Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://193.117.208.109
Resource
win10v2004-20240709-en
General
-
Target
http://193.117.208.109
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF
http://cerberhhyed5frqa.onion.cab/B65A-6FB4-F9F6-0000-07EF
http://cerberhhyed5frqa.onion.nu/B65A-6FB4-F9F6-0000-07EF
http://cerberhhyed5frqa.onion.link/B65A-6FB4-F9F6-0000-07EF
http://cerberhhyed5frqa.tor2web.org/B65A-6FB4-F9F6-0000-07EF
http://cerberhhyed5frqa.onion/B65A-6FB4-F9F6-0000-07EF
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16408) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" GamePanel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" Cerber_7 (1).exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation GamePanel.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\GamePanel.lnk Cerber_7 (1).exe -
Executes dropped EXE 4 IoCs
pid Process 1868 Cerber_7 (1).exe 4092 GamePanel.exe 5132 GamePanel.exe 3568 GamePanel.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" Cerber_7 (1).exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" Cerber_7 (1).exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" GamePanel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GamePanel = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" GamePanel.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE100.bmp" GamePanel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 1668 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" GamePanel.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\Desktop Cerber_7 (1).exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\\GamePanel.exe\"" Cerber_7 (1).exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\Desktop GamePanel.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings GamePanel.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 265109.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 584061.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe\:SmartScreen:$DATA Cerber_7 (1).exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3840 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 3144 msedge.exe 3144 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 1920 msedge.exe 1920 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe 4092 GamePanel.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1868 Cerber_7 (1).exe Token: SeDebugPrivilege 4092 GamePanel.exe Token: SeDebugPrivilege 1668 taskkill.exe Token: SeDebugPrivilege 5132 GamePanel.exe Token: SeDebugPrivilege 3568 GamePanel.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2748 3144 msedge.exe 84 PID 3144 wrote to memory of 2748 3144 msedge.exe 84 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 1064 3144 msedge.exe 85 PID 3144 wrote to memory of 4788 3144 msedge.exe 86 PID 3144 wrote to memory of 4788 3144 msedge.exe 86 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87 PID 3144 wrote to memory of 1032 3144 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://193.117.208.1091⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb24047182⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4048 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6480 /prefetch:82⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4764
-
-
C:\Users\Admin\Downloads\Cerber_7 (1).exe"C:\Users\Admin\Downloads\Cerber_7 (1).exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Modifies Control Panel
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe"C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe"3⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html4⤵PID:2528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb24047185⤵PID:392
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt4⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF4⤵PID:1132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb24047185⤵PID:1292
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"4⤵PID:468
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Cerber_7 (1).exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Downloads\Cerber_7 (1).exe" > NUL3⤵PID:2204
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Cerber_7 (1).exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:3840
