Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 08:32

General

  • Target

    eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe

  • Size

    211KB

  • MD5

    eaf34a7d9a24baf248e4b5da247a384e

  • SHA1

    ff4ccb35e4311fefdd7f0a7251570c51ab9ab224

  • SHA256

    66a05692cf2ff6b0abcd97a5d4b37b61700a21fb93eee4338d87b4ebe79e32b0

  • SHA512

    a50b36fff27c74c7049be98e4e2f312c825fae52f9aa9161e830e0703e476e7cb4a2947466fda1ebca0244b2e5d6e3b086fc1e884e22b468416416ebb11637b3

  • SSDEEP

    6144:z8dNXSE4z6Jl8TKkPrX81t1YVIgZDWENiEDpwjALIlhT:4fJl8TfPrX81t1RoWZfl

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #CerberRansomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA | | 2. http://cerberhhyed5frqa.xzcfr4.win/2B69-2253-60F6-0063-7BFA | | 3. http://cerberhhyed5frqa.asxce4.win/2B69-2253-60F6-0063-7BFA | | 4. http://cerberhhyed5frqa.45kgok.win/2B69-2253-60F6-0063-7BFA | | 5. http://cerberhhyed5frqa.ad34ft.win/2B69-2253-60F6-0063-7BFA |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/2B69-2253-60F6-0063-7BFA | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA

http://cerberhhyed5frqa.xzcfr4.win/2B69-2253-60F6-0063-7BFA

http://cerberhhyed5frqa.asxce4.win/2B69-2253-60F6-0063-7BFA

http://cerberhhyed5frqa.45kgok.win/2B69-2253-60F6-0063-7BFA

http://cerberhhyed5frqa.ad34ft.win/2B69-2253-60F6-0063-7BFA

http://cerberhhyed5frqa.onion/2B69-2253-60F6-0063-7BFA

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #CerberRansomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA</a></li> <li><a href="http://cerberhhyed5frqa.xzcfr4.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.xzcfr4.win/2B69-2253-60F6-0063-7BFA</a></li> <li><a href="http://cerberhhyed5frqa.asxce4.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.asxce4.win/2B69-2253-60F6-0063-7BFA</a></li> <li><a href="http://cerberhhyed5frqa.45kgok.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.45kgok.win/2B69-2253-60F6-0063-7BFA</a></li> <li><a href="http://cerberhhyed5frqa.ad34ft.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.ad34ft.win/2B69-2253-60F6-0063-7BFA</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA" target="_blank">http://cerberhhyed5frqa.azlto5.win/2B69-2253-60F6-0063-7BFA</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/2B69-2253-60F6-0063-7BFA</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16389) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 2 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe
        "C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe
          "C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe"
          4⤵
          • Adds policy Run key to start application
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\system32\vssadmin.exe
            "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:892
          • C:\Windows\system32\wbem\wmic.exe
            "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:576
          • C:\Windows\System32\bcdedit.exe
            "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:560
          • C:\Windows\System32\bcdedit.exe
            "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1744
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            PID:1460
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:596
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:996353 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:448
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
            5⤵
              PID:2396
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
              5⤵
                PID:2816
              • C:\Windows\system32\cmd.exe
                /d /c taskkill /t /f /im "rdrleakdiag.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe" > NUL
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                PID:1624
                • C:\Windows\system32\taskkill.exe
                  taskkill /t /f /im "rdrleakdiag.exe"
                  6⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1480
                • C:\Windows\system32\PING.EXE
                  ping -n 1 127.0.0.1
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1980
          • C:\Windows\SysWOW64\cmd.exe
            /d /c taskkill /t /f /im "eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe" > NUL
            3⤵
            • Deletes itself
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /t /f /im "eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2892
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2688
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {72FF3D04-EE00-475D-BF58-1C26BDB70954} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe
          C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe
            C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2392
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1500
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2208
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:1424
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x304
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:228

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

        Filesize

        12KB

        MD5

        48a5961fd49dfbc1b827c38d0efc4132

        SHA1

        bb4b47f8bb027ec6d52120c62ca3822352d4d06c

        SHA256

        572ddc973cb5168b04435e99f677f735454069260d87c4f3aa31d3ebf4a944c7

        SHA512

        2dd8c325c5bd17d4f1bfa357f28d65803ee8f1c63febeecad743f6c4906b84d825935dec3592fd276ce884645763b3428e89b226b6a6af059f8c6a9256263bb3

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

        Filesize

        10KB

        MD5

        4e16d33df720ab2341046bdff0a32113

        SHA1

        2c863da8a220c85e67b4811bc70c81c94cc95d90

        SHA256

        e7e481b1c4d606033033fbe36fddbd94dae29cc3cb8c78b62430016dd5b75785

        SHA512

        8902881922ebd23a0c5169a0d66cbfabd4fa8661e519fb5c05ae7e49b572776dae2d15edc2208b2f65ab95b60630683cb7fc1fb62e6643867395067d0c3b6e92

