Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240709-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/EEE6-2044-993D-029E-DB48
http://cerberhhyed5frqa.qor499.top/EEE6-2044-993D-029E-DB48
http://cerberhhyed5frqa.gkfit9.win/EEE6-2044-993D-029E-DB48
http://cerberhhyed5frqa.305iot.win/EEE6-2044-993D-029E-DB48
http://cerberhhyed5frqa.dkrti5.win/EEE6-2044-993D-029E-DB48
http://cerberhhyed5frqa.onion/EEE6-2044-993D-029E-DB48
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" Magnify.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation Magnify.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\Magnify.lnk Magnify.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\Magnify.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Executes dropped EXE 3 IoCs
pid Process 2944 Magnify.exe 4040 Magnify.exe 1080 Magnify.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" Magnify.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" Magnify.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Magnify = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpFA3A.bmp" Magnify.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3596 taskkill.exe 6076 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\Desktop Magnify.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\\Magnify.exe\"" Magnify.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Local Settings Magnify.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3632 PING.EXE 6128 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe 2944 Magnify.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 2944 Magnify.exe Token: SeDebugPrivilege 3596 taskkill.exe Token: SeDebugPrivilege 4040 Magnify.exe Token: SeDebugPrivilege 1080 Magnify.exe Token: 33 3936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3936 AUDIODG.EXE Token: SeDebugPrivilege 6076 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 2944 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 87 PID 848 wrote to memory of 2944 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 87 PID 848 wrote to memory of 2944 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 87 PID 848 wrote to memory of 2964 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 88 PID 848 wrote to memory of 2964 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 88 PID 848 wrote to memory of 2964 848 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 88 PID 2964 wrote to memory of 3596 2964 cmd.exe 90 PID 2964 wrote to memory of 3596 2964 cmd.exe 90 PID 2964 wrote to memory of 3596 2964 cmd.exe 90 PID 2964 wrote to memory of 3632 2964 cmd.exe 92 PID 2964 wrote to memory of 3632 2964 cmd.exe 92 PID 2964 wrote to memory of 3632 2964 cmd.exe 92 PID 2944 wrote to memory of 4992 2944 Magnify.exe 105 PID 2944 wrote to memory of 4992 2944 Magnify.exe 105 PID 4992 wrote to memory of 2936 4992 msedge.exe 106 PID 4992 wrote to memory of 2936 4992 msedge.exe 106 PID 2944 wrote to memory of 4624 2944 Magnify.exe 107 PID 2944 wrote to memory of 4624 2944 Magnify.exe 107 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 4672 4992 msedge.exe 108 PID 4992 wrote to memory of 3008 4992 msedge.exe 109 PID 4992 wrote to memory of 3008 4992 msedge.exe 109 PID 4992 wrote to memory of 3004 4992 msedge.exe 111 PID 4992 wrote to memory of 3004 4992 msedge.exe 111 PID 4992 wrote to memory of 3004 4992 msedge.exe 111 PID 4992 wrote to memory of 3004 4992 msedge.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exe"C:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa7ebb46f8,0x7ffa7ebb4708,0x7ffa7ebb47184⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:24⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:34⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:84⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:14⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:14⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:14⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:14⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:84⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:84⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:14⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:14⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:14⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:14⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10744716849838989442,2079169092136286962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:14⤵PID:5412
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/EEE6-2044-993D-029E-DB483⤵PID:4620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffa7ebb46f8,0x7ffa7ebb4708,0x7ffa7ebb47184⤵PID:2828
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2760
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "Magnify.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exe" > NUL3⤵PID:6020
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "Magnify.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:6128
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:3632
-
-
-
C:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exeC:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
C:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exeC:\Users\Admin\AppData\Roaming\{57F307D7-0270-EBDD-6B86-03BD4E80AAC0}\Magnify.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c0 0x3841⤵
- Suspicious use of AdjustPrivilegeToken
PID:3936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Accessibility Features
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD504d7c09a7555e687c5af654942d41815
SHA18291d5af82603ae9f1a1f54065a4169d83b419fa
SHA2560b148b9b48a177d1452faddb8b27298282a5e0c03e905ef19d69e8f4c89c68c9
SHA512b00c6844b9d2ef49280cd9fc3bafa3893519ed9b08e818e61295bc41c136db3cd12188f8b451059c8443fee4514286e93475ca00b0e9a26fd816160782124dd1
-
Filesize
10KB
MD5db02a1c51273bccc3933c00f5e901105
SHA17565c95cc624b1b68fdf78a9de735bbf96f03ec6
SHA256bb9440afa942237275b7a7aabd365190e73118fd7d7589f7fbdb144cb11bff1f
SHA5123e7ec6863296af7236f3124322d7e9db0e78abe9345fcfef993bb988706a59225d2d9303b0eadeb524300d668521df820ad43cc7bb1dc8e60d9895ddcb7f1ff2
-
Filesize
85B
MD517c613b86af403d8a06f4ed7b6e8bf83
SHA1bf6de75424c734b898fde40e853ae63a6ecd117c
SHA256b62258f5abb37c5fd7d65f7ca886e19209965c3c563a27a5bdc62f7f4283db65
SHA512da17062ba16cd19a267df92c1aeacef492a8287d12b255714ec3571f802a52bead47b57fcded2b2827ba16691cacdfc0d625cb65186a304ea85c1d68434ffaa4
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
5KB
MD5f990aa7164a6e7d6b9271f9788a865b0
SHA1d909ad73b2fb8af7657def22c831af4f8c9ef528
SHA2562e04a71bb5517054ab97f28036b99313ea64a384cc1e8dfb9515dc66e3837ceb
SHA5122af39c96e99526110f9a66832f76a14319311f973eea8a3fb346b2cb2ac784de427124637e5d522b47ce9211853c4bd13f439601cadb06b868f7de1de3fa7c16
-
Filesize
6KB
MD5e3a822498c3bde40cbf30a7139b1fb95
SHA1135e95052fe3e6c9d278dbb2de8b9e1ad3a1053e
SHA2562200c1ca6f18b6734e0b967706462a81cad97dea0afae624a1b338f116c739c5
SHA512845790881a576caeac9bbf124506e02c76e836863c726f3f50300db6a39caab9e3aa693a37b113ebdd3c3313bd415744bd10ceaa3f8aef875f812ef574f61181
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5950400ed61905d44e8598eaae83cef48
SHA1b6531fda623a0ee408e9c3c442362ec6b9ecad53
SHA256c389f12c0ff20c91e474fb107c9a233df63bfdb51f4a8845e209c255ff968328
SHA512f5a88cec81f3559bd3e85ca812363e9d10838c841e83c80a25e3403f51d96e02616067081b390644220b805b6d9e8f350f25f9ac2d4bdf66ec8a0f004ee51675
-
Filesize
1KB
MD57ba80afdea0d3b96a501f2e720bfe75c
SHA155f55b5323760da9efc1f319a3aa0c7e03a2f040
SHA25699439daec5d070944f5484585af641cade1d4877cb629007d5cda4b0483bf5b6
SHA512547f3b7747a3b146701da7dfeba6c976b681a2f7187d997d6c2234f6e4143fb10c828b9e52c549f9a234beb97ec21503840a051fb07221c0a74bb24d9ea831d4
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684