604 wrote to memory of 5612 1604 WerFault.exe 91 PID 1604 wrote to memory of 5612 1604 WerFault.exe 91 PID 1604 wrote to memory of 4140 1604 WerFault.exe 99 PID 1604 wrote to memory of 4140 1604 WerFault.exe 99 PID 4140 wrote to memory of 268 4140 msedge.exe 100 PID 4140 wrote to memory of 268 4140 msedge.exe 100 PID 1604 wrote to memory of 280 1604 WerFault.exe 101 PID 1604 wrote to memory of 280 1604 WerFault.exe 101 PID 1604 wrote to memory of 4572 1604 WerFault.exe 102 PID 1604 wrote to memory of 4572 1604 WerFault.exe 102 PID 4572 wrote to memory of 2772 4572 msedge.exe 103 PID 4572 wrote to memory of 2772 4572 msedge.exe 103 PID 1604 wrote to memory of 3120 1604 WerFault.exe 104 PID 1604 wrote to memory of 3120 1604 WerFault.exe 104 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 PID 4140 wrote to memory of 2268 4140 msedge.exe 106 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\WerFault.exe"C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\WerFault.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1576
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa036846f8,0x7ffa03684708,0x7ffa036847184⤵PID:268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:24⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:84⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:14⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:14⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:84⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:14⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:14⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:14⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:14⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:14⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:14⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12948447515572579880,9050735182296405611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:14⤵PID:776
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.sims6n.win/B5B1-9D1B-32CD-0044-3ADF3⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa036846f8,0x7ffa03684708,0x7ffa036847184⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4162436239054706880,5660514916776050269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3120
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "WerFault.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{5B76921C-F710-0C00-7C90-036FED3C4413}\WerFault.exe" > NUL3⤵PID:4996
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "WerFault.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2052
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:4412
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5644
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x3941⤵
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD54102ddb8bb2261420fbf128ffbb664ba
SHA1f7f6a1e5e76d876eebcf846b914c3169a621d72a
SHA2567bd2823aebe1e81264db8815da88742aaacfc95f7c5c71c3c03cfc89d32a76d2
SHA512a3a13acc62340c5a84e6d8e070d7cd25c499f6d462f758cd2393b4ad803ee2dd7b9a80cbedd550915476eb9100cc1254ff9a5acbef7464e7a5eb5918320bb2fd
-
Filesize
6KB
MD51173513581bef705bfa5e20989628e41
SHA1d3c62947f2cb94a9384f9852f2abc298905ae6f7
SHA25611ea61be0de14a5ae6bc7154497b646144eedaadf2e03db2c40339bf07c8540f
SHA512ae8c3c48d00e22462d39adf758e0ea75b50e501f8c4fa3a0968b200e0a6fdab2c78928ff2b04908e0b5ea022f919ed4000113895a91bceb94b86e5c0c9780879
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54b94ee36a4cb6d0b5f2078dd2d168327
SHA1588cb0cfeb070c1dc13913ae2674a7a84fc76a62
SHA256b65a0c3e3a8187696eb819003885d63cc83c10799e93e90a8d31a2a3526a294e
SHA512553f3b551bf70c0b8329ef390f483d3f65d7a97c6bf9b12406efaaa39d16df13d80bc6f2e80762920b040efab94f2778b0af29fae2bc4988e92a680e0805d565
-
Filesize
8KB
MD57742df025afcd7a7096fb865a3f85fcb
SHA157a926cb9c9af6cf9b64657377bfa2eae8aca8e5
SHA256f1ff2ec7a30e363e5e664f2d25fec24efa4b8c9d4c3ac75e32b2f2fff78b0913
SHA512cb685c6d14fa37ebc9da43a21d8ccc869718dd55fa83a5ce5299afb93d8ec31bf662924268cc8b528b34fc1cae2e30a2177b91a693351eb69dea127902682f7b
-
Filesize
12KB
MD5347efafd0b3544c09f88cc64ba2d8dd4
SHA15a278a5ccf2421f817877cf286171bc39255411a
SHA256a33e9dfec2188692a8ca9c62ed996b5d9c38e3b0d37f4ad967d7570ea7755995
SHA512ed80e58001945a9f04a94d092d020b80076fc4f03be80b026300fbda62fef5a7fb48062600367dcb49dec20343ab8fae473c6d6cbc1a3bada719dbdceee7c382
-
Filesize
10KB
MD54fa8b5c153d4bcc7a481921f406d8173
SHA135008afacd3ccce9cebd97722696916deb3bc52e
SHA256743f28ae554e207f8fa3d27260ef8fb5d155c2d28066131f3fd438296d8fd3d2
SHA51245075843ec540219b828c05a1e5d6b769aa3bf755b76bf81b5de3899c7bdfc8486c190c5addaf15d1657fee1467c8a83d828e5296ddee5a34b39a6d18a17e3cf
-
Filesize
85B
MD529249039c0fb4b526ba5aad29c11cc80
SHA1e8d2722f8f917c00d7afd0ede79e818c3a46ef29
SHA25672c5b87de502e32362246ecf5295636902ea05ad15433dcc0b6aa26e9970f2c3
SHA512b8c0b9a7a05800f5072d343f036ce89871b0a0be2c0e5665b0a4c03981f64f9f24cf0dd26a67d46c692836eabd7534ca4a617a4b5be41dcd36652d04a0f70ecb
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
1KB
MD5910112b7366cbb12fdf1fc29fa830260
SHA124de489cd4d31f0f7c8b619818f5ccf11a8c5314
SHA256e1a824a3790df859c831b455ec85b4a70d95edd46e0f661b0a5d82656c40935a
SHA5124348e521ed2cb4b4ea8d78e7aae70da43539ca86506f620fe4147e03fc091509ca565bc39e62c4eb959235cb136bc30d383d030893638d34396f3bfba4828b50
-
Filesize
262KB
MD5aed7120328d1178bb11ae8a029fc6854
SHA1a81d2fce8c1f7dcefde149f0ed53f36e9af6f062
SHA2560167b5509d7491f76be962a85b4b2638aac06a4cef0fc3dbff155a63dc058d25
SHA5129eef5728d823a12bc63010b64f6fb4c63bc144fd480d38547a93d48fa7e7d828f36537d21cab4a724f5caf810767b9d2b14c1abda0407d634cde01bb49a12f19