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

        Filesize

        85B

        MD5

        30c4e191e3f8e1496b14de11d6cf4b48

        SHA1

        0c5606356414065c0b53482a302887eae5876634

        SHA256

        613002c8c874681f94366bd07d2ebcb248502f55b3f88851f31adfb00ff28aa4

        SHA512

        e6cd969a81b1e93b8432786fda3d1479abcaa09d296c26337878985709161d4c1a216364ae6ca69916cb760ea11b9d300d84bde45603816ec87e293c1b4ea911

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

        Filesize

        216B

        MD5

        48ac29422570636cae371b68c858b988

        SHA1

        ff86dea198c93a8ae49ee52c6eb919fcbd259aab

        SHA256

        3926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0

        SHA512

        75019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8f506c7bf7b5fecf039b217aaa87d429

        SHA1

        b67b0cbf383f4a2005c3db57c0de74cf88b5992c

        SHA256

        b942e9db3aff1478ebebbc5e1e8dee0657df092694d158d6420f860ab0b823fa

        SHA512

        c41fa272c3bf827ea580eaf53cadb4f4c6866253121ad90d08ef693283c2529aa0601141c9add129af8d232b851de55bade3c4e9c79ecfb0fb9f41d1cb3d3c41

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e45e4b0887ea9b0335fbb0c3d503d574

        SHA1

        11c50f9eb930ef110758c5d5d55cbaeae552fdc6

        SHA256

        26d1b7b1f5db3f56d505bfa82e5d0b98b1ab3dd51f62f70641958461a9a9172c

        SHA512

        282ddbc400c8dd039ebdd497f2bf1fbba687f97b26a0bade645ad1de93c92e1caf435fdd52971d616d688411e1d287261313f2f7514de4be3bcbf82add07bf7b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        966e0b1e5929297b031ad74494ba227d

        SHA1

        5fa534cd86f25793be891cacaf67e7772e0ac67e

        SHA256

        cbe70f91706a94ea26459e6a73fe0c6ac3ee1e0b65ace01bb8eaca73b0281510

        SHA512

        e5b47a4d7c1f49eda049f3cded4a8b21d7a24bf912c1fc736d24797424b49bbf5ddbffe5982cb798fd6a1f3bdc30a169b6cb77f24af19189cc45bd0eab5add0c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3dd5fb69c6e9d81168cd95d91a22e8bb

        SHA1

        abb0c999bdbfef5ad9c91bb20d6a0840467b8026

        SHA256

        1e6606b4cfb0a2c138896c7af0b2f570afd3ae046056a5201cb791c9e9252c3d

        SHA512

        0d6975061fc27c7a26f203b5f616c962c36c483c499ec2d0ab220c55383651bd0bf8ebfefb86571dd29c3f8cdd7b6b61e0e8ee37a32c517fc6388be3b206fa49

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        2c38a28008801ecaa03a65103b9d65c7

        SHA1

        f124b3453e9ed2a0b6c2c2c2c0e1e2c95c50cb2a

        SHA256

        11927236a371180fedc9cab2771bbde570c0f86e9a66f842395da80806e75376

        SHA512

        4b4f6938c6fc8b9cf7276fe23a05512d072e6d5b161e41aa5cad0464ca8c9c3a92900c9da10a356807d2a4e24d2e32abab34b5d10122647780815f45a705832d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8803525b2f6638d77dc22f8a3238bc80

        SHA1

        99de976b77f46a99b00d27e2bd41f7ea2a462e6f

        SHA256

        01da7e779b39d1e89aa71ec38fa47c3d22837b9fb1924e172b90b5ded2fc7c84

        SHA512

        162005d4b24b357949c56d4cf3940b7b3f23cb76f759d69ace2b90d2d577fe5da395b6593de5c194d1791c633487fc727b0fa3fd505f7eb89ea486b475d69466

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        00fc09a2fc076cfd02a759115e996ec8

        SHA1

        b9e3b6995b19e5951b02716c9dd415b4d2c8d68d

        SHA256

        0fc590adc947aca5732d024441c6909e853f5c90252c54b3f563b2597e75009d

        SHA512

        af1720ca6ec1cf92a7254e1939a64ea978cebdf5094e45e69492c5700864510ad34fcfa7bcfb1ee4eb30d46b77bb9e560f58b490623deada1fe9422967d96409

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        2832e157496f2b2cae08a77ce751d840

        SHA1

        23fbd5ab3b11fc39c8edfabd5142618f702599bf

        SHA256

        a62d4172924468734711940b773b4464d8223b455516db125356d2a2e010604f

        SHA512

        0eac10b4d5318e1d787b3c10338619695f6e65936aae2b396f52240898690457e69ce47af2f5d736261cccb5746041a2f9fdb62c2de6bd2e99469aa953e90126

