Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 08:36

General

  • Target

    VirusShare8ec363843a850f67ebad036bb4d18efd.exe

  • Size

    186KB

  • MD5

    8ec363843a850f67ebad036bb4d18efd

  • SHA1

    ac856eb04ca1665b10bed5a1757f193ff56aca02

  • SHA256

    27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8

  • SHA512

    800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684

  • SSDEEP

    3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95 | | 2. http://cerberhhyed5frqa.qor499.top/559A-EC1A-A04D-029E-DB95 | | 3. http://cerberhhyed5frqa.gkfit9.win/559A-EC1A-A04D-029E-DB95 | | 4. http://cerberhhyed5frqa.305iot.win/559A-EC1A-A04D-029E-DB95 | | 5. http://cerberhhyed5frqa.dkrti5.win/559A-EC1A-A04D-029E-DB95 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/559A-EC1A-A04D-029E-DB95 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95

http://cerberhhyed5frqa.qor499.top/559A-EC1A-A04D-029E-DB95

http://cerberhhyed5frqa.gkfit9.win/559A-EC1A-A04D-029E-DB95

http://cerberhhyed5frqa.305iot.win/559A-EC1A-A04D-029E-DB95

http://cerberhhyed5frqa.dkrti5.win/559A-EC1A-A04D-029E-DB95

http://cerberhhyed5frqa.onion/559A-EC1A-A04D-029E-DB95

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95</a></li> <li><a href="http://cerberhhyed5frqa.qor499.top/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.qor499.top/559A-EC1A-A04D-029E-DB95</a></li> <li><a href="http://cerberhhyed5frqa.gkfit9.win/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.gkfit9.win/559A-EC1A-A04D-029E-DB95</a></li> <li><a href="http://cerberhhyed5frqa.305iot.win/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.305iot.win/559A-EC1A-A04D-029E-DB95</a></li> <li><a href="http://cerberhhyed5frqa.dkrti5.win/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.dkrti5.win/559A-EC1A-A04D-029E-DB95</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95" target="_blank">http://cerberhhyed5frqa.zmvirj.top/559A-EC1A-A04D-029E-DB95</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/559A-EC1A-A04D-029E-DB95</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16390) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 3 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare8ec363843a850f67ebad036bb4d18efd.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare8ec363843a850f67ebad036bb4d18efd.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\charmap.exe
      "C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\charmap.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2220
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:537601 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2796
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:704
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:612
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "charmap.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\charmap.exe" > NUL
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "charmap.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1796
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2788
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "VirusShare8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare8ec363843a850f67ebad036bb4d18efd.exe" > NUL
          2⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "VirusShare8ec363843a850f67ebad036bb4d18efd.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2576
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2608
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {6CC2B49D-378E-4776-8FC4-446896A02D64} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\charmap.exe
          C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\charmap.exe
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          PID:892
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2700
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:2128

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

        Filesize

        12KB

        MD5

        36fd609c414d8b11b599cd8cfebbde0e

        SHA1

        ee9a05c1a55d5c6ce8175581ecaaee070812223d

        SHA256

        4c73e7a9a1e393ff61820ef1329ec11bc544a6ba965291a245e3f4879cbf686b

        SHA512

        4680e3441270788d253aab45fb880925a3a66792aeeedb71023d03f5a8ba9a01eea5ed445bb5e16847fa3c01dfb0fc5af1e8cf5df5c3b498fc5564221fd67fa0

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

        Filesize

        10KB

        MD5

        ab31aec17e1515c46263d73005d4ad2a

        SHA1

        8d0d71117bd6180e85727fd9ae619b06bfd40ddb

        SHA256

        6a77998ab81ab6254a32b4af1234db723b4a43fdef86d7d2978cb7351ae5546f

        SHA512

        9722b874447ae0774d27852c2bda62772feebfcd062bbfde40464620d7be7d65197ce670f05aa9603b7830b0947caf52592bb69b5e63954dbdfd3b8e37aa83df

