Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe
Resource
win10v2004-20240802-en
General
-
Target
d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe
-
Size
231KB
-
MD5
5b2c1302039d496f0f970f559b201dfe
-
SHA1
796d10701e5d1dc3e49119322cabc46c5619d272
-
SHA256
d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d
-
SHA512
5a685fe98463e7150dbd23cd5ad01c12ccadb03d5eab16099bc0e34d04cd524dcf5be2d2e41a0b0f525242d0539a95d9fcb93dae140291a1ee994c478768e708
-
SSDEEP
6144:9PIeJarlToZNDlkPNvabl9uxX0Xp85VBLc4vm+fbcn8Klh3vOCU:9QxX0Xp8lc428EJ4
Malware Config
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.a2uzpe.top/7096-5DD8-492E-0073-3BFE
http://52uo5k3t73ypjije.go8hpw.top/7096-5DD8-492E-0073-3BFE
http://52uo5k3t73ypjije.n6kswi.top/7096-5DD8-492E-0073-3BFE
http://52uo5k3t73ypjije.1bipa9.top/7096-5DD8-492E-0073-3BFE
http://52uo5k3t73ypjije.onion.to/7096-5DD8-492E-0073-3BFE
http://52uo5k3t73ypjije.onion/7096-5DD8-492E-0073-3BFE
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" fixmapi.exe -
Contacts a large (532) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation fixmapi.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fixmapi.lnk fixmapi.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fixmapi.lnk d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe -
Executes dropped EXE 1 IoCs
pid Process 3164 fixmapi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fixmapi = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" fixmapi.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fixmapi = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" fixmapi.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fixmapi = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fixmapi = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp740D.bmp" fixmapi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fixmapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2340 cmd.exe 1664 PING.EXE 4192 cmd.exe 2296 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 2804 taskkill.exe 2252 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop fixmapi.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\fixmapi.exe\"" fixmapi.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings fixmapi.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1664 PING.EXE 2296 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe 3164 fixmapi.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 3164 fixmapi.exe Token: 33 2664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2664 AUDIODG.EXE Token: SeDebugPrivilege 2252 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3164 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe 95 PID 3460 wrote to memory of 3164 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe 95 PID 3460 wrote to memory of 3164 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe 95 PID 3460 wrote to memory of 2340 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe 96 PID 3460 wrote to memory of 2340 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe 96 PID 3460 wrote to memory of 2340 3460 d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe 96 PID 2340 wrote to memory of 2804 2340 cmd.exe 98 PID 2340 wrote to memory of 2804 2340 cmd.exe 98 PID 2340 wrote to memory of 2804 2340 cmd.exe 98 PID 2340 wrote to memory of 1664 2340 cmd.exe 99 PID 2340 wrote to memory of 1664 2340 cmd.exe 99 PID 2340 wrote to memory of 1664 2340 cmd.exe 99 PID 3164 wrote to memory of 3992 3164 fixmapi.exe 111 PID 3164 wrote to memory of 3992 3164 fixmapi.exe 111 PID 3992 wrote to memory of 2776 3992 msedge.exe 112 PID 3992 wrote to memory of 2776 3992 msedge.exe 112 PID 3164 wrote to memory of 2008 3164 fixmapi.exe 113 PID 3164 wrote to memory of 2008 3164 fixmapi.exe 113 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 4376 3992 msedge.exe 114 PID 3992 wrote to memory of 1412 3992 msedge.exe 115 PID 3992 wrote to memory of 1412 3992 msedge.exe 115 PID 3992 wrote to memory of 2584 3992 msedge.exe 116 PID 3992 wrote to memory of 2584 3992 msedge.exe 116 PID 3992 wrote to memory of 2584 3992 msedge.exe 116 PID 3992 wrote to memory of 2584 3992 msedge.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe"C:\Users\Admin\AppData\Local\Temp\d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\fixmapi.exe"C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\fixmapi.