Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240709-en
General
-
Target
VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/5B39-65D9-B073-029E-DAC6
http://cerberhhyed5frqa.qor499.top/5B39-65D9-B073-029E-DAC6
http://cerberhhyed5frqa.gkfit9.win/5B39-65D9-B073-029E-DAC6
http://cerberhhyed5frqa.305iot.win/5B39-65D9-B073-029E-DAC6
http://cerberhhyed5frqa.dkrti5.win/5B39-65D9-B073-029E-DAC6
http://cerberhhyed5frqa.onion/5B39-65D9-B073-029E-DAC6
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16401) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" instnm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation instnm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\instnm.lnk VirusShare_8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\instnm.lnk instnm.exe -
Executes dropped EXE 3 IoCs
pid Process 4244 instnm.exe 3852 instnm.exe 4804 instnm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp648C.bmp" instnm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 5572 taskkill.exe 1760 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\Desktop VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\Desktop instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B48A672C-D318-F281-1F13-6828D3C8BD54}\\instnm.exe\"" instnm.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings instnm.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2392 PING.EXE 5632 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe 4244 instnm.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 4244 instnm.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 3852 instnm.exe Token: SeDebugPrivilege 4804 instnm.exe Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE Token: SeDebugPrivilege 5572 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4244 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 87 PID 2812 wrote to memory of 4244 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 87 PID 2812 wrote to memory of 4244 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 87 PID 2812 wrote to memory of 5052 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 88 PID 2812 wrote to memory of 5052 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 88 PID 2812 wrote to memory of 5052 2812 VirusShare_8ec363843a850f67ebad036bb4d18efd.exe 88 PID 5052 wrote to memory of 1760 5052 cmd.exe 90 PID 5052 wrote to memory of 1760 5052 cmd.exe 90 PID 5052 wrote to memory of 1760 5052 cmd.exe 90 PID 5052 wrote to memory of 2392 5052 cmd.exe 92 PID 5052 wrote to memory of 2392 5052 cmd.exe 92 PID 5052 wrote to memory of 2392 5052 cmd.exe 92 PID 4244 wrote to memory of 624 4244 instnm.exe 111 PID 4244 wrote to memory of 624 4244 instnm.exe 111 PID 624 wrote to memory of 2224 624 msedge.exe 112 PID 624 wrote to memory of 2224 624 msedge.exe 112 PID 4244 wrote to memory of 1792 4244 instnm.exe 113 PID 4244 wrote to memory of 1792 4244 instnm.exe 113 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 4768 624 msedge.exe 115 PID 624 wrote to memory of 2412 624 msedge.exe 116 PID 624 wrote to memory of 2412 624 msedge.exe 116 PID 624 wrote to memory of 3532 624 msedge.exe 117 PID 624 wrote to memory of 3532 624 msedge.exe 117 PID 624 wrote to memory of 3532 624 msedge.exe 117 PID 624 wrote to memory of 3532 624 msedge.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exe"C:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe083f46f8,0x7ffe083f4708,0x7ffe083f47184⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:24⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:34⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:84⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:14⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:14⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:14⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:14⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:84⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:84⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:14⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:14⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14079778986091889291,14406566248201735648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:14⤵PID:5844
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/5B39-65D9-B073-029E-DAC63⤵PID:1452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe083f46f8,0x7ffe083f4708,0x7ffe083f47184⤵PID:4388
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3436
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "instnm.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exe" > NUL3⤵PID:5512
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "instnm.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5572
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:5632
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2392
-
-
-
C:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exeC:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
C:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exeC:\Users\Admin\AppData\Roaming\{B48A672C-D318-F281-1F13-6828D3C8BD54}\instnm.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x454 0x3301⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5c5605f9363835142e0f6f2d5092be0f4
SHA156e43867498475de5b960e6da97eaeb66155bf42
SHA256d1aa2ab831be3f7b24e37cbf2b576988ed9acc3e7ab57a28ca6aa712d5cfaa77
SHA512fdf7ea929d3aadf54d44df648d92d7a8f8565d27835318145be7cf64249f44396c4cf157c08ad4ce57e975adc80215d10f70482ff3190ee0b3276a22dd94efff
-
Filesize
85B
MD5c6a079e1aa024d435a09b4dcaef39e23
SHA135a715b94aa252bb8b2addc0cdcca10ee22b2103
SHA256661684f10b7858eea0aa6bb5442cc8a9afa417f86abbef5bdc9e59092e84cd0b
SHA5125be5c9a6b413806b5d6cd53d560900b32713fcc140fb4f93b111beea109bb60323ba972c883e7248b264a25cf092c3dfb67259f7fc17f04c6a1dbde06dd204a7
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
5KB
MD5e35ee864342a10294bd81f05a38e475e
SHA1579c5481f7d4d4999f76a264e01310b334f514a9
SHA256d6a4833ad7f646f5a5876ae96c9b5914ca6142b4a7309ea5498f27f4d034bd68
SHA512b7444182389faacd69b40d0b1d9ba3d24486365c77799a5a5042c1781e4a3514272bc670b4a00c0bf730670e429b6d172d0d9558cf4bcd93de53a5495286a4a4
-
Filesize
6KB
MD57098a0a29945edd5a94cbd34aa9d78e3
SHA1224004d30b62435926515a2caf4e8c49f68311b4
SHA256727a04aba642ece8d3b91a185450aa7d48cb4d4a9dd4db0ac98e0e0267904293
SHA51299ab34160b57bfb5ab37b192ffbd21e89a1bb2d95debc0cd7eeea299e5c59ff7733f2fe57d299f7426da2a14a95408c263b2844b19bdf6de9a7346d4990b341b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57588f62aa3e49857b42ae0199c86c788
SHA1ebd3fd8f058c2d3c0eb3bd58b0982de59ccce7c4
SHA256db3bdf8feb62cea8950b1880aeec598784b0e0ba5470eb91db0a9c322daef25e
SHA512004ea5863e40c8782ca1c7db27abee73b6c2058458e47d830115b798ee1678ba862b2701415ab1250e6d2fbc5dc830af87b4a4cc1352c6b202b44e25616efcc0
-
Filesize
1KB
MD545177f0379717175d2ffd174eb4652e8
SHA10d476611615b54ea11bd4044a2b3931582ddfa3c
SHA25609099f3317f47b501f32a88ee66847ec0877b37a476d088c45ef3e5dd8727b1e
SHA51251250b3b65deecd00cf47fb72afa50701f7f027bb3e2ac35adb3ec04867722560785165aabbaf2723849742033eaec0b9467b767aa77f7ffc9924a5a78049dcd
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
10KB
MD5cf234a06fd4885163dc2eea986487b13
SHA1c0d44c018eff8c6e1b4e267e2638d0417508ae45
SHA2563b1d375a8219e4a04aad1cfe1606a854e905ddf0d955658f596a74ebfcce3527
SHA51273a584a24f124daf95c9a49c4e90c40aaadeea492cac1c01b3b3e1674b0c5d49c8d332507eff7ff96717cbc704454ed976501574a4c76d53da6d21b73b34f0e1