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

        Filesize

        85B

        MD5

        5aa265c73f1027ec18d5a46954e84fee

        SHA1

        2e515b5bd4e380119978ebbc172a2fa27baa9080

        SHA256

        bb4e74b589d058c5c9d62f07531d1d28fd546365146b13cb8c00db6e4fc991d2

        SHA512

        9160cb94300ddeccc4eaff1c4f52b6f358dcc2bcd047961da2aa4b93529633506034697e87a790bf5fccd5dc8c725477d4a44fee025956fafaefab1c19b82692

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

        Filesize

        225B

        MD5

        f6d629f2a4c0815f005230185bd892fe

        SHA1

        1572070cf8773883a6fd5f5d1eb51ec724bbf708

        SHA256

        ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f

        SHA512

        b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        db045588d5e2c6c13f58fbae341042a8

        SHA1

        80c8a2bac663b97f342fa7cf3da29479e072ed51

        SHA256

        8d3d3f8500c814155d3b5ed5375d25eb033a2acd7a69ad4d058443d2f9a8afc1

        SHA512

        fbb78a03a757097d11de0f0ec1c148dd39df970badf3c1cad331cafc8cfb8c35d3dd0b3d9e8e275efb376d471ce9795196be9291dc0ebc35c89d5469c1d18d32

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4674873a71c8b71a0eb0ff20f070ae68

        SHA1

        9869869ee97f22be6c4d75624c3a52e27462358e

        SHA256

        035657093e557f272e20e686c8a945ed59a894f14be7fe25e2c31df01f5154f9

        SHA512

        ee07d29b8b9710305bba75c1ece17b676da310d3816114e3807be7e2ab506c85cb2e54136419bd3a2891b8469305def88ace2fad2a3a83ae7990bd5c16e209f6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7535e514a4e8368ddcb856c8d730d8b3

        SHA1

        8c21bd4461856ea2aebec2e79677d9f0b2d2dff4

        SHA256

        d1613f0726bbaa36af813a446c9c8a370a4a17c48004a9ad6684a018be4377f8

        SHA512

        301140723b8a6440a854c03383f96a05ba982bc1ac5c3ef5c0b43c024e5e29802c5e9895a60f27dacee5d6781d394647bee35d8538cf15720d438c6ea09ca5ff

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b8ba85175e9dc54b0eae45aa5a9f8391

        SHA1

        9c60d5b1f0d4ee95aec4a3c57a9064ba187ddb9e

        SHA256

        7e2b0909d8042f0d0fb64a0ced845dcc818b9e03c4950e93851ac7e52ba13a28

        SHA512

        f0a77f440d681c44af96bde004d86187e3c55984fd8326df6a48bb48311f0c5e121166610e2b7b0dbc2855ec7aee0eb40ae8557a92c1e2081884ba36c073729f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7f4d7f9ef9cf6e0c9c09e5a792a75233

        SHA1

        9e8fdf340824e8613c54120e34d705f3c5c40798

        SHA256

        cb5bf37b96bb8e0e8440767470bd492bb9b327543e44952ab4efc9c52ff4ecbf

        SHA512

        2178fbd7d401c14fc3d4c518c40ba9970ad0c1fb94a8faf3af74079a69d1944dd65ab596c2e5dbea2423fa030b06292572a0b7d91e1ebb0de2a5632b23e7bfe7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e08f8872cc8e4b90856a694d03d5f8a7

        SHA1

        008aa30e939f87130361a2866a749433db1efbf0

        SHA256

        3502b065f296f61c46260d8196b21866c4d2ef81a36cdb490dac5b8959974cc5

        SHA512

        cd0e9f9541f929cbaf05f73a87c86a0891c3b82b701d33383affaf4cb7299ccdc753f4b314956228cde66f1bda2b420e5cea2d91e997fa9fef78717c2f4a7c8d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c0fd4f5501ddfdd21d12314d9c113f7a

        SHA1

        ab56306183bd8e3a44dd221b1e3eacdfd16b390f

        SHA256

        1fe51c7c9bfa7182d6570dde5ee7cbcfb35be12bf9a3c47a874a25bc5a6bb818

        SHA512

        511a492ae3096281c587cd68485b43e7b3c05d8bafed5670c7e73a7af17b12b31d28213f6dc5c8e9f31f03e250a182440f88f4b330aff81ff952c0d6a4eeae77

