Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe
-
Size
170KB
-
MD5
d05405526a2bf70635cd621ca4a3c4f9
-
SHA1
e69de5152d5a6099160b5bc2f8b4cac7561ba61a
-
SHA256
7f63612cc2675d72bbc7b82ea3b6ceda6864ce32e811d7ac2031567c6fab6173
-
SHA512
a0011679c1de0b4dd8d340a8fa1a8baa9a713ce73754091054b0f91604025271813974b69d73b93b777a9a1e32d23b1b42ec56f38120510981f6208029410b99
-
SSDEEP
3072:Wt/AEbb4tj2D8J7UA6bQZRBuNaR0XIdATAQ6a4fY:WRAkPIUA0Yuk04iNsY
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.ret5kr.win/BA28-92EB-923A-0063-7F65
http://cerberhhyed5frqa.zgf48j.win/BA28-92EB-923A-0063-7F65
http://cerberhhyed5frqa.xltnet.win/BA28-92EB-923A-0063-7F65
http://cerberhhyed5frqa.dk59jg.win/BA28-92EB-923A-0063-7F65
http://cerberhhyed5frqa.xmfu59.win/BA28-92EB-923A-0063-7F65
http://cerberhhyed5frqa.onion/BA28-92EB-923A-0063-7F65
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" dfrgui.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation dfrgui.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dfrgui.lnk d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dfrgui.lnk dfrgui.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 dfrgui.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfrgui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dfrgui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfrgui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" dfrgui.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dfrgui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" dfrgui.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 3542 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB234.bmp" dfrgui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfrgui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 852 cmd.exe 4028 PING.EXE 1504 cmd.exe 4456 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1932 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2776 taskkill.exe 2260 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop dfrgui.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\\dfrgui.exe\"" dfrgui.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings dfrgui.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4028 PING.EXE 4456 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 2648 dfrgui.exe 1180 msedge.exe 1180 msedge.exe 2680 msedge.exe 2680 msedge.exe 1052 identity_helper.exe 1052 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe Token: SeDebugPrivilege 2648 dfrgui.exe Token: SeDebugPrivilege 2776 taskkill.exe Token: SeBackupPrivilege 184 vssvc.exe Token: SeRestorePrivilege 184 vssvc.exe Token: SeAuditPrivilege 184 vssvc.exe Token: SeIncreaseQuotaPrivilege 4468 wmic.exe Token: SeSecurityPrivilege 4468 wmic.exe Token: SeTakeOwnershipPrivilege 4468 wmic.exe Token: SeLoadDriverPrivilege 4468 wmic.exe Token: SeSystemProfilePrivilege 4468 wmic.exe Token: SeSystemtimePrivilege 4468 wmic.exe Token: SeProfSingleProcessPrivilege 4468 wmic.exe Token: SeIncBasePriorityPrivilege 4468 wmic.exe Token: SeCreatePagefilePrivilege 4468 wmic.exe Token: SeBackupPrivilege 4468 wmic.exe Token: SeRestorePrivilege 4468 wmic.exe Token: SeShutdownPrivilege 4468 wmic.exe Token: SeDebugPrivilege 4468 wmic.exe Token: SeSystemEnvironmentPrivilege 4468 wmic.exe Token: SeRemoteShutdownPrivilege 4468 wmic.exe Token: SeUndockPrivilege 4468 wmic.exe Token: SeManageVolumePrivilege 4468 wmic.exe Token: 33 4468 wmic.exe Token: 34 4468 wmic.exe Token: 35 4468 wmic.exe Token: 36 4468 wmic.exe Token: SeIncreaseQuotaPrivilege 4468 wmic.exe Token: SeSecurityPrivilege 4468 wmic.exe Token: SeTakeOwnershipPrivilege 4468 wmic.exe Token: SeLoadDriverPrivilege 4468 wmic.exe Token: SeSystemProfilePrivilege 4468 wmic.exe Token: SeSystemtimePrivilege 4468 wmic.exe Token: SeProfSingleProcessPrivilege 4468 wmic.exe Token: SeIncBasePriorityPrivilege 4468 wmic.exe Token: SeCreatePagefilePrivilege 4468 wmic.exe Token: SeBackupPrivilege 4468 wmic.exe Token: SeRestorePrivilege 4468 wmic.exe Token: SeShutdownPrivilege 4468 wmic.exe Token: SeDebugPrivilege 4468 wmic.exe Token: SeSystemEnvironmentPrivilege 4468 wmic.exe Token: SeRemoteShutdownPrivilege 4468 wmic.exe Token: SeUndockPrivilege 4468 wmic.exe Token: SeManageVolumePrivilege 4468 wmic.exe Token: 33 4468 wmic.exe Token: 34 4468 wmic.exe Token: 35 4468 wmic.exe Token: 36 4468 wmic.exe Token: 33 4024 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4024 AUDIODG.EXE Token: SeDebugPrivilege 2260 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2648 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe 83 PID 4700 wrote to memory of 2648 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe 83 PID 4700 wrote to memory of 2648 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe 83 PID 4700 wrote to memory of 852 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe 84 PID 4700 wrote to memory of 852 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe 84 PID 4700 wrote to memory of 852 4700 d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe 84 PID 852 wrote to memory of 2776 852 cmd.exe 86 PID 852 wrote to memory of 2776 852 cmd.exe 86 PID 852 wrote to memory of 2776 852 cmd.exe 86 PID 2648 wrote to memory of 1932 2648 dfrgui.exe 87 PID 2648 wrote to memory of 1932 2648 dfrgui.exe 87 PID 852 wrote to