Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
1001D2E2B398...A9.exe
windows7-x64
100B760ABF10...23.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100D0E7D8626...E5.exe
windows7-x64
100E9765528C...69.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101CB8203982...26.exe
windows7-x64
101CF69170F7...5E.exe
windows7-x64
101CFEDCBA10...0E.exe
windows7-x64
71DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
101F5FEB3211...6D.exe
windows7-x64
101FD11B5CBB...ED.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
18b04af13b7...21.exe
windows7-x64
10Analysis
-
max time kernel
1561s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 19:21
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01D2E2B398D6017D5114464E39C40E9243AE492106CCA8B2D3EB1A95F9E228A9.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
0B760ABF108DB9BF5EA14F96A53F6D8E1B36FCC28BC75114E923482157B89A23.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240705-en
Behavioral task
behavioral5
Sample
0D0E7D86268F7ACD51E9D4AC94F016034FB949B605B21405CBA0B5581E4532E5.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
0E9765528C4E8FDCFF83FA07A78F5E73B41B3D9295159C823FE3B1F97C113469.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
1CB82039822CB89811F42B2C3BDBB4256D85D66E942CD69F38D3CB123596C926.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
1CF69170F7419E097EB71B514C01D2A028C95D0605F8B91C90A2E28B3216775E.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
1CFEDCBA10B4C90789F2C4A6A1CE2C3D4197058E574942400F571BC5D06DF70E.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
1F5FEB3211A640804B3951DE9EA2037EFCB0D6EE1019D8853F98DAFD6132A76D.exe
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240704-en
General
-
Target
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
-
Size
390KB
-
MD5
08109df08fa4a035c59d56d1e6c5baf4
-
SHA1
bec86bce6f6963d0cc69c441c6d5fb6d04d3a833
-
SHA256
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338
-
SHA512
61e6cc3e94ddb7a980bfb0a2e5e5ffeeb5414c9e2ef3e42551820017dbedab5cccdd8ece1fed2ca057e240bdb7836663a7f9be28f1bb9136da972750caf59704
-
SSDEEP
12288:s8TC7FeAA9IsQwycG888888888888W88888888888E7xCYsdG:s8TygVinw1Z7xCZdG
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___3G73_.txt
cerber
http://xpcx6erilkjced3j.onion/8B23-1C09-72A9-0098-9A69
http://xpcx6erilkjced3j.19kxwa.top/8B23-1C09-72A9-0098-9A69
http://xpcx6erilkjced3j.1eht65.top/8B23-1C09-72A9-0098-9A69
http://xpcx6erilkjced3j.1t2jhk.top/8B23-1C09-72A9-0098-9A69
http://xpcx6erilkjced3j.1e6ly3.top/8B23-1C09-72A9-0098-9A69
http://xpcx6erilkjced3j.16umxg.top/8B23-1C09-72A9-0098-9A69
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2181 2840 mshta.exe 2184 2840 mshta.exe 2186 2840 mshta.exe 2188 2840 mshta.exe 2190 2840 mshta.exe -
Contacts a large (1095) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2044 netsh.exe 2060 netsh.exe -
Deletes itself 1 IoCs
pid Process 1040 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\e: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\h: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\k: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\n: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\x: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\y: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\a: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\i: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\l: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\o: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\p: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\q: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\u: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\v: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\g: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\w: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\t: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\z: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\s: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\m: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\r: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened (read-only) \??\j: 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4B2.bmp" 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\ 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\thunderbird 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files\ 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\program files (x86)\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Kills process with taskkill 1 IoCs
pid Process 1172 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2980 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1472 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe Token: SeDebugPrivilege 1172 taskkill.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2060 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 31 PID 2120 wrote to memory of 2060 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 31 PID 2120 wrote to memory of 2060 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 31 PID 2120 wrote to memory of 2060 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 31 PID 2120 wrote to memory of 2044 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 33 PID 2120 wrote to memory of 2044 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 33 PID 2120 wrote to memory of 2044 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 33 PID 2120 wrote to memory of 2044 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 33 PID 2120 wrote to memory of 2840 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 36 PID 2120 wrote to memory of 2840 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 36 PID 2120 wrote to memory of 2840 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 36 PID 2120 wrote to memory of 2840 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 36 PID 2120 wrote to memory of 2980 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 37 PID 2120 wrote to memory of 2980 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 37 PID 2120 wrote to memory of 2980 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 37 PID 2120 wrote to memory of 2980 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 37 PID 2120 wrote to memory of 1040 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 38 PID 2120 wrote to memory of 1040 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 38 PID 2120 wrote to memory of 1040 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 38 PID 2120 wrote to memory of 1040 2120 3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe 38 PID 1040 wrote to memory of 1172 1040 cmd.exe 40 PID 1040 wrote to memory of 1172 1040 cmd.exe 40 PID 1040 wrote to memory of 1172 1040 cmd.exe 40 PID 1040 wrote to memory of 1172 1040 cmd.exe 40 PID 1040 wrote to memory of 1472 1040 cmd.exe 42 PID 1040 wrote to memory of 1472 1040 cmd.exe 42 PID 1040 wrote to memory of 1472 1040 cmd.exe 42 PID 1040 wrote to memory of 1472 1040 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe"C:\Users\Admin\AppData\Local\Temp\3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2060
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2044
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___S4H6RHX_.hta"2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2840
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___3G73_.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe" > NUL && exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1472
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD55c21728c3c8804e4453037f0abec1cef
SHA14b48a0518ea37419dd12a9e93c6ec2a0064dac99
SHA256d39a22d50d660d16502aaf0fa31ba493be6960a4054cb7e519c06b4b02ed368b
SHA512c14879ef6702b528886c0beda6939fd71d3035ae4b06d732fb10bf865ed1ea40361c48571d2684af76fc708eb28ab8d9b764c374ab6d9261c37cee7e2cf5a75b
-
Filesize
76KB
MD5c383444bed9eb5bd7a2f54209bc955c0
SHA191d8c59c8ce69286dc02850043ac1e9dd619f38e
SHA256b996706ee81075c2b340c92b1d41b94def8da759608d7d9bf206af7f52419248
SHA512d346218855a86e71a9ce55a5c5175ee5a441e7c58883678c91fba95611aeee9f798640fdcb8aa294fcc6a79485b9e0d67b5735ed125c5d45c41d22fc3b5189e9