Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe
-
Size
226KB
-
MD5
f9c5740ff15f172ceeda63ac7681fbdd
-
SHA1
04c9fd6bbcc500d9fd90f7c09cf0395cd3b926aa
-
SHA256
e126ba2abf85d604c05020dfa7d578e91244656ab8e0e07950ba9c05c037c6ac
-
SHA512
2db4e99d07765ebe8d4e85310ee360a324c986050149107796d3c2c0236460624c8d977ceac33ad5652cfff20c2c2398cf1e57d715e1e0ab22bf4e6ec78fba04
-
SSDEEP
6144:yQGB/n4ZWOeRzb2RL6nDHoEpgYH79X+9AD:G4ZADDHofYGAD
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/E33B-ED2A-0750-03A4-429D
http://cerberhhyed5frqa.slr849.win/E33B-ED2A-0750-03A4-429D
http://cerberhhyed5frqa.ret5kr.win/E33B-ED2A-0750-03A4-429D
http://cerberhhyed5frqa.zgf48j.win/E33B-ED2A-0750-03A4-429D
http://cerberhhyed5frqa.xltnet.win/E33B-ED2A-0750-03A4-429D
http://cerberhhyed5frqa.onion/E33B-ED2A-0750-03A4-429D
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16399) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" eventcreate.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation eventcreate.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\eventcreate.lnk f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\eventcreate.lnk eventcreate.exe -
Executes dropped EXE 2 IoCs
pid Process 232 eventcreate.exe 3192 eventcreate.exe -
Loads dropped DLL 6 IoCs
pid Process 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 232 eventcreate.exe 232 eventcreate.exe 232 eventcreate.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eventcreate = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" eventcreate.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eventcreate = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eventcreate = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eventcreate = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" eventcreate.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp8449.bmp" eventcreate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1852 set thread context of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 232 set thread context of 3192 232 eventcreate.exe 98 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\ f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe File opened for modification C:\Windows\pagination f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe File opened for modification C:\Windows\ eventcreate.exe File opened for modification C:\Windows\pagination eventcreate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eventcreate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eventcreate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4352 cmd.exe 1496 PING.EXE 1248 cmd.exe 456 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023473-26.dat nsis_installer_1 behavioral2/files/0x0007000000023473-26.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3308 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 4532 taskkill.exe 2276 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop eventcreate.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\eventcreate.exe\"" eventcreate.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings eventcreate.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 456 PING.EXE 1496 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 3192 eventcreate.exe 464 msedge.exe 464 msedge.exe 448 msedge.exe 448 msedge.exe 1776 identity_helper.exe 1776 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe Token: SeDebugPrivilege 4532 taskkill.exe Token: SeDebugPrivilege 3192 eventcreate.exe Token: SeBackupPrivilege 1728 vssvc.exe Token: SeRestorePrivilege 1728 vssvc.exe Token: SeAuditPrivilege 1728 vssvc.exe Token: SeIncreaseQuotaPrivilege 4412 wmic.exe Token: SeSecurityPrivilege 4412 wmic.exe Token: SeTakeOwnershipPrivilege 4412 wmic.exe Token: SeLoadDriverPrivilege 4412 wmic.exe Token: SeSystemProfilePrivilege 4412 wmic.exe Token: SeSystemtimePrivilege 4412 wmic.exe Token: SeProfSingleProcessPrivilege 4412 wmic.exe Token: SeIncBasePriorityPrivilege 4412 wmic.exe Token: SeCreatePagefilePrivilege 4412 wmic.exe Token: SeBackupPrivilege 4412 wmic.exe Token: SeRestorePrivilege 4412 wmic.exe Token: SeShutdownPrivilege 4412 wmic.exe Token: SeDebugPrivilege 4412 wmic.exe Token: SeSystemEnvironmentPrivilege 