Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare8ec363843a850f67ebad036bb4d18efd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VirusShare8ec363843a850f67ebad036bb4d18efd.exe
Resource
win10v2004-20240910-en
General
-
Target
VirusShare8ec363843a850f67ebad036bb4d18efd.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/3C2A-99F1-2167-029E-D129
http://cerberhhyed5frqa.qor499.top/3C2A-99F1-2167-029E-D129
http://cerberhhyed5frqa.gkfit9.win/3C2A-99F1-2167-029E-D129
http://cerberhhyed5frqa.305iot.win/3C2A-99F1-2167-029E-D129
http://cerberhhyed5frqa.dkrti5.win/3C2A-99F1-2167-029E-D129
http://cerberhhyed5frqa.onion/3C2A-99F1-2167-029E-D129
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16401) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" dialer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" VirusShare8ec363843a850f67ebad036bb4d18efd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation dialer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dialer.lnk VirusShare8ec363843a850f67ebad036bb4d18efd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dialer.lnk dialer.exe -
Executes dropped EXE 3 IoCs
pid Process 4620 dialer.exe 2860 dialer.exe 5440 dialer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dialer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" VirusShare8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dialer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" dialer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dialer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" dialer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dialer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" VirusShare8ec363843a850f67ebad036bb4d18efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3AAE.bmp" dialer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare8ec363843a850f67ebad036bb4d18efd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2308 cmd.exe 1000 PING.EXE 6044 cmd.exe 3820 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 6096 taskkill.exe 2996 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop VirusShare8ec363843a850f67ebad036bb4d18efd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" VirusShare8ec363843a850f67ebad036bb4d18efd.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop dialer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\\dialer.exe\"" dialer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings dialer.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1000 PING.EXE 3820 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe 4620 dialer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe Token: SeDebugPrivilege 4620 dialer.exe Token: SeDebugPrivilege 2996 taskkill.exe Token: SeDebugPrivilege 2860 dialer.exe Token: 33 5060 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5060 AUDIODG.EXE Token: SeDebugPrivilege 5440 dialer.exe Token: SeDebugPrivilege 6096 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4620 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe 85 PID 3588 wrote to memory of 4620 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe 85 PID 3588 wrote to memory of 4620 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe 85 PID 3588 wrote to memory of 2308 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe 86 PID 3588 wrote to memory of 2308 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe 86 PID 3588 wrote to memory of 2308 3588 VirusShare8ec363843a850f67ebad036bb4d18efd.exe 86 PID 2308 wrote to memory of 2996 2308 cmd.exe 88 PID 2308 wrote to memory of 2996 2308 cmd.exe 88 PID 2308 wrote to memory of 2996 2308 cmd.exe 88 PID 2308 wrote to memory of 1000 2308 cmd.exe 92 PID 2308 wrote to memory of 1000 2308 cmd.exe 92 PID 2308 wrote to memory of 1000 2308 cmd.exe 92 PID 4620 wrote to memory of 4948 4620 dialer.exe 108 PID 4620 wrote to memory of 4948 4620 dialer.exe 108 PID 4948 wrote to memory of 1788 4948 msedge.exe 109 PID 4948 wrote to memory of 1788 4948 msedge.exe 109 PID 4620 wrote to memory of 4880 4620 dialer.exe 110 PID 4620 wrote to memory of 4880 4620 dialer.exe 110 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2684 4948 msedge.exe 112 PID 4948 wrote to memory of 2276 4948 msedge.exe 113 PID 4948 wrote to memory of 2276 4948 msedge.exe 113 PID 4948 wrote to memory of 872 4948 msedge.exe 114 PID 4948 wrote to memory of 872 4948 msedge.exe 114 PID 4948 wrote to memory of 872 4948 msedge.exe 114 PID 4948 wrote to memory of 872 4948 msedge.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare8ec363843a850f67ebad036bb4d18efd.