Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
09-07-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
cerber.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
cryptowall.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
jigsaw.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Locky.exe
Resource
win10-20240404-en
General
-
Target
cerber.exe
-
Size
604KB
-
MD5
8b6bc16fd137c09a08b02bbe1bb7d670
-
SHA1
c69a0f6c6f809c01db92ca658fcf1b643391a2b7
-
SHA256
e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
-
SHA512
b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
SSDEEP
6144:yYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsR:yYKlYmDXEpDHRXP01
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___B0B7M_.txt
cerber
http://p27dokhpz2n7nvgr.onion/D446-11A7-E2B4-0446-9FA6
http://p27dokhpz2n7nvgr.12hygy.top/D446-11A7-E2B4-0446-9FA6
http://p27dokhpz2n7nvgr.14ewqv.top/D446-11A7-E2B4-0446-9FA6
http://p27dokhpz2n7nvgr.14vvrc.top/D446-11A7-E2B4-0446-9FA6
http://p27dokhpz2n7nvgr.129p1t.top/D446-11A7-E2B4-0446-9FA6
http://p27dokhpz2n7nvgr.1apgrn.top/D446-11A7-E2B4-0446-9FA6
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___9RS16_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (1094) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3244 netsh.exe 5080 netsh.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ cerber.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp23BF.bmp" cerber.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook cerber.exe File opened for modification \??\c:\program files (x86)\thunderbird cerber.exe File opened for modification \??\c:\program files (x86)\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft sql server cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\onenote cerber.exe File opened for modification \??\c:\program files (x86)\powerpoint cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\office cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote cerber.exe File opened for modification \??\c:\program files (x86)\outlook cerber.exe File opened for modification \??\c:\program files (x86)\word cerber.exe File opened for modification \??\c:\program files (x86)\bitcoin cerber.exe File opened for modification \??\c:\program files (x86)\office cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\excel cerber.exe File opened for modification \??\c:\program files (x86)\microsoft\word cerber.exe File opened for modification \??\c:\program files (x86)\steam cerber.exe File opened for modification \??\c:\program files (x86)\the bat! cerber.exe File opened for modification \??\c:\program files\ cerber.exe File opened for modification \??\c:\program files (x86)\ cerber.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents cerber.exe File opened for modification \??\c:\windows\ cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote cerber.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote cerber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Kills process with taskkill 1 IoCs
pid Process 3016 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings cerber.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3536 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4868 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 5112 cerber.exe Token: SeCreatePagefilePrivilege 5112 cerber.exe Token: SeDebugPrivilege 3016 taskkill.exe Token: SeDebugPrivilege 4184 taskmgr.exe Token: SeSystemProfilePrivilege 4184 taskmgr.exe Token: SeCreateGlobalPrivilege 4184 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe 4184 taskmgr.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3244 5112 cerber.exe 71 PID 5112 wrote to memory of 3244 5112 cerber.exe 71 PID 5112 wrote to memory of 3244 5112 cerber.exe 71 PID 5112 wrote to memory of 5080 5112 cerber.exe 73 PID 5112 wrote to memory of 5080 5112 cerber.exe 73 PID 5112 wrote to memory of 5080 5112 cerber.exe 73 PID 5112 wrote to memory of 4832 5112 cerber.exe 75 PID 5112 wrote to memory of 4832 5112 cerber.exe 75 PID 5112 wrote to memory of 4832 5112 cerber.exe 75 PID 5112 wrote to memory of 3536 5112 cerber.exe 76 PID 5112 wrote to memory of 3536 5112 cerber.exe 76 PID 5112 wrote to memory of 3536 5112 cerber.exe 76 PID 5112 wrote to memory of 1364 5112 cerber.exe 78 PID 5112 wrote to memory of 1364 5112 cerber.exe 78 PID 5112 wrote to memory of 1364 5112 cerber.exe 78 PID 1364 wrote to memory of 3016 1364 cmd.exe 80 PID 1364 wrote to memory of 3016 1364 cmd.exe 80 PID 1364 wrote to memory of 3016 1364 cmd.exe 80 PID 1364 wrote to memory of 4868 1364 cmd.exe 82 PID 1364 wrote to memory of 4868 1364 cmd.exe 82 PID 1364 wrote to memory of 4868 1364 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cerber.exe"C:\Users\Admin\AppData\Local\Temp\cerber.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3244
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5080
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___S66DZB_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:4832
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___8OBEHA_.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "cerber.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:4868
-
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\f685bf1d92f143acbd3275949b7c63db /t 2884 /p 48321⤵PID:4516
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4184
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e607c04be7caf036a5def6902bfb2b93
SHA159a564fa30f60d6c55a7742ce30708213ce75d9b
SHA25607c0d1754eac2add2f6de85f0bb956970055048b27e76c7bc0c827d2dedff08e
SHA51261df0eacf5951dd108e6cbb8b5394b53bab067fdf241838758099a3c5521b7240a849684baf16ad3a5c2c885a64fc07aa37709b72cf03ed0272ab2fcae9fd39d
-
Filesize
75KB
MD5fff61627be0d33b76c53561a8287cf90
SHA1e8dddf1bdfe5fdaec1db7996dec6d568c1bd662a
SHA256e06b98119a6e0655c411a5504145da6b69191a115d1f0e0bda15d0ceb806e98b
SHA5125135938fe8d88b6d0823a4836c15b147175bbc66713285b882e17453b9de13e2a52cb53e8fdfb89f1fef0df36881b9d1b331a55e50c30c7b795789201e071182