Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe
-
Size
286KB
-
MD5
c5b93ade217bd9a818c90976e3acc87b
-
SHA1
f1dd3f84c3b8f0782367ce8a38dc1da0aab64854
-
SHA256
3a2bb3e07800debe1877d52353ed905524625dd4fd40bb375ddce9e9cc7d2a7f
-
SHA512
4e3213abaab8b1495f78b55a90882c12c70da2cd686683800bfd211e472a4a7126d2366624cc85177638e9670ce8ea1e9cb13d493ed8b9bdf6dc04e0dc90713c
-
SSDEEP
3072:lhdf2HTrKylxOq/UlIbEEphx7+CWM/Ns7a9x4s:LUzuylsHlVEnJ+8ZZ
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfhr6.win/5B0D-B128-B235-0063-789C
http://cerberhhyed5frqa.cmfhty.win/5B0D-B128-B235-0063-789C
http://cerberhhyed5frqa.dk59jg.win/5B0D-B128-B235-0063-789C
http://cerberhhyed5frqa.xmfu59.win/5B0D-B128-B235-0063-789C
http://cerberhhyed5frqa.er48rt.win/5B0D-B128-B235-0063-789C
http://cerberhhyed5frqa.onion/5B0D-B128-B235-0063-789C
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16402) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" typeperf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation typeperf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\typeperf.lnk c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\typeperf.lnk typeperf.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 typeperf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" typeperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\typeperf = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" typeperf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE143.bmp" typeperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language typeperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3044 cmd.exe 1708 PING.EXE 5612 cmd.exe 5712 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1076 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 5664 taskkill.exe 3968 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop typeperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\typeperf.exe\"" typeperf.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings typeperf.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1708 PING.EXE 5712 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 2176 typeperf.exe 740 msedge.exe 740 msedge.exe 3980 msedge.exe 3980 msedge.exe 3352 identity_helper.exe 3352 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe Token: SeDebugPrivilege 2176 typeperf.exe Token: SeDebugPrivilege 3968 taskkill.exe Token: SeBackupPrivilege 2328 vssvc.exe Token: SeRestorePrivilege 2328 vssvc.exe Token: SeAuditPrivilege 2328 vssvc.exe Token: SeIncreaseQuotaPrivilege 2100 wmic.exe Token: SeSecurityPrivilege 2100 wmic.exe Token: SeTakeOwnershipPrivilege 2100 wmic.exe Token: SeLoadDriverPrivilege 2100 wmic.exe Token: SeSystemProfilePrivilege 2100 wmic.exe Token: SeSystemtimePrivilege 2100 wmic.exe Token: SeProfSingleProcessPrivilege 2100 wmic.exe Token: SeIncBasePriorityPrivilege 2100 wmic.exe Token: SeCreatePagefilePrivilege 2100 wmic.exe Token: SeBackupPrivilege 2100 wmic.exe Token: SeRestorePrivilege 2100 wmic.exe Token: SeShutdownPrivilege 2100 wmic.exe Token: SeDebugPrivilege 2100 wmic.exe Token: SeSystemEnvironmentPrivilege 2100 wmic.exe Token: SeRemoteShutdownPrivilege 2100 wmic.exe Token: SeUndockPrivilege 2100 wmic.exe Token: SeManageVolumePrivilege 2100 wmic.exe Token: 33 2100 wmic.exe Token: 34 2100 wmic.exe Token: 35 2100 wmic.exe Token: 36 2100 wmic.exe Token: SeIncreaseQuotaPrivilege 2100 wmic.exe Token: SeSecurityPrivilege 2100 wmic.exe Token: SeTakeOwnershipPrivilege 2100 wmic.exe Token: SeLoadDriverPrivilege 2100 wmic.exe Token: SeSystemProfilePrivilege 2100 wmic.exe Token: SeSystemtimePrivilege 2100 wmic.exe Token: SeProfSingleProcessPrivilege 2100 wmic.exe Token: SeIncBasePriorityPrivilege 2100 wmic.exe Token: SeCreatePagefilePrivilege 2100 wmic.exe Token: SeBackupPrivilege 2100 wmic.exe Token: SeRestorePrivilege 2100 wmic.exe Token: SeShutdownPrivilege 2100 wmic.exe Token: SeDebugPrivilege 2100 wmic.exe Token: SeSystemEnvironmentPrivilege 2100 wmic.exe Token: SeRemoteShutdownPrivilege 2100 wmic.exe Token: SeUndockPrivilege 2100 wmic.exe Token: SeManageVolumePrivilege 2100 wmic.exe Token: 33 2100 wmic.exe Token: 34 2100 wmic.exe Token: 35 2100 wmic.exe Token: 36 2100 wmic.exe Token: 33 2140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2140 AUDIODG.EXE Token: SeDebugPrivilege 5664 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2176 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe 86 PID 1504 wrote to memory of 2176 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe 86 PID 1504 wrote to memory of 2176 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe 86 PID 1504 wrote to memory of 3044 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe 87 PID 1504 wrote to memory of 3044 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe 87 PID 1504 wrote to memory of 3044 1504 c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe 87 PID 3044 wrote to memory of 3968 3044 cmd.exe 89 PID 3044 wrote to memory of 3968 3044 cmd.exe 89 PID 3044 wrote to memory of 3968 3044 cmd.exe 89 PID 2176 wrote to memory of 1076 2176 typeperf.exe 90 PID 2176 wrote to memory of 1076 2176 typeperf.exe 90 PID 3044 wrote to memory of 1708 3044 cmd.exe 95 PID 