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4321bb8bfd466c20628045f94c9d2b15

        SHA1

        417d6a4abb4720d4404d56f87c63d5cfe75aafd0

        SHA256

        7bb25563d8d1f8fd5ba277a29bfb2211660f036c2c3e38ca6dfb23d3341f3697

        SHA512

        7e992984db6c04ff445cc8ec710eeb80b9192ea549edeaf0eb6863c884e6543117932c015d43b808e03b9c7ba6f51373cf6eba151eb827c8bbc21df95cdf207b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        accc3d78fb572814234739167ed7e3e1

        SHA1

        a90cd8a4f631643263d1239b7b8857ba9a0fa6e9

        SHA256

        9b7ea268d3adfd339af9ec8456fe2d06cd357a63f06b9d1cbb14932923f638a5

        SHA512

        b908275d42acdc50830e2cfbfb2b362892369972ca62b416cb50ec4575452dfa2b94c8ce8b5e31522db722b39b64dd2cd7507f74fc9a1ad909b1523eb949a2f0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1f2a760b16c9eb594acc0785676af2f5

        SHA1

        fc98100716bb08588157975f265ef67e69d4d071

        SHA256

        026efbfc05c57dfd292c24899865a80c517d8b8569cdb58e67636edd1f82c586

        SHA512

        c2a92c88d825a0797bb3f881dfa2f3ee3379c89f71be8baf3bc2313f327c4ee0e5df8b76909ac87dbf66ca48c2e10a5c29be133ded8d9f63b674020517b99546

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        66db818d037b77fe90d386b3a84e79f9

        SHA1

        6b3aa2d6d6c34fd89215e895787fe95db2f95cb8

        SHA256

        a68a04771f67a8e1bb7de5dcd61e1a1b2eb9647c8c1e07784ece10f1c40f98eb

        SHA512

        72a25b10c962a793eab1237c0a97460ec7d93f1b5b96b07ef8fba98ad38af09eca971584cc178cc10f04d4b53f3ec1282f0983967309db21d0118db5c78051bc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        279ac7c72a67408f0126139520bcbd77

        SHA1

        fdb4aa58d0b4d40823d3ed38ccfcb28e5fb1b71d

        SHA256

        b1d6aab8c5e17ab70a06de10e434fa7dc10a8896f421af26932e18220cff7394

        SHA512

        505ec753d97ad1f3de69aa044e81422abe810c294092965a07a9d17c3177e7cdab3018924a12e16ca7b176ab8194c8d4cba88cab3231fd4debadb80d01e8cba7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        739bf95a11dfa9460ed5cbd9b877ccfd

        SHA1

        e0d76313ed4936b75b420e387667961ede0d0b8f

        SHA256

        c5eb2f6fd1d2c69a57d5453533a1430aca056ce6f4da81b4af7ee75950dca19e

        SHA512

        d7d3ffb2ee953c292234edfb2c6e5b1cac3e7c3fd9134e8175fa2f3e02b435f6cefb95d4ed078bd63be49461cbf9a2375242ca8b123b8058517d99191a4f3a4d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ba05d64c528b36de1f8f4daca2f910f8

        SHA1

        37f89b92030f5159dce4ef9083a703e0299314b3

        SHA256

        81e311b7024a2104334df6832d418f81771edee5dd37a4e3eaf12f5c331df291

        SHA512

        da8ad246320bb91b24645fd7308f19b4e9413fb5a6068792f6bc0674d5a5e0d05ee63199a3ac560af4d8f9b06f23ffc631d69d2be009697fa0bfa3aea924df9d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        75f7145fd45c278962830dd477ab40a9

        SHA1

        d935e618689e35af359a2f3401f30c9a786938e5

        SHA256

        90ecc3e3a99a48de2513df1835a9ae6c8250700cc6ca8a05783157ff16a99b5c

        SHA512

        aa687582fb39ff81c9670ff443c441ccac4bfa0c71c61ddad83c439a9b62e10036a1acde72169be8a70b0863baac323e4b78a069ee01a50ab51da8ac7e848e5f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        756b81e57b08f9e24885f1910822d8ca