4412 wmic.exe Token: SeRemoteShutdownPrivilege 4412 wmic.exe Token: SeUndockPrivilege 4412 wmic.exe Token: SeManageVolumePrivilege 4412 wmic.exe Token: 33 4412 wmic.exe Token: 34 4412 wmic.exe Token: 35 4412 wmic.exe Token: 36 4412 wmic.exe Token: SeIncreaseQuotaPrivilege 4412 wmic.exe Token: SeSecurityPrivilege 4412 wmic.exe Token: SeTakeOwnershipPrivilege 4412 wmic.exe Token: SeLoadDriverPrivilege 4412 wmic.exe Token: SeSystemProfilePrivilege 4412 wmic.exe Token: SeSystemtimePrivilege 4412 wmic.exe Token: SeProfSingleProcessPrivilege 4412 wmic.exe Token: SeIncBasePriorityPrivilege 4412 wmic.exe Token: SeCreatePagefilePrivilege 4412 wmic.exe Token: SeBackupPrivilege 4412 wmic.exe Token: SeRestorePrivilege 4412 wmic.exe Token: SeShutdownPrivilege 4412 wmic.exe Token: SeDebugPrivilege 4412 wmic.exe Token: SeSystemEnvironmentPrivilege 4412 wmic.exe Token: SeRemoteShutdownPrivilege 4412 wmic.exe Token: SeUndockPrivilege 4412 wmic.exe Token: SeManageVolumePrivilege 4412 wmic.exe Token: 33 4412 wmic.exe Token: 34 4412 wmic.exe Token: 35 4412 wmic.exe Token: 36 4412 wmic.exe Token: 33 4220 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4220 AUDIODG.EXE Token: SeDebugPrivilege 2276 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 1852 wrote to memory of 3576 1852 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 85 PID 3576 wrote to memory of 232 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 91 PID 3576 wrote to memory of 232 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 91 PID 3576 wrote to memory of 232 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 91 PID 3576 wrote to memory of 4352 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 92 PID 3576 wrote to memory of 4352 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 92 PID 3576 wrote to memory of 4352 3576 f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe 92 PID 4352 wrote to memory of 4532 4352 cmd.exe 94 PID 4352 wrote to memory of 4532 4352 cmd.exe 94 PID 4352 wrote to memory of 4532 4352 cmd.exe 94 PID 4352 wrote to memory of 1496 4352 cmd.exe 95 PID 4352 wrote to memory of 1496 4352 cmd.exe 95 PID 4352 wrote to memory of 1496 4352 cmd.exe 95 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 232 wrote to memory of 3192 232 eventcreate.exe 98 PID 3192 wrote to memory of 3308 3192 eventcreate.exe 99 PID 3192 wrote to memory of 3308 3192 eventcreate.exe 99 PID 3192 wrote to memory of 4412 3192 eventcreate.exe 103 PID 3192 wrote to memory of 4412 3192 eventcreate.exe 103 PID 3192 wrote to memory of 448 3192 eventcreate.exe 107 PID 3192 wrote to memory of 448 3192 eventcreate.exe 107 PID 448 wrote to memory of 1912 448 msedge.exe 109 PID 448 wrote to memory of 1912 448 msedge.exe 109 PID 3192 wrote to memory of 1952 3192 eventcreate.exe 108 PID 3192 wrote to memory of 1952 3192 eventcreate.exe 108 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 PID 448 wrote to memory of 312 448 msedge.exe 110 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\eventcreate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\eventcreate.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3308
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff620546f8,0x7fff62054708,0x7fff620547186⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:26⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:86⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:16⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:16⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:16⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:16⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:16⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:86⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:16⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:16⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:16⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,6585679329519887335,12887302977893213004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:16⤵PID:4800
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.xlfp45.win/E33B-ED2A-0750-03A4-429D5⤵PID:1736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff620546f8,0x7fff62054708,0x7fff620547186⤵PID:1660