3044 wrote to memory of 1708 3044 cmd.exe 95 PID 3044 wrote to memory of 1708 3044 cmd.exe 95 PID 2176 wrote to memory of 2100 2176 typeperf.exe 97 PID 2176 wrote to memory of 2100 2176 typeperf.exe 97 PID 2176 wrote to memory of 3980 2176 typeperf.exe 116 PID 2176 wrote to memory of 3980 2176 typeperf.exe 116 PID 3980 wrote to memory of 4920 3980 msedge.exe 117 PID 3980 wrote to memory of 4920 3980 msedge.exe 117 PID 2176 wrote to memory of 3488 2176 typeperf.exe 118 PID 2176 wrote to memory of 3488 2176 typeperf.exe 118 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 1484 3980 msedge.exe 120 PID 3980 wrote to memory of 740 3980 msedge.exe 121 PID 3980 wrote to memory of 740 3980 msedge.exe 121 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\typeperf.exe"C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\typeperf.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1076
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff89fd846f8,0x7ff89fd84708,0x7ff89fd847184⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:84⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:14⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:14⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:14⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:14⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4216 /prefetch:84⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4216 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:14⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:14⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:14⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:14⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11599732627140295509,13084170971576975650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1296 /prefetch:14⤵PID:5932
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.xmfhr6.win/5B0D-B128-B235-0063-789C3⤵PID:2868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff89fd846f8,0x7ff89fd84708,0x7ff89fd847184⤵PID:2260
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3692
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "typeperf.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\typeperf.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5612 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "typeperf.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5712
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "c5b93ade217bd9a818c90976e3acc87b_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1708
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x3cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5655ccb7cdcee44ad2786107a2cb25c63
SHA1d036da3c3f257ebe57506d4c940f1ec2f6cc90f6
SHA25667c03b3b0d2d12ce274a634a7b868b2e97bf5a2311cc1a1d84e3a29609a495e0
SHA5129ac3a63d8a2166d3a90f29b84d4d12066b56cfcda0504cf0c42250b85ee2eba3fac586a019b43030189f493e1f64fedf79b098d4b27fc115f7c6087cb433e0b2
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
6KB
MD551b384204b2290cc5f8fa8cd1cefdd03
SHA15644863493fb513e7ae073ade3dda5e0eba63730
SHA2564fa8ce5a9ed1849397900758aa51790b11562b51c1532a995f366907f06c5acb
SHA512e8fda15fc9a20509b71387ca78ca873cfce7da73d77f4833c3ccb010a50175c0be7ff8ddf5954eaaefe397eb18ebcaf6e281673d468f951a849b1a06dfcb824a
-
Filesize
5KB
MD5baa420093c2538c112d8abfd3c60bf5a
SHA15c13777992975854bfb11d533f65d2fa2f06b4c8
SHA25638d8bf607bebf4d635bd08e8ce75583c95bcc5d794e799b97a37167ba0cc5647
SHA512e95875a5d336f88a79fe0156ac09048fe123b392a4895be62a7d578527de926a67da87c875429456cac49efd2926c3b0092686ab51ad564d860dbe0954c22ab4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD507b8e35780f07fec011a8b1cf57adbd7
SHA11c65f795a14cb3224310bbb593079fa837626ee5
SHA2562a0cdc5fd593ea87ba425ab214b01b71b6348ea5697eafbe70e8608834271d17
SHA512705d011fb1a2d187c87b94ac6bf7a3fe17c97ed3bb20f8857d9b2fa721e97013dc8329accef2cb649ae6d43e9992e2823c09b377303f46f5b3c061848732ac5f
-
Filesize
1KB
MD5ca866cdae3f8520862283749d6427e4a
SHA1ec6eec3c436855fd1b642b7ae449860a6281803f
SHA2566921f6753fbd18846676fa14a5fe542eb23920804e2613367f0083f8eecf644d
SHA51226ef4790a13efa6535c6452d534c5680685589b6916a3fb661861efca461e7ec2f3cbcf1655e16c1ee87d673cfc8ca35dcca4e6d3103c21398c857b2b5648a29
-
Filesize
286KB
MD5c5b93ade217bd9a818c90976e3acc87b
SHA1f1dd3f84c3b8f0782367ce8a38dc1da0aab64854
SHA2563a2bb3e07800debe1877d52353ed905524625dd4fd40bb375ddce9e9cc7d2a7f
SHA5124e3213abaab8b1495f78b55a90882c12c70da2cd686683800bfd211e472a4a7126d2366624cc85177638e9670ce8ea1e9cb13d493ed8b9bdf6dc04e0dc90713c
-
Filesize
12KB
MD586b4a56b943c67fb9f6375c387b31265
SHA13a479eba18a5354c29bc8cc24923c44bd33f5334
SHA2562143eb6ef501a9048e3c0713bcda6ca929318dfd36187eda6d4ddfb6a692bce5
SHA512c201bcece128fc6456893b7656a68dd3d793120c28a6276fad3f053ba07ad37f54c16b7e3a025e8ba281e06b34fc26b912770f1e3eb8a2a69e3353b5de53ed9a
-
Filesize
85B
MD507b232f8987a1e1dd4962d8a2048fa36
SHA1c2e9ca7ffff51f71aa25999d8f109063752b62ae
SHA256865a7f98e2c00eafdac55bdfd5e1bccb228bf1b7f4b37829d87876d1ffae2440
SHA512b5e467d57e64690af97059b05c2d6251d52e7469f958e5dcb9f70159802217d64a8b1d070bdc019bb306053e5fcbae3b9c5eec4a24a4ad8b5ac80678a9518a73
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853