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare8ec363843a850f67ebad036bb4d18efd.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exe"C:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8190446f8,0x7ff819044708,0x7ff8190447184⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:24⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:34⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:84⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:14⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:14⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:14⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:84⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:84⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:14⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:14⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:14⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:14⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,245517666936214197,7645222309534260017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:14⤵PID:3504
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.zmvirj.top/3C2A-99F1-2167-029E-D1293⤵PID:4832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8190446f8,0x7ff819044708,0x7ff8190447184⤵PID:4464
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2320
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "dialer.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6044 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "dialer.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3820
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "VirusShare8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare8ec363843a850f67ebad036bb4d18efd.exe" > NUL2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "VirusShare8ec363843a850f67ebad036bb4d18efd.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1000
-
-
-
C:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exeC:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
C:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exeC:\Users\Admin\AppData\Roaming\{6C8AB582-7DC4-4E4F-22D7-6CCF1CA21751}\dialer.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5440
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53af3adbfc6caef2644c6908bbaf20627
SHA11381e8547c9f52cfe50c36f9b48fddd8f0e77374
SHA2560a68f13fbe89dd82e99598c562c0662180d37e7a6570ef2480d64c21a0d20527
SHA5129a298a77de6d23e48a65e84832f605bc69f6327189d5563620cfe5e2129a546ee4c1aa4551c5007e9d79f6fef5b15468c7adfb4e3d383d9da4faaf0e99710157
-
Filesize
10KB
MD54a422e746297e15e00c17bb9cfb13e42
SHA1c1794ef728332ce8be1447c042f2b261ca9a742a
SHA25639466040a68de0eaf19f8664965b00325036bf96bdb0841ced49da735e27d0f6
SHA512ded4cdf5b24e0f1baa6deb6350d89ffb05705d314d26700326d1885671892cca9b04ac3aaed1ba8fa79c0945c694c50c44ab7d60cb08d45369f284b7555f74e7
-
Filesize
85B
MD5cf91572e8203df749d431e4ce27d61c7
SHA12bc689a3b5464aa34a89b84e285a0c0d34cc8ff6
SHA256ae886c87ef93e7c5f9aae72b83810fc2851b0333a6c94f508eb8f09a77ff0764
SHA5126e00f5ddf416e1f02704918c8b41ed7959802b4a797cff41a41338108333419d6d16f2041b993a5995aabb332c35886294700a94f56931aedc79d25fc4a339b6
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
5KB
MD5801862a0bef39fdde6ccc95407ed4738
SHA1c79fc9c77ea5fcb259a98234688be49f5ed326db
SHA256ec7b20444020d8b414da074d458921caedbc45a49a07a0ce579256500d597a82
SHA51245496e7e646491d32758e83b4724665222f714b252336bb20be2c5fa403787732d99111ee70ecb26aa8aeb8d1f1cc434436ca186f5f05ed16bafd23edc2adfa6
-
Filesize
6KB
MD509eb343a3ebce1e6c1a48fcc83c372aa
SHA12f9424919515c9ce64841f85a53e561c6af9ee2a
SHA256ed005486db39a9ed787570382263c745c72c560b6113bf6e81f3c794f0e8262b
SHA512b3c5383fd0b9ca1d7e575b50e5fbbdb6925a0331467cee4c8196d6eb714a1e24c0b14367f8fc206d3b80b968b7588947d8039563019163894980a3c1bb835487
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b3870dd5ea74d38ed84b2451969c3988
SHA15003ac9c6d61a1213b2a119f904bb675060cf3a0
SHA25641880196ad60dc04c98ff6d4305c6dd3f184f24be40ba010f889f54a411d825f
SHA512ddc55234eb0f3a3050233a240fc2c8cbb2a4e68254e3c4bb4792c46393bf4fc925efa20996541ea1474c763d98dc334346ff06af7b5c2eb3975c51789471e7ab
-
Filesize
1KB
MD5551a1bfd7f827de92e7ca473d3bb4e9b
SHA1b1eba4dc149503a098ba5fc7b19d4a2b1242501b
SHA256ae620b9e59ea6dddfbba9b1d2e39d79beaa61177d2ac9782fc565b7a770a6d77
SHA5121e35b370254829778b9d7476e8c27477b2776a301d8f8687468490ce693e39106748a83be3aaff9c0f372e72476ed5779f13637b2ee8c2b056cd2c5d581551d1
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c