memory of 4028 852 cmd.exe 93 PID 852 wrote to memory of 4028 852 cmd.exe 93 PID 852 wrote to memory of 4028 852 cmd.exe 93 PID 2648 wrote to memory of 4468 2648 dfrgui.exe 95 PID 2648 wrote to memory of 4468 2648 dfrgui.exe 95 PID 2648 wrote to memory of 2680 2648 dfrgui.exe 107 PID 2648 wrote to memory of 2680 2648 dfrgui.exe 107 PID 2680 wrote to memory of 4020 2680 msedge.exe 108 PID 2680 wrote to memory of 4020 2680 msedge.exe 108 PID 2648 wrote to memory of 4380 2648 dfrgui.exe 109 PID 2648 wrote to memory of 4380 2648 dfrgui.exe 109 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 4704 2680 msedge.exe 110 PID 2680 wrote to memory of 1180 2680 msedge.exe 111 PID 2680 wrote to memory of 1180 2680 msedge.exe 111 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\dfrgui.exe"C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\dfrgui.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1932
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95a7f46f8,0x7ff95a7f4708,0x7ff95a7f47184⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:84⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:14⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:14⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:14⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:14⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:14⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:84⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:14⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:14⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:14⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:14⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3555365315729277052,18098756973041829895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1832 /prefetch:14⤵PID:4716
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.ret5kr.win/BA28-92EB-923A-0063-7F653⤵PID:2164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe8,0x108,0x7ff95a7f46f8,0x7ff95a7f4708,0x7ff95a7f47184⤵PID:1660
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4520
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "dfrgui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{FA20750F-FF5F-68A7-3002-8AB84A711A16}\dfrgui.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1504 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "dfrgui.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4456
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "d05405526a2bf70635cd621ca4a3c4f9_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4028
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e4 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:4024
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5de6f368886c1356347b6544bc41b0449
SHA154b77e4078527c445af6fcd368b049ba94a8a636
SHA2566a8f63844ae4f57d45613667c643392570473f17fb636b929fcd9c8c03fe59b5
SHA5128acd9adad32cf9f08532aafa3505718c5a40b757d8574fcd38ee951ade488ef7d545a034fbb78394df0ad1ddaed87ede3226c6c847a6152dacc3b2be831bd56b
-
Filesize
10KB
MD5b5997d56799351aa894d6cd59ffaf189
SHA17a925ebe93f88d4ad8de52941ccaec7f1a9872df
SHA25612d325ece0700edfde11caa61249d2935f8747e075b30146fe39db3688c884fd
SHA5126927c5bc1ca80863e5590703e934c4c1d484c31b08113ba2903e084a7821719bd3d966f809ddbd052deed6985ddb2ec5e176ac0790d0732bb3397fb876c28ea0
-
Filesize
85B
MD55e38a25334223ffc72927214d45b8ff5
SHA14f52fab5c985068dfda85b4b4a8225d6ece6d17d
SHA2564837f4a26db0436206e2a1f2be1dd00f8eda41238e2cf7e612f1bf606dcecaea
SHA512d784ade349eb72b6715bd6e270789cfb704c4fd0d87db2522c39875687c285c8ff8f7df125bf1130cecd6040b9766b1b62f3f0603ec2f33518d6dbcfc0aadc72
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
5KB
MD57a4c422bc74c38bca0e29147d5420d45
SHA137c426fae56d9958a791a8bc54da6b00039f2426
SHA25613c4b3e4cb60c86ba3445b803a2287c65e45d92e7ec732c26642ff8c6b83a82e
SHA5129f56b74c1c0298bf208df33ed2ead64722ac4a43cbf347ee39b5babb0f8f559f4bb53bcb6356c10e303bcfb46692c715189dce80e7276019f544d570abdc5284
-
Filesize
6KB
MD5b0f4c0c0e7df10f98e2d003aa742b2ea
SHA1a05f12d66a36f1d73fa9a0697d1b9f68cc102b57
SHA2566b50fdc1576a052e9d4a902c74a3f2d88ae3d954e669b9f5440cacb2a0145867
SHA512ad3b51c887e57e8e33adf03f23d1e301d44c715d104bf7dbe54edf88490213c8deb32d8e31673afed04039de054bc21cf676a4794b686429d394591553c18f7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a9f84f3fd71159088c2a6756296c8cb6
SHA172a3e21622257e5ffa3d449002bc7cc81c36358e
SHA256624a5a6b9465c08be47cc849c4e7ebee8035556f1f2de042b0d4e5d6b0ccbd1e
SHA5124c316831590679130c529b0235e3a02765bcb2abf417bb67a2026b01e17c046df6c4d7b7411741a5567ccff312d76af801cc1db3c5b6cd9770421c42b3d0a159
-
Filesize
1KB
MD5d516cca3f08c9c802aa8bbfed4781c8b
SHA17bdea5d0a5c23ea08f81f6e1d25a89400d939b89
SHA2569a14d1790407ee1dea452e92afcca359c04c0a9534a54ed038a04dd7fdabd675
SHA5125f2d7301f70932f1ef0eef1b27121245a77ef3030fbbb39686527a4973574ecbbd53a4bd43248bde2bb3d59fa6988b12abfefb14eefa58cfd5e217393cda0687
-
Filesize
170KB
MD5d05405526a2bf70635cd621ca4a3c4f9
SHA1e69de5152d5a6099160b5bc2f8b4cac7561ba61a
SHA2567f63612cc2675d72bbc7b82ea3b6ceda6864ce32e811d7ac2031567c6fab6173
SHA512a0011679c1de0b4dd8d340a8fa1a8baa9a713ce73754091054b0f91604025271813974b69d73b93b777a9a1e32d23b1b42ec56f38120510981f6208029410b99
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853