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7f4c5ec5ca61479b31ea7a01f8a9fa31

        SHA1

        42843f98e5e1f63afea318b58441411f9cb50561

        SHA256

        4299d7ec65ca9691bcc8952359e42f24e46baeb7e59c0fe1bd9746ca1d05b1bf

        SHA512

        b15c0bde9f36a9fac7dd8c2f23f931a0180fa7aaccafa8a5bd78aec622d49850d07254af538333c3d91929301f8ca5e33e847253622408f89b7396fd12c4d7e9

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F1B09EA1-7661-11EF-8920-7AF2B84EB3D8}.dat

        Filesize

        5KB

        MD5

        076d6cc767afa24153d142b901d92bc9

        SHA1

        302b0abe829942a1be1a0182c7c5c216ae39418f

        SHA256

        46dee8cef11361beb3eaa2fce386d172600adf5ea1146c6c97ee70708ec73f78

        SHA512

        e188c870c0bbfeda419a3d9f9ad089c4c260f99db97b3cd5c294e76682c8c8d092873e1c533e115e905093746784d062fa80540927646c3c34905d4c8bd72b0b

      • C:\Users\Admin\AppData\Local\Temp\Cab42EB.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar43AB.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\Kinship.E

        Filesize

        36KB

        MD5

        725b04bb5645e70d9ae2ee72a8b23e82

        SHA1

        11a6403b90e9430f9fdc3b22344d1c5d2cbddd94

        SHA256

        27a0c5b9f60c6dede610dea56dc6cc009c7d0ac312031272547c546ffc39c80e

        SHA512

        a2e301456036785b040a1ff4d6e143c09c762089bd12fd26d3b3172820e37e70b3a51d74bfcebf0ef267f0b289c5622f5f6a3b7455c0639f2a35ecfe41c37493

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rdrleakdiag.lnk

        Filesize

        1KB

        MD5

        147d5f86e3625c63e660991a70583a13

        SHA1

        cdbba2212580403e6409cb00fef582eeaec21d56

        SHA256

        7a07772b8afb941d3643faca17a040e98c73dc51962bea1a0b0062127f50b1de

        SHA512

        939104557445a2a0eec101feba4a6a6212c895a7cee263a0da9da5b20f34ffbbb78adfffe7befa6f4f4663e2eedb33bde12912bdd043a447769319977921dfd8

      • \Users\Admin\AppData\Local\Temp\nsjB9EE.tmp\System.dll

        Filesize

        11KB

        MD5

        883eff06ac96966270731e4e22817e11

        SHA1

        523c87c98236cbc04430e87ec19b977595092ac8

        SHA256

        44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82

        SHA512

        60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390

      • \Users\Admin\AppData\Roaming\SFhelper.dll

        Filesize

        90KB

        MD5

        05fc8bccccdabed0243488f3d7a30a75

        SHA1

        dfafc4da35a1182e7e1f5d4f32e6d600482b8a13

        SHA256

        ff553449b2d4b769a25b8b6c639d8b5d962ddce24b4601a1bff41b8fc7697376

        SHA512

        e326ef5f312c9a3c2ff7e09fc276e4b14aebfe17563ae44e47f7184b8c0dc9ac89f78d56e785b099e897945871a7dcd04747c0cd457128bca539baeca388f968

      • \Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\rdrleakdiag.exe

        Filesize

        211KB

        MD5

        eaf34a7d9a24baf248e4b5da247a384e

        SHA1

        ff4ccb35e4311fefdd7f0a7251570c51ab9ab224

        SHA256

        66a05692cf2ff6b0abcd97a5d4b37b61700a21fb93eee4338d87b4ebe79e32b0

        SHA512

        a50b36fff27c74c7049be98e4e2f312c825fae52f9aa9161e830e0703e476e7cb4a2947466fda1ebca0244b2e5d6e3b086fc1e884e22b468416416ebb11637b3

      • memory/1492-81-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-74-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-77-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-78-0x0000000000310000-0x0000000000311000-memory.dmp

        Filesize

        4KB

      • memory/1492-83-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-85-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-117-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-118-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1492-75-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1636-99-0x00000000003D0000-0x00000000003F2000-memory.dmp

        Filesize

        136KB

      • memory/1636-116-0x00000000003D0000-0x00000000003F2000-memory.dmp

        Filesize

        136KB

      • memory/1672-31-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-12-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-14-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-30-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-28-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-24-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1672-40-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-16-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-18-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/1672-20-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/2172-25-0x0000000002950000-0x0000000002972000-memory.dmp

        Filesize

        136KB

      • memory/2172-9-0x0000000002950000-0x0000000002972000-memory.dmp

        Filesize

        136KB

      • memory/2716-56-0x0000000001E70000-0x0000000001E92000-memory.dmp

        Filesize

        136KB

      • memory/2716-71-0x0000000001E70000-0x0000000001E92000-memory.dmp

        Filesize

        136KB