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6c1846f8,0x7ffa6c184708,0x7ffa6c1847184⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:24⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:34⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:84⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:14⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:14⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4372 /prefetch:14⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:14⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:84⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:84⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:14⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:14⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:14⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14385340999680380399,14678067306333395099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:14⤵PID:5496
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.a2uzpe.top/7096-5DD8-492E-0073-3BFE?auto3⤵PID:1364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6c1846f8,0x7ffa6c184708,0x7ffa6c1847184⤵PID:5008
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:5076
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "fixmapi.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\fixmapi.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4192 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "fixmapi.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2296
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1664
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x46c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52db2712ba6d7fd6650322f89256a4ce5
SHA1d40a41f10be88eefb93a67f708ae872c8293666d
SHA25628892db4f8c9712a15191338dea1c126c434d7ef88225d05d35546bb4bba0e13
SHA512e9f5a740fdf9eb5fe4d8906911980c0d307c8698e25296b4506844c5199003501f1c8909c290bc5ef88e5e45e9be5a315fec4702c319c964a24cb8d962f50715
-
Filesize
10KB
MD51163990c5a2f2b3967997c36f0291355
SHA12a57c78057fd86defb45c8388dd83636717dcbc8
SHA256979c363ffe45b86b3b4df102ce14f3c05db3c8ea457c35ad4bbb9a3bb6088de9
SHA512ed92ef061ae6451493c00f4ed09e1cd477024de5350d29c6f0e7aebf9cafe416a4411a410ff95d19f49df4399f6353a02c7f34aaed5f7b11f4c9da60095ce195
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5982820cc4648389e572820a7ae607cf9
SHA16493b71e2b882e5f7e51e7ca3b29b4d1c3a31697
SHA256448043af4314244e24edf4d203694053af35a64353add258dc01bd60e1424617
SHA512126fa2836a9827d1408f7f7c288c32baa7c407a519c9c9905dadbd92e72142d236e5f3c33187f1aabb3362bd3f9f7e7c3e03edd4aff21a96383786089a634659
-
Filesize
6KB
MD5dae95c9fa00dc65ea5c717bd4ec82cf7
SHA1974dd204ae57598b9b5430ba0b5985d94cac6a7a
SHA25620c948ba67e13488d2313d543739c1ec732ad5725993c98d58f7a21428ca610c
SHA51203afd586abaec113271691d6d8df8ea8f73e6c5b9a1f0d554a65e4f2d91593740269bd293996cb8723eb5329206f307827d0e37ceae587d161db2fa4ca4460bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD569ab57441b8469161e66ba592e39e30d
SHA1db1e402031c0560a3b20b8fafde9be71c4dd11f0
SHA25638443d9d28eb07f12fecdaf695e953c7a554701628262adba170c209798b99d7
SHA512f0db0cb786181ed74e8f988aa81a6c38f73790bb6520671964a459e052a771fbe22b51cb9dca1f69ac82450ae8429710d8df9d4dfa6e21b84986a19a035dcfee
-
Filesize
1KB
MD53fecbf3f8420b379a97149bfa3c084b5
SHA19213910644eec946e902099ed209f3dd4bb1d1e9
SHA2563c3ae4afc08205718e36b9c6753d0188afce4f80143a2c3f354e000034788f80
SHA5123540d9624b62614541bd73bfd6a071dbe8ed0dce19194f1a6b89770c6c6abedcb6a752f02494a8bd01f1b0d182ca5b98eab0a821308a71f17135363cd1590119
-
Filesize
231KB
MD55b2c1302039d496f0f970f559b201dfe
SHA1796d10701e5d1dc3e49119322cabc46c5619d272
SHA256d77aca4282fed414d70959186372251565abbd29f261219e544d778224dd3a7d
SHA5125a685fe98463e7150dbd23cd5ad01c12ccadb03d5eab16099bc0e34d04cd524dcf5be2d2e41a0b0f525242d0539a95d9fcb93dae140291a1ee994c478768e708
-
Filesize
90B
MD5d1743d557a703d4b8428b7f6021a2740
SHA135330164485a5cc19525458a31edfdf04536e49a
SHA25626521a1f2c78b8e10cc92c530f8c8920842bf72eb56784cf10f310e0b60b3d57
SHA5129bb7fe23a8c86f794407d63c3842affefc48cb74480a794c46b8997d3428a09af1f45156e94255ab25b54672ce2a5372c3585fbbd7e9a1e57fb4a088f7a45f89
-
Filesize
234B
MD56f84dbf74ef41dc3d861f5fb3e0f45ff
SHA13e5f17e9b9589f33ce6add7f2518a666ff2253a4
SHA256df5f432d7e0d2bd1c4dddb1fabbf1e77bd1065b9020f71abaf1a45fbb950bbb8
SHA5129f9ec25b815be7b20df26244d31848c9a4896b130241b63636d63511a290eaad78d289a9bb04592c0ba31492064671351b4c7359310f03469e27764132a20a5a