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:12⤵PID:4004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exeC:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exeC:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc 0x33c1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD55cbf3277a7ca55810504384f314a005a
SHA17b5331630634e1e2a7e8b161195bf6e83def6eee
SHA2561b2e0e3f79188816ad8e6c54ffc072df5d24d8c7141c4df9636d07aad96ca8c8
SHA51230b815e1a9f3e5a41e96e27ca6c8c65ce634c51fbd9d0441e1f90fce473ce42ae13022b61aa0a061dbd6e12c02c7f59c1520643ba429c7af64499e43020e4207
-
Filesize
6KB
MD529fcc3b086d49fe198c26e900ec6ee2d
SHA1889a92e45975b0b7148534ad637f3cef75f23056
SHA25639b1715cd01d68b1db0062b938bf5bfd7c38b9b97917eed8f7bbac157d13c72b
SHA512920939de08eb9c8317ae60ab454b5667b602bcd422bd623b462005f5e9d8c194fa0588a4750ffbc34fe48754bb1d88c31a9a223d8b9c66deab0807b9b7e7c87d
-
Filesize
6KB
MD53a93e65ef272e6982206007d4c4fc491
SHA195d591d501ff8cdebdad94fa3d61ad3e815c8ee1
SHA2562ac6e16c19e23afc18c3dcae945754213f93f75e736fbe193cb720261af3f0d7
SHA512e0d6adfda1a6f846e24f163f8efd59e55553f33086aa0ea695bf9a183eff1b50b429a49e3a356d175636a6440bb682c9a99009bbcddcdccfc14ef9e1bbea245d
-
Filesize
6KB
MD5ab5a7c7532b93c50387c45fa4363a662
SHA19e7942e22bc4584c37d536014d74be97c935d004
SHA2567d28b91f8ffb925f53a450624a525bdc33dc4de029abf0f85e9a029890306e8f
SHA512579c28e31b11b027260125e9d77109fac7f7a7a7d59a5e08274ad18875e9eedfd2fd6bceadb47eb31453391855e64669b88ab6b7a12e9c3dfac4a1a1ef30dab5
-
Filesize
6KB
MD5fc2be03b4110c970dfbc73c94c251f18
SHA10f00edbc40cb94a5fe919e77be60af18731bccf8
SHA25621c06bdc8ee9855ee6afd0d8fec726f2ac89a8ae415da5247d3a6ee262768d8a
SHA512bba1398af002fb201953a297821452ff8fa3a819ac8b649ab244998a08f0fd123acb9807543f4297c7d3bffc83a09d6246f0dfba1c0beb4797056c5f25e453d3
-
Filesize
6KB
MD5c94f1ccd6ffe7b5cf2a859f35bac5801
SHA196ad1d5d792721fbd88a900f39d23a5036ff9f93
SHA25687521db49b33dde9ae8dbd91a5056e97e57de1aff28c897b4e9dee4a2aee0ce4
SHA51287c31e1da5382a28cffdbb1344fb398f3a7a9b95451a8a61ece1f0ccc10e2f93d1fe42f6b9fc8bc5124d4629df96794a2fde4c9a30d22de6b3ca41865b6e6a77
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50ed5338e905646bba95f3b540109bb23
SHA19287d5b5cd181e7b84a6a30305f747b4a017c928
SHA256069ec1f6fcf04248c0d87d105f77a2a40e70c8ee84e9492a81e7f0eb7e48c17a
SHA5123def19e7cd8f790eaff8048d7c515b40a5501f0843d287f41c9d1c93f732425caf1216bd960533d069b74eb2ad9a6896c38c1ff7c7c088da1c1e29502b624fcc
-
Filesize
11KB
MD5aba0edb3cc2e66f93a4a09b240c90617
SHA1085724e7155a8c4bf0f5b4b51e2c06a16f712fcb
SHA256902cbfd376e64a8ac2a2a98887b5c8c29726c70aace3d8af49840c50863c774c
SHA512271f44fd0d8e3f6d9f8a23bd30baa1633a2c78c66b333b06e408ec4de778254337a329ec173cea9f7e74cf4839b0ce449cdf257309f616b11bc2b0b20eede68b
-
Filesize
1KB
MD5ae061d461d65e831d55a12a76aed4ce7
SHA1eedbc52f96e9ae7992307d5c690f5a5e99900fd4
SHA25627ce12bda6e9238c7ed909a30409011afc2c7bc707278bb77ed7b0f5d88f036f
SHA512ad3af646135fba987c7007975bdbb4d4edb7d60e40bd0c45fbf7dbb22b620c8963a61d11d9cd9fc14d9512aa2391491ad7eaaee7d6a35a1041c019f5feedc8c5
-
Filesize
193KB
MD5bd25986b516c1aaddff41235af6527fc
SHA13a786c703627216d6fd5669c50564978dfbea142
SHA25602ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6
SHA512733ce84cc4b8a7fcdb6c0f817888a5dc0962e108892651f30d7e5e12afdd06c87954fe4ae21fa3339d12901a5bd40110670d0b3a86b53985d7500774a32b0fce
-
Filesize
12KB
MD5248a408bf772b71f8054b7b730ebd7c1
SHA19577028a34a7fdc3637fd0dc046dcedbd5bbcc36
SHA256b80c89dc9ee72b8f8f71084fcf83e759e73e4e747101e979e0144f37cea4675c
SHA512aff0f2f95c65d7d9fb26dd0143682efd19c588c9073919c76ad4da93478048008c415cf88bb3ceb0a21e0e2fa8253b7af83453ff688246c37446e0a7ddf14608
-
Filesize
10KB
MD51728631a8bf74a8a0788048ba16bf88f
SHA1cd9e79acf0b6434941cb6de1db136182fc47b313
SHA25677344bf248997586c8c9a457c2ecbd48b875250971cf14dd6afc04adb1c8b1cc
SHA51258420f3fdc208c7a3672f635c60f098e7c2023a730690d35a953961824e2c26c78265c6b85474b89806bcb0f411bc2b23e645e0dd613f53d803aa65bbf6f8636
-
Filesize
83B
MD586d62371492ea63ec014a274d5fb9aa7
SHA187c138637b04e274f5eb48cc609889f39feadd13
SHA2566afc6c71b85ae7c089eccd2b3de63575df079137ce1a468f6c54d18ba0750f0e
SHA512199f932a915e07722676b8a1d7eb1d1fa36ccc9d9f659423c7380d20b13278005f0a6c0cfc7ca555ae797acfa3c0cab02171a9a0c675d38bd0e98aa84bb44532
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f