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:3860
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "eventcreate.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\eventcreate.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1248 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "eventcreate.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:456
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "f9c5740ff15f172ceeda63ac7681fbdd_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1496
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:972
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a8 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4220
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53d3418dacf0278b0518f00b2de3d5e25
SHA1f0050abc752ab51a8de72c35fa40343b4b57a885
SHA256cceed210048e76a36a3acac2d9e378611973c501ae1607fe64f8e123fa920051
SHA512a156c24d21b49c66e20fffbc5da88c0e9a87c1462ca1d68e6cf064fe46847a2d25d267fc276647e68073c25a043d530da400b7f09bcec8953b06eca7a94456f6
-
Filesize
10KB
MD5ac8c5ff178dcda202a524b57c9970848
SHA14e6dd26f31229080204e87fa4ac520d151b2d642
SHA2563e61db80f0db4542f4494c8fe25160a6d7d7a0a7573179047d51ae465eeb14d3
SHA512ca740577caddedce5fe48d7b86d6a84cd55e245d303a19ce7be718ddda31cb675bee238ef2512c1e8d8afe5214e72f088425536d95bb4db2394f33ff409b69ef
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
6KB
MD5dd47f3f416187fbb41c3734344c8f3a9
SHA13915304433164976542de8f5d117cd11bdd0cdce
SHA2566b2cbb266c6850ecc189202555fa64b41d9c29b85b99b85f862d5d1b0c50e7df
SHA512f62aac42c01475af052ce0b50286bad34f7345a40ec4ce8f0971fb5aceb5ccbaf46f9c926c27e4f7dd1c298ee407c3e600fd7f80c61a8aff12c8067d3d7fdef8
-
Filesize
6KB
MD5afd130cfdc5803e7ed3b791aaad5a894
SHA10f7af1d754c412732b018158c6e12f1a8c7ef576
SHA2569796d47c0621c6db11677b8a9d6e8072cd42d53d67a4878739f8ff70258ac343
SHA5123212b2288a74f2fede42925abdebebdb299b7c2c3503c5bc76dc0c7b5ba47d0df5ffb3b0e0a943859e205f6c1d2148439acf964a8f4ba3449735fde5f8ebd0dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f74c2fefc9a1a33a5dcb08f8cba70097
SHA17ae6dcd1c7dd452c466f90417074c0f16a5bf8f5
SHA2562121ca2eacd1880398cafff2bad6dc3c31375649f9ccdf27b91b27eda6ed5602
SHA512094d47b710793095e772c674b5a799f9b15f717437c3dcef9e3ec411f2f0a5284f4237285b67b3e53e5c4b84b7a567fcb3fe92f22680e2c2508bcfc2093e6516
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
113KB
MD5164724978a7243bdc20d1ac77eba6418
SHA13fa0cf927cee74db40bda63a8fb51c5ab31c2366
SHA256dab48b011cd01ed12b86d8881ad3cc85913875fea9b17008a33123b40a87da78
SHA51230b09df3d90075402995b92a16d7c5c42d4c0ed8dff95af494aec430011cf07e96941c33a4af42ecf5243f2f878d3351c6f496f0d40e64da1db5f9973b0e4f21
-
Filesize
2KB
MD570c0bfe7c834d097e805787ed2f123a4
SHA1fded0dc703add894b981c6ca64a56b8c67fa1544
SHA25691d313b0cd8e40919b541b43113283d6dde03a7c663917b883a45f09ef7925ca
SHA512b68beb9eed98888bb6aebe2f8fa1642849f5ffc0c7816614615d5ed4f85e6b7c6d73baf10d0bdbaa180aa21275bf5fb3fce490267fa90213e5e5e35b1f001e20
-
Filesize
1KB
MD507f6a3023448a34e81df247b8ffefdf4
SHA1d7262131b8c2b73d53b8a107ee5beaf5a46d68f6
SHA256d887093c31eaf6fa0d67de440c7bb49fbe778c5211e00b35dd7f5104601c3ac3
SHA5120032f0d8fcf3563125d4b3802aa97aba4c5bc5a4926d662fb2e892faa82c98093e3d2431628516fb1977f3fff544fae7b28bfa3e4071b6e1b34cc33dcc5bc04e
-
Filesize
84KB
MD5f47a66f7cf15f17cc98d4cb4f0b34bc2
SHA1e6ae6734c0acf0beab835f168881c6cfa98ac515
SHA25606df7ee9794cc4db9950e0ea805add4870276a794a8756484a6ccd0a96783aa1
SHA51276afe23aae871ef77e8d03248dee2555d64e3eece66561b453f075d871cd7fa477f3715d1663f3de00c1258e53bf87cf5e955d267884874ae196605a80eea81d
-
Filesize
226KB
MD5f9c5740ff15f172ceeda63ac7681fbdd
SHA104c9fd6bbcc500d9fd90f7c09cf0395cd3b926aa
SHA256e126ba2abf85d604c05020dfa7d578e91244656ab8e0e07950ba9c05c037c6ac
SHA5122db4e99d07765ebe8d4e85310ee360a324c986050149107796d3c2c0236460624c8d977ceac33ad5652cfff20c2c2398cf1e57d715e1e0ab22bf4e6ec78fba04
-
Filesize
85B
MD50206affcbaf3bce08f431a2ad2d5c663
SHA1cc45e162865453d297e2e07d72a477f9139171ce
SHA256dd568c84e673225b22deaac8cc46e34887851c0e99468f3d29080e9789c52610
SHA512ac0f9e7747610789edabe26fee5b9464d20b5d91e6d085a747b82dd2a048cb0ad3e6f0b4e196df2a6a2eb293babc1a8911b459d1ae67ab3d36b4842cc149c812