        SHA1

        bb17fd58d6fe2323cc19ead82db74354510ee71a

        SHA256

        881e7316e8ef2363e9051bde39600abacb93e9de84c3e0cae11bd86808e7a208

        SHA512

        72231aa872fbf00bd32d62a499bdf56ff133e8d03bbab5502610ea06ab3f9af4a37202053e4b6b59fd0e93b444ddd0074b656195a5118bf205e9bef8de4a0931

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        d5291362ca18632a7179d57140f301d4

        SHA1

        88c143c38a3c90aedc70e16090059a6dff6651c4

        SHA256

        d2146074eb6384dde9478c0504c79221b3f408585acb1f05486c8475b5aea6af

        SHA512

        76383a8397b6de455ae1e956de29036f360748d5fad3cdf1756897f514dc9010df77a035c524e08fa7d1634697d278c40d44a4b56e47925459e32f8b138427bf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        02cad1bfc771c63551db22b618754df8

        SHA1

        250b318022feccefb79988517381316b1c84126c

        SHA256

        2dfd6d417b1fdbbc4e626604f8305c1bdf0089b178445131a8271e04f20b371c

        SHA512

        35bc27e6182eefcd103a553d934f528e67cb5a7e78ca2308b89c700072b5f2e78d390cd98f227c849cd52e81da3847d3210499a1a2819b9dd00a0a9b36f1df41

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e57a6a829edfbfb712d0a7935f81e024

        SHA1

        f19e00bdcd5a6f4c8d2c5f3758c7c98bafd225ac

        SHA256

        e2b19225a2c74326d4d366e4b52797478e27d5b7c84ddba0606bd8d3fa315a18

        SHA512

        31ec1742d33ffc51efa150c04a94583eac55f6188510f108ffd1ba01fbea84264501fca13e574e8f86444593bad0b50474e75a360fbac040a6efef8c831de52d

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{90138C51-772B-11EF-ACDF-5EE01BAFE073}.dat

        Filesize

        5KB

        MD5

        9522b6e739649542a1f87109fe8883e2

        SHA1

        f34b72943aa7a2f5b03be371ad15be15adaaa8d0

        SHA256

        578a06a8b42ca0231504997d3bf951499356220ce149fb05db5b5fb77ef7f9cd

        SHA512

        0c5b5e39f88f8386b59bb87652ac4a4690609090b09f4ef43c9a2d69124f05ee9d1a6484428bf0f930638cfd9101a1a79b4b915f7839b39374206425160bdaac

      • C:\Users\Admin\AppData\Local\Temp\Cab86CE.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar873F.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\charmap.lnk

        Filesize

        1KB

        MD5

        2926d7846121cbfdd1a722c3a76f0d1e

        SHA1

        87a7335906985e24e1d6a33ad4e2467f066c6d61

        SHA256

        be4cb7d6fb6c6ed664c0ce59205c2f8b715fc8c474a7273f1b7b80c374909a89

        SHA512

        d5fbbd13f8c63732fc1b5ca14a79989bd6125b7dc97ffd8cc96196e777836f31e05aae4d5e8db14fcdf5f8100c4e3f20ae04a75d2ad1cfa329a0776ad238dc88

      • \Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\charmap.exe

        Filesize

        186KB

        MD5

        8ec363843a850f67ebad036bb4d18efd

        SHA1

        ac856eb04ca1665b10bed5a1757f193ff56aca02

        SHA256

        27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8

        SHA512

        800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684

      • memory/892-25-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/892-24-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2392-1-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2392-2-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2392-0-0x0000000000150000-0x0000000000171000-memory.dmp

        Filesize

        132KB

      • memory/2392-17-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-27-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-410-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-413-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-465-0x00000000035E0000-0x00000000035E2000-memory.dmp

        Filesize

        8KB

      • memory/2772-416-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-419-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-422-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-425-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-428-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-431-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-434-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-437-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-447-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-451-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-453-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-905-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-906-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-455-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-443-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-440-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-28-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-22-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-21-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/2772-19-0x0000000000D30000-0x0000000000D31000-memory.dmp

        Filesize

        4KB

      • memory/2772-14-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-